Monday, March 16, 2020

10 agencias que contratan enfermeras para EE.UU.

10 agencias que contratan enfermeras para EE.UU. Estados Unidos necesita profesionales de la enfermerà ­a en grandes nà ºmeros debido a la jubilacià ³n de miles de profesionales nativos en los prà ³ximos aà ±os. Por ello, contratan enfermeras en otros paà ­ses. Para los candidatos internacionales, esta opcià ³n es atractiva porque adems de brindar la oportunidad de trabajar en EE.UU. permite obtener buenos salarios ya que es una profesià ³n bien pagada. En la actualidad, la mayorà ­a de los contratos para trabajar en EE.UU. en esta profesià ³n los obtienen enfermeros/as de paà ­ses de habla inglesa, como Filipinas, India, Irlanda, Sudfrica, Australia, Nueva Zelanda o algunas islas caribeà ±as. Un nà ºmero ms reducido de profesionales procede de otros paà ­ses, destacando los provenientes de Mà ©xico. Enfermeras Internacionales para trabajar en EE.UU. En EE.UU. hay 3,2 millones de enfermeras registradas, conocidas por sus iniciales RN.El 90 por ciento son mujeres.Se estima que en 2020 habr 800.000 puestos de trabajo en enfermerà ­a sin cubrir, segà ºn clculos del National Center for Workforce Analysis.El 15 por ciento de enfermeras que trabajan en EE.UU. se han formado fuera de este paà ­s, segà ºn el Institute for Immigration Research de la Universidad George Mason.Para trabajar en EE.UU. como RN, las enfermeras internacionales necesitan: licenciatura universitaria o equivalente, homologacià ³n de estudios, examen de conocimientos, certificacià ³n del estado en el que quieran trabajar, conocimiento alto del idioma inglà ©s y documento que acredite el derecho a trabajar en EE.UU., que puede ser visa de trabajo o tarjeta de residencia permanente . 10 Agencias estadounidenses de reclutamiento de enfermeras/os Entre las numerosas agencias que se dedican a esta labor y aceptan candidatos de Latinoamà ©rica y/o Espaà ±a, destacan las siguientes. ASMCI Servicios para Estados Unidos y Canad Telà ©fono: 702-483-5308Correo Electrà ³nico: zenasmci.com Assignment America Telà ©fono: 781-388-6800Correo electrà ³nico: inquiresmyaam.com CBH Healthcare Recruiters Telà ©fono: 602-404-0417Correo electrà ³nico: infocbhrecruiters.com Christine Paris Enterprises USA, Inc. Brinda servicios de colocacià ³n para USA, Australia y el Reino Unido. Correo electrà ³nico: christinechristineparis.com European Medical Staffing Para enfermeras/os de Mà ©xico o Canad. Informacià ³n en Mà ©xico: tsimoneuromedstaff.com Global Healtcare Resources Tiene socios reclutadores en Mà ©xico, Perà º y otros paà ­ses de Latinoamà ©rica. Telà ©fono: 703-481-2204Correo electrà ³nico: lightonerols.com Institute of California Bilingual Healthcare Telà ©fono: 310-933-3232En su pgina web en la seccià ³n de contactar hay un formulario para enviarles un correo. O ´Grady Peyton International: Brinda servicios de colocacià ³n a profesionales de todo el mundo, incluidos de Latinoamà ©rica y Espaà ±a.  Contactar en su pgina web, eligiendo el lugar en el que se encuentra la persona interesada. Peyton tambià ©n ofrece trabajos en Canad y Australia. PPR Telà ©fono: 866.581.5038Correo electrà ³nico: infopprtmg.com Wilson Staffing Network Correo electrà ³nico: kwilsonwsnglobal.com Preguntas que los candidatos deben hacer a las agencias de colocacià ³n de enfermeras internacionales No todas las agencias son iguales y se deberà ­a contactar con varias y preguntar cosas como:    ¿Cobran tarifa de colocacià ³n? Ya que puede pagarlo el empleador. ¿Ayudan en trmites migratorios? ¿Ayudan a preparar el examen del NCLEX o del TOEFL? Y segà ºn las respuestas y las necesidades de cada uno, quedarse con la que resulte ms conveniente. Tipos de visas disponibles para enfermeras/os internacionales Para trabajar en Estados Unidos es necesario contar con algà ºn tipo de documento que lo autorice. Como regla general, las enfermeras internacionales pueden contar con uno de los siguientes documentos: Residencia permanente (green card) por trabajoVisa H-1B para profesionales. Dependiendo de los casos de empleador y tipo de empleo, la H-1B para enfermeras pudiera no estar sujeta a los problemas de los là ­mites anuales.Visa TN-2 sà ³lo para mexicanos o canadienses, bajo el acuerdo del Tratado de Libre Comercio (TLC) Aunque esas son las ms frecuentes, no son las à ºnicas. Esta es una relacià ³n de todas las visas de trabajo y aquà ­ se puede encontrar un listado de las situaciones muy especà ­ficas que permiten solicitar con à ©xito un permiso de trabajo.   Las enfermeras que cuentan ya con un documento que les permite trabajar legalmente en Estados Unidos desde el punto de vista migratorio pueden contactar con cualquiera de las siguientes agencias para buscar trabajo en EE.UU. Maxim Staffing SolutionsCirrus Medical Staffing: 800-299-8132Alda TechnologiesAssingment America: 866-593-8178  ¿Cules son los requisitos mà ­nimos para poder trabajar de enfermera en Estados Unidos? Para trabajar como enfermera es imprescindible tener una licenciatura en enfermerà ­a (Bachelor of Nursing) que pueda ser considerado como equivalente a un R.N. en Estados Unidos. Los tà ­tulos mexicanos de Tà ©cnico profesional a veces sà ­ se validan pero otras no. Adems, es necesario hablar con fluidez inglà ©s, a nivel profesional y con un buen dominio del lenguaje mà ©dico. Tambià ©n se requiere aprobar el NCLEX-RN. Este examen puede rendirse fuera de EU, como por ejemplo en Mà ©xico D.F. Una alternativa es el CGFNS. Asimismo, es necesario obtener la licencia estatal para trabajar como enfermera. En EE.UU. no hay licencia federal que sirva para todo el paà ­s. Por ello, hay que sacarla en el estado donde cada profesional se va a desempeà ±ar laboralmente. Adems, se pide pasar un examen de posible historial criminal (background check, en inglà ©s) Por à ºltimo es necesario obtener la visa correspondiente o una green card  ¿Cunto puede demorarse toda la tramitacià ³n de la visa de enfermera para trabajar en EE.UU? Desde que se inicia hasta que se puede empezar a trabajar puede transcurrir entre 12 y 18 meses.  ¿Cules son las especialidades ms demandadas para las enfermeras internacionales? Las siguientes, son las especialidades de enfermerà ­a donde se ofertan ms puestos de trabajo. Cardiologà ­aDiagnà ³stico por imagenUrgencias (E.R.)Psiquiatrà ­aPediatrà ­aNeonatosCirugà ­aAnestesista  ¿En quà © lugares trabajan las enfermeras internacionales? Pueden ser contratadas por hospitales, hospicios, farmacà ©uticas, consultas de medicina primaria, centros de residencia para vida asistida. hogar de ancianos, etc. El salario de las enfermeras es bueno pero hay una gran diferencia segà ºn tipo de especialidad, los estados y tambià ©n influye los aà ±os de experiencia. Asimismo, a la hora de calcular cunto se gana, tener en consideracià ³n los impuestos. Estos son los 10 estados donde ms y menos se paga. En todo caso, tambià ©n es conveniente realizar un pequeà ±o estudio de si compensa econà ³micamente salir del paà ­s de uno para trabajar en Estados Unidos, ya que si bien es cierto que posiblemente se gana ms, tambià ©n lo es que los gastos son mucho mayores, por eso es pertinente, por ejemplo, verificar este comparativo salarial de 18 profesiones en 8 paà ­ses. Este es un artà ­culo informativo. No es asesorà ­a legal.

Saturday, February 29, 2020

An Analytical Essay on the Humor in Hamlet The Tragedy of Hamlet Essays

Humor was added to Hamlet by two major scenes, along with Hamlet's use of his antic-disposition. These two were: the scene between Hamlet and Polonius in the library, and the scene with the grave diggers (the clowns).    The scene between Hamlet and Polonius took place in Act II Scene 2. In Hamlet's first encounter with Polonius, he immediately insulted the old man by calling him a "fishmonger". He then quickly changed his opinion and complemented Polonius by calling him an honest man. Hamlet said, "to be honest, as this world goes, is to be one man picked out of ten thousand". As we know Polonius definitely was not such a man. Hamlet was portrayed as a clever lad, who was playing a psychological game with an old fool. He asked Polonius whether or not he had a daughter, pretending he did not know that Ophelia was Polonius's daughter. When Hamlet was asked about what he was reading, he replied by saying, "words, words, words". Throughout this scene, Hamlet revealed himself to Polonius as a mentally unstable man. He was playing a fool himself, while ingeniously using this to make Polonius look like an even bigger fool. He cleverly insulted Polonius' appearances indirectly, by referring to the book he was reading. According to that book old men had grey beards, their faces were wrinkled, they had a plentiful lack of wit, and so on. He was describing Polonius exactly. Perhaps the most humorous part took place when Hamlet, while saying, "for yourself, sir, shall grow old as I am, if like a crab you could go backward",   he advanced towards Polonius, causing him to walk backwards. Those words and the actions on the stage   revealed Hamlet to be a daring young man. When Polonius finally left, Hamlet dropped his pretense and yelled, "These tedious old fools!". In Act III Scene 2, Hamlet used a recorder, the musical instrument, as a telescope when Polonius entered the scene. He asked Polonius, "Do you see yonder cloud that's almost in shape of a camel?". Hamlet always pretended to be the madman in front of Polonius, while he actually made him look like an old fool.    The scene with the grave diggers (the clowns), took place in Act V Scene I. The clowns were discussing Ophelia's death and were making fun of the case of Sir James Hales, who also drowned himself.

Wednesday, February 12, 2020

Marketing Essay Example | Topics and Well Written Essays - 500 words - 63

Marketing - Essay Example While marketing identifies and determines the needs of the consumers, its promotional techniques become critical elements that help create customer base for the products. It is important that the needs of the customers are met by the products. The various channels of communication provide the necessary platform to showcase the features of the product. They not only attract target consumers but also motivate them to try and cultivate consumption habit towards the product. Hence, effectiveness of channels and the creativity in the advertisement become two most important factors for the success of the product. In other words, aggressive market growth of RDA would mainly depend on the channels that are chosen to advertise the products. While there are various direct channels of direct marketing like email, questionnaire, free sampling, social networking etc., the integrated market communication hugely helps in delivering effective messages regarding products to wider network of target consumers. Television advertising is more prolific but costly. However, various channels of viral marketing are not only cost effective but also well accepted. Products can be advertised on tickets, carry bags, balloons, posters, hoardings etc. The social networking sites and blogs have also emerged as cost effective channels of marketing that are very effective and trendy. Most importantly, they promote interactive sessions between consumer and producer, thereby providing ample of opportunities for creating a need for the product. The free sampling of RDA as supplement with chocolate flavored drink as promotion would also help develop taste for the product. Developing linkages with health centers and restaurants that serve healthy food would also help to expand its market. Its nutrient content would add value to it and thereby greatly contribute to its market growth. The major

Saturday, February 1, 2020

American Steel Industry Research Paper Example | Topics and Well Written Essays - 1500 words

American Steel Industry - Research Paper Example One of the industrial relations patterns that have emerged and which the international leadership of the united steelworkers of America appears to be advocating is a new cooperative partnership, modeled after the 1986 National Steel Agreement. This new industrial relations model includes significant quality and flexibility-enhancing work restructuring coupled with an increased share of compensation linked to firm performance and productivity in exchange for job security guarantees and unprecedented employee and union participation and information sharing at all levels of the company (Anon 2). Economic, technological and institutional changes in the 1980s have fundamentally transformed the industrial relations system in the American steel industry. Prior to the 1980s, the bargaining structure in steel matched the concentrated and centralized nature of the industry as a whole. Not only did a multi-employer bargain set the pattern for the wider industry, but also there was coordination of pay for particular jobs through the co-operative arrangements. The inaccessibility to potential entrants of requisite iron ore supplies of high grade has imposed a major barrier to entry to the American steel industry. In the period since the reconstruction of Europe and Japan following the Second World War, earlier reductions in tariffs on steel have invited the influx of foreign supplies; until at present foreign producers are supplying an appreciable minor fraction of the American market. These foreign suppliers are drawing on iron ore reserves that have not been generally accessible to potential entrant firms that might have produced steel in America. As a result, the barrier to entry to the American steel market that depended on the close holding of domestically available iron ore deposits by established American firms has been appreciably reduced. American steel

Thursday, January 23, 2020

Influenza Outbreak :: Journalism Media Studies Health Essays

Influenza Outbreak Four years ago the good citizens of this city voted to allow city funds to be allocated toward a new civic center located in the heart of Irvine. Four years ago the good citizens of this great city had no idea that a terrible pandemic would threaten their very lives and the lives of their loved ones. When signs of the flu season came around in late October this year, no one would have imaged that a disease, often with symptoms like a common cold, would have by the end of the year killed almost half of those killed in the Great War itself. Places all across the nation have had to deal with the sick and dying and Irvine is no exception. This week alone there have been reportedly 3369 new cases of influenza resulting in 60 deaths. This is a staggering jump from last week's amount of 1200 cases. This week's newest count has prompted city officials to call a special session in order to decide on how to deal with the outbreak in monetary terms. The State of California has already given Irvine all that it can until more Federal Aid can be released. In an overwhelming 5-0 vote the city council decided to divert the money set aside for construction of the new civic center and allocate those funds toward medical equipment and vaccines to help fight the deadly disease. Mayor Beth Krom stated that, "It was the only logical thing to do. With the city not receiving anymore State or Federal aid anytime soon it was only right that priorities be rearranged." In a news conference Council member Sukhee Kang was quoted as saying "I mean we're talking about lives here, not a few slabs of concrete and steel. What good is a civic center if there's no one to seat in it?" The civic center, which was set to open May 16, 1919, will be left standing half complete and no new date has been set as to when construction will resume. If things continue to go in this direction then the civic center may never be finished. In the long run this may end up hurting the city financially. A lot of money was invested into the project in hopes that it would help make Irvine the cultural capital of Southern California which would translate into more people and more business.

Wednesday, January 15, 2020

Real World

Real world cyber crime cases This document is an extract from the book Cyber Crime & Digital Evidence – Indian Perspective authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian School of Cyber Laws www. asianlaws. org Cyber Crime & Digital Evidence – Indian Perspective 23. Real World Cases This chapter serves as a ready reference guide. First the various scenarios are covered. A detailed discussion on the various cyber crimes, is covered in the ASCL publication titled â€Å"Understanding Hackers and Cyber Criminals†. This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course. Then the applicable law and legal liabilities are covered. Then the modus operandi usually followed by the criminals is discussed. The investigation guidelines for cyber crime investigators are not discussed in this book as they are part of the syllabus of the ASCL Certified Cyber Crime Investigator course only. For real world case studies on investigation of cyber crimes, please refer to the ASCL publication titled â€Å"Case Studies on Cyber Crime Investigation†. This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course. – 130 –  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 1 Orkut Fake Profile cases Orkut. com is a very popular online community and social networking website. Orkut users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Orkut members are publicly viewable. The scenarios 1. A fake profile of a woman is created on Orkut. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of â€Å"loose character† who wants to have sexual relations with anyone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favours. This leads to a lot of harassment for the victim and also defames her in society. 2. An online hate community is created. This community displays objectionable information against a particular country, religious or ethnic group or even against national leaders and historical figures. 3. A fake profile of a man is created on Orkut. The profile contains defamatory information abut the victim (such as his alleged sexual weakness, alleged immoral character etc) The law Scenario 1: Section 67 of Information Technology Act and section 509 of the Indian Penal Code. Scenario 2: Section 153A and 153B of Indian Penal Code. Scenario 3: Section 500 of Indian Penal Code. Who is liable? Scenario 1: Directors of Orkut as well as all those who create and update the fake profile. Scenario 2: Same as Scenario 1. Scenario 3: Same as Scenario 1.  © 2008 Rohas Nagpal. All rights reserved. – 131 – Cyber Crime & Digital Evidence – Indian Perspective The motive Scenario 1: Jealousy or revenge (e. g. the victim may have rejected the advances made by the suspect). Scenario 2: Desire to cause racial hatred (e. g. Pakistani citizens creating an anti-India online community). Scenario 3: Hatred (e. g. a school student who has failed may victimize his teachers). Modus Operandi 1. The suspect would create a free Gmail account using a fictitious name. 2. The email ID chosen by him would be unrelated to his real identity. 3. The suspect would then login to Orkut. com and create the offensive profile. – 132 –  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 2 Email Account Hacking Emails are increasingly being used for social interaction, business communication and online transactions. Most email account holders do not take basic precautions to protect their email account passwords. Cases of theft of email passwords and subsequent misuse of email accounts are becoming very common. The scenarios 1. The victim’s email account password is stolen and the account is then misused for sending out malicious code (virus, worm, Trojan etc) to people in the victim’s address book. The recipients of these viruses believe that the email is coming from a known person and run the attachments. This infects their computers with the malicious code. 2. The victim’s email account password is stolen and the hacker tries to extort money from the victim. The victim is threatened that if he does not pay the money, the information contained in the emails will be misused. 3. The victim’s email account password is stolen and obscene emails are sent to people in the victim’s address book. The law Scenario 1: Sections 43 and 66 of Information Technology Act. Scenario 2: Sections 43 and 66 of Information Technology Act and section 384 of Indian Penal Code. Scenario 3: Sections 43, 66 and 67 of Information Technology Act and section 509 of the Indian Penal Code. Who is liable? Scenario 1: Persons who have stolen the email account password and who are misusing the email account. Scenario 2: Persons who have stolen the email account password and who are threatening to misuse it.  © 2008 Rohas Nagpal. All rights reserved. – 133 – Cyber Crime & Digital Evidence – Indian Perspective Scenario 3: Persons who have stolen the email account password and who are misusing the email account. The motive Scenario 1: Corporate Espionage, perverse pleasure in being able to destroy valuable information belonging to strangers etc. Scenario 2: Illegal financial gain. Scenario 3: Revenge, jealousy, hatred. Modus Operandi 1. The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. 2. Unsuspecting victims would login to their email accounts using these infected computers. 3. The passwords of the victim’s email accounts would be emailed to the suspect. – 134 –  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 3 Credit Card Fraud Credit cards are commonly being used for online booking of airline and railway tickets and for other ecommerce transactions. Although most of ecommerce websites have implemented strong security measures (such as SSL, secure web servers etc), instances of credit card frauds are increasing. The scenario The victim’s credit card information is stolen and misused for making online purchases (e. g. airline tickets, software, subscription to pornographic websites etc). The law Sections 43 and 66 of Information Technology Act and section 420 of Indian Penal Code. Who is liable? All persons who have stolen the credit card information as well as those who have misused it. The motive Illegal financial gain. Modus Operandi Scenario 1: The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these infected computers to make online transactions. The credit card information of the victim would be emailed to the suspect. Scenario 2: Petrol pump attendants, workers at retail outlets, hotel waiters etc note down information of the credit cards used for making payment at these establishments. This information is sold to criminal gangs that misuse it for online frauds. 2008 Rohas Nagpal. All rights reserved. – 135 – Cyber Crime & Digital Evidence – Indian Perspective 23. 4 Online Share Trading Fraud With the advent of dematerialization of shares in India, it has become mandatory for investors to have demat accounts. In most cases an online banking account is linked with the share trading account. This has led to a high number of online share trading frauds. The scenario Scenario 1: The victim’s account passwords are stolen and his accounts are misused for making fraudulent bank transfers. Scenario 2: The victim’s account passwords are stolen and his share trading accounts are misused for making unauthorised transactions that result in the victim making losses. The law Scenario 1: Sections 43 and 66 of Information Technology Act and section 420 of Indian Penal Code. Scenario 2: Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Who is liable? Scenario 1: All persons who have stolen the account information as well as those who have misused it. Scenario 2: All persons who have stolen the account information as well as those who have misused it. The motive Scenario 1: Illegal financial gain Scenario 2: Revenge, jealousy, hatred Modus Operandi Scenario 1: The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these infected computers to login to their online banking and share trading accounts. The passwords and other information of the victim would be emailed to the suspect. Scenario 2: Same as scenario 1. – 136  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 3. 5 Tax Evasion and Money Laundering Many unscrupulous businessmen and money launderers (havala operators) are using virtual as well as physical storage media for hiding information and records of their illicit business. The scenario Scenario 1: The suspect uses physical storage media for hiding the information e. g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory ca rds, CD ROMs, DVD ROMs, iPods etc. Scenario 2: The suspect uses virtual storage media for hiding the information e. g. mail accounts, online briefcases, FTP sites, Gspace etc. The law Scenario 1: Depending upon the case, provisions of the Income Tax Act and Prevention of Money Laundering Act will apply. Scenario 2: Depending upon the case, provisions of the Income Tax Act and Prevention of Money Laundering Act will apply. Who is liable? Scenario 1: information. The person who hides the Scenario 2: The person who hides the information. If the operators of the virtual storage facility do not cooperate in the investigation, then they also become liable. The motive Scenario 1: Illegal financial gain Scenario 2: Illegal financial gain Modus Operandi Scenario 1: The suspect would purchase small storage devices with large data storage capacities. Scenario 2: The suspect would open free or paid accounts with online storage providers.  © 2008 Rohas Nagpal. All rights reserved. – 137 – Cyber Crime & Digital Evidence – Indian Perspective 23. 6 Source Code Theft Computer source code is the most important asset of software companies. Simply put, source code is the programming instructions that are compiled into the executable files that are sold by software development companies. As is expected, most source code thefts take place in software companies. Some cases are also reported in banks, manufacturing companies and other organisations who get original software developed for their use. The scenario Scenario 1: The suspect (usually an employee of the victim) steals the source code and sells it to a business rival of the victim. Scenario 2: The suspect (usually an employee of the victim) steals the source code and uses it as a base to make and sell his own version of the software. The law Scenario 1: Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act. Scenario 2: Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act. Who is liable? Scenario 1: The persons who steal the source code as well as the persons who purchase the stolen source code. Scenario 2: The persons who steal the source code. The motive Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Modus Operandi Scenario 1: If the suspect is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. – 138 – 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective If the suspect is not an employee of the victim, he would hack into the victim’s servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then contact potential buyers to make the sale. Scenario 2: If the suspe ct is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. If the suspect is not an employee of the victim, e would hack into the victim’s servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then modify the source code (either himself or in association with other programmers) and launch his own software.  © 2008 Rohas Nagpal. All rights reserved. – 139 – Cyber Crime & Digital Evidence – Indian Perspective 23. 7 Theft of Confidential Information Most business organisations store their sensitive information in computer systems. This information is targeted by rivals, criminals and sometimes disgruntled employees. The scenario Scenario 1: A business rival obtains the information (e. g. tender quotations, business plans etc) using hacking or social engineering. He then uses the information for the benefit of his own business (e. g. quoting lower rates for the tender). Scenario 2: A criminal obtains the information by hacking or social engineering and threatens to make the information public unless the victim pays him some money. Scenario 3: A disgruntled employee steals the information and mass mails it to the victim’s rivals and also posts it to numerous websites and newsgroups. The law Scenario 1: Sections 43 and 66 of the Information Technology Act, section 426 of Indian Penal Code. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 384 of Indian Penal Code. Scenario 3: Sections 43 and 66 of the Information Technology Act, section 426 of Indian Penal Code. Who is liable? Scenario 1: The persons who steal the information as well as the persons who misuse the stolen information. Scenario 2: The persons who steal the information as well as the persons who threaten the victim and extort money. Scenario 3: The disgruntled employee as well as the persons who help him in stealing and distributing the information. The motive Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Scenario3: Revenge. – 140  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective Modus Operandi Scenario 1: The suspect could hire a skilled hacker to break into the victim systems. The hacker could also use social engineering techniques. Illustration: A very good looking woman went to meet the system administrator (sysadmin) of a large company. She interviewed the sysadmin for a â€Å"magazine article†. During the interview she flirted a lot with the sysadmin and while leaving she â€Å"accidentally† left her pen drive at the sysadmin’s room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized! Once the Trojan was in place, a lot of sensitive information was stolen very easily. Illustration: The sysadmin of a large manufacturing company received a beautifully packed CD ROM containing â€Å"security updates† from the company that developed the operating system that ran his company’s servers. He installed the â€Å"updates† which in reality were Trojanized software. For 3 years after that a lot of confidential information was stolen from the company’s systems! Scenario 2: Same as scenario 1. Scenario 3: The disgruntled employee would usually have direct or indirect access to the information. He can use his personal computer or a cyber cafe to spread the information.  © 2008 Rohas Nagpal. All rights reserved. – 141 – Cyber Crime & Digital Evidence – Indian Perspective 23. 8 Software Piracy Many people do not consider software piracy to be theft. They would never steal a rupee from someone but would not think twice before using pirated software. There is a common perception amongst normal computer users to not consider software as â€Å"property†. This has led to software piracy becoming a flourishing business. The scenario Scenario 1: The software pirate sells the pirated software in physical media (usually CD ROMs) through a close network of dealers. Scenario 2: The software pirate sells the pirated software through electronic downloads through websites, bulletin boards, newsgroups, spam emails etc. The law Scenario 1: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Who is liable? Scenario 1: The software pirate as well as the persons who buy the pirated software from him. Scenario 2: The software pirate as well as the persons who buy the pirated software from him. The motive Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Modus Operandi Scenario 1: The suspect uses high speed CD duplication equipment to create multiple copies of the pirated software. This software is sold through a network of computer hardware and software vendors. Scenario 2: The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. Such service providers do not divulge client information to law enforcement officials of other countries. – 142  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 9 Music Piracy Many people do not consider music piracy to be theft. They would never steal a rupee from someone but would not think twice before buying or using pirated music. There is a common perception amongst people users to not consider music as â€Å"property†. There is a huge business in music piracy. Thousands of unscrupulous businessmen sell pirated music at throw away prices. The scenario Scenario 1: The music pirate sells the pirated music in physical media (usually CD ROMs) through a close network of dealers. Scenario 2: The music pirate sells the pirated music through electronic downloads through websites, bulletin boards, newsgroups, spam emails etc. The law Scenario 1: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Who is liable? Scenario 1: The music pirate as well as the persons who buy the pirated software from him. Scenario 2: The music pirate as well as the persons who buy the pirated software from him. The motive Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Modus Operandi Scenario 1: The suspect uses high speed CD duplication equipment to create multiple copies of the pirated music. This music is sold through a network of dealers. Scenario 2: The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. Such service providers do not divulge client information to law enforcement officials of other countries.  © 2008 Rohas Nagpal. All rights reserved. – 143 – Cyber Crime & Digital Evidence – Indian Perspective 23. 10 Email Scams Emails are fast emerging as one of the most common methods of communication in the modern world. As can be expected, criminals are also using emails extensively for their illicit activities. The scenario In the first step, the suspect convinces the victim that the victim is going to get a lot of money (by way of winning a lottery or from a corrupt African bureaucrat who wants to transfer his ill gotten gains out of his home country). In order to convince the victim, the suspect sends emails (some having official looking documents as attachments). Once the victim believes this story, the suspect asks for a small fee to cover legal expenses or courier charges. If the victim pays up the money, the suspect stops all contact. The law Section 420 of Indian Penal Code Who is liable? The sender of the email. The motive Illegal financial gain. Modus Operandi The suspect creates email accounts in fictitious names and sends out millions of fraudulent emails using powerful spam software. – 144 –  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 11 Phishing With the tremendous increase in the use of online banking, online share trading and ecommerce, there has been a corresponding growth in the ncidents of phishing being used to carry out financial frauds. Phishing involves fraudulently acquiring sensitive information (e. g. passwords, credit card details etc) by masquerading as a trusted entity. The scenario Scenario 1: The victim receives an email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to â€Å"a secure page on the bank’s website†. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim’s information is stolen and misused. The law Sections 43 and 66 of Information Technology Act and sections 419, 420 and 468 of Indian Penal Code. Who is liable? All persons involved in creating and sending the fraudulent emails and creating and maintaining the fake website. The persons who misuse the stolen or â€Å"phished† information are also liable. The motive Illegal financial gain. Modus Operandi The suspect registers a domain name using fictitious details. The domain name is usually such that can be misused for spoofing e. g. Noodle Bank has its website at www. oodle. com The suspects can target Noodle customers using a domain name like www. noodle-bank-customerlogin. com The suspect then sends spoofed emails to the victims. e. g. the emails may appear to come from [email  protected] com The fake website is designed to look exactly like the original website.  © 2008 Rohas Nagpal. All rights reserved. – 1 45 – Cyber Crime & Digital Evidence – Indian Perspective 23. 12 Cyber Pornography Cyber pornography is believed to be one of the largest businesses on the Internet today. The millions of pornographic websites that flourish on the Internet are testimony to this. While pornography per se is not illegal in many countries, child pornography is strictly illegal in most nations today. Cyber pornography includes pornographic websites, pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). The scenario The suspect accepts online payments and allows paying customers to view / download pornographic pictures, videos etc from his website. The law Section 67 of Information Technology Act. Who is liable? The persons who create and maintain the pornographic websites are liable. In some cases cyber cafe owners and managers may also be liable in case they knowingly allow their customers to access the pornographic websites. The motive Illegal financial gain. Modus Operandi The suspect registers a domain name using fictitious details and hosts a website on a server located in a country where cyber pornography is not illegal. The suspect accepts online payments and allows paying customers to view / download pornographic pictures, videos etc from his website. – 146 –  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 3 Online Sale of Illegal Articles It is becoming increasingly common to find cases where sale of narcotics drugs, weapons, wildlife etc. is being facilitated by the Internet. Information about the availability of the products for sale is being posted on auction websites, bulletin boards etc. The scenario The suspect posts information about the illegal sale that he seeks to make. P otential customers can contact the seller using the email IDs provided. If the buyer and seller trust each other after their email and / or telephonic conversation, the actual transaction can be concluded. In most such cases the buyer and seller will meet face to face at the time of the final transaction. Illustration: In March 2007, the Pune rural police cracked down on an illegal rave party and arrested hundreds of illegal drug users. The social networking site, Orkut. com, is believed to be one of the modes of communication for gathering people for the illegal â€Å"drug† party. The law Depending upon the illegal items being transacted in, provisions of the Narcotic Drugs and Psychotropic Substances Act, Arms Act, Indian Penal Code, Wildlife related laws etc may apply. Who is liable? The persons who buy and sell these items. The motive Illegal financial gain. Modus Operandi The suspect creates an email ID using fictitious details. He then posts messages, about the illegal products, in various chat rooms, bulletin boards, newsgroups etc. Potential customers can contact the seller using the email IDs provided. If the buyer and seller trust each other after their email and / or telephonic conversation, the actual transaction can be concluded. In most such cases the buyer and seller will meet face to face at the time of the final transaction.  © 2008 Rohas Nagpal. All rights reserved. 147 – Cyber Crime & Digital Evidence – Indian Perspective 23. 14 Use of Internet and Computers by Terrorists Many terrorists are using virtual as well as physical storage media for hiding information and records of their illicit business. They also use emails and chat rooms to communicate with their counterparts around the globe. The scenario The suspects carry laptops w herein information relating to their activities is stored in encrypted and password protected form. They also create email accounts using fictitious details. In many cases, one email account is shared by many people. E. g. one terrorist composes an email and saves it in the draft folder. Another terrorist logs into the same account from another city / country and reads the saved email. He then composes his reply and saves it in the draft folder. The emails are not actually sent. This makes email tracking and tracing almost impossible. Terrorists also use physical storage media for hiding the information e. g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, iPods etc. They also use virtual storage media for hiding the information e. g. mail accounts, online briefcases, FTP sites, Gspace etc. The law Terrorists are covered by conventional laws such as Indian Penal Code and special legislation relating to terrorism. Who is liable? Terrorists as well as those who help them to protect their information are liable. If email service providers do not assist the law enforcement personnel in the investigation then they are also legally liable. T he motive Keeping terrorism related information confidential. Secure communication amongst terrorist group members. Modus Operandi The terrorists purchase small storage devices with large data storage capacities. They also purchase and use encryption software. The terrorists may also use free or paid accounts with online storage providers. – 148  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 23. 15 Virus Attacks Computer viruses are malicious programs that destroy electronic information. As the world is increasingly becoming networked, the threat and damage caused by viruses is growing by leaps and bounds. The scenario Scenario 1: The virus is a general â€Å"in the wild† virus. This means that it is spreading all over the world and is not targeted at any specific organisation. Scenario 2: The virus targets a particular organisation. This type of a virus is not known to anti-virus companies as it is a new virus created specifically to target a particular organisation. The law Scenario 1: Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Scenario 2: Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Who is liable? Scenario 1: The creator of the virus. Scenario 2: The creator of the virus as well as the buyer who purchases the virus (usually to target his business rivals). The motive Scenario 1: Thrill and a perverse pleasure in destroying data belonging to strangers. Scenario 2: Illegal business rivalry. financial gain, revenge, Modus Operandi Scenario 1: A highly skilled programmer creates a new type or strain of virus and releases it on the Internet so that it can spread all over the world. Being a new virus, it goes undetected by many anti-virus software and hence is able to spread all over the world and cause a lot of damage. Anti-virus companies are usually able to find a solution within 8 to 48 hours.  © 2008 Rohas Nagpal. All rights reserved. 149 – Cyber Crime & Digital Evidence – Indian Perspective Scenario 2: A highly skilled programmer creates a new type or strain of virus. He does not release it on the Internet. Instead he sells it for a huge amount of money. The buyer uses the virus to target his rival company. Being a new virus, it may be undetected by the victim company’s anti-virus software and hence would be able to cause a lot of damage. Anti-virus companies may never get to know about the existence of the virus. – 150 –  © 2008 Rohas Nagpal. All rights reserved. Cyber Crime & Digital Evidence – Indian Perspective 3. 16 Web Defacement Website defacement is usually the substitution of the original home page of a website with another page (usually pornographic or defamatory in nature) by a hacker. Religious and government sites are regularly targeted by hackers in order to display political or religious beliefs. Disturbing images and offensive phrases might be displayed in the process, as well as a signature of sorts, to show who was responsible for the defacement. Websites are not only defaced for political reasons, many defacers do it just for the thrill. The scenario The homepage of a website is replaced with a pornographic or defamatory page. In case of Government websites, this is most commonly done on symbolic days (e. g. the Independence day of the country). The law Sections 43 and 66 of Information Technology Act [In some cases section 67 and 70 may also apply]. Who is liable? The person who defaces the website. The motive Thrill or a perverse pleasure in inciting communal disharmony. Modus Operandi The defacer may exploit the vulnerabilities of the operating system or applications used to host the website. This will allow him to hack into the web server and change the home page and other pages. Alternatively he may launch a brute force or dictionary attack to obtain the administrator passwords for the website. He can then connect to the web server and change the webpages.  © 2008 Rohas Nagpal. All rights reserved. – 151 – www. asianlaws. org Head Office 6th Floor, Pride Senate, Behind Indiabulls Mega Store, Senapati Bapat Road, Pune – 411016. India Contact Numbers +91-20-25667148 +91-20-40033365 +91-20-64000000 +91-20-64006464 Email: [email  protected] org URL: www. asianlaws. org

Tuesday, January 7, 2020

Bullying Scandal From The Air Force Academy - 1906 Words

The Air Force Academy investigated yet another cheating scandal. This case showed that some cadets copied portions of a chemistry lab assignment and it is believed that 40 freshman cadets were involved. With this being the 4 cheating scandal from the Air Force Academy, their academic integrity has lost its importance. Not only do they not know how to stop the cadets from cheating but when they catch the cadets, consequences are lessened which should not be happening. The Christian Science Monitor reveals â€Å"Cadets who break the code can be expelled, but the Colorado Springs Gazette reports freshmen violators are generally treated more leniently under current rules. They can be placed on honor probation instead.† (Associated Press, 2014). Placing cadets on probation is reducing the punishment and also not getting the message across. When reducing punishments on cheating, it sends the students a message that cheating is not a big deal. With cheating scandals becoming a reocc urring problem across the country, several states are rushing to put into place new testing etiquette before classes resume. In New York Education Commissioner, John B. King Jr., fabricated a task force last month to review all characteristics of student assessments. The Commissioner will be broadcasting a series of procedures to guarantee the integrity of our testing system before our students return to school in September. Specific measures haven t been announced, but state officials said they wantShow MoreRelatedHazing Essay1484 Words   |  6 Pagesactivities that result in physical, psychological, and/or emotional harm† (Finley, 2011, p. 225). As noted, these unfriendly acts may sometimes be cruel jokes that sometimes lead to more serious injuries even death. Hazing dates back to Plato’s academy in 387 B.C. and it was known as pennalism. Plato associated hazing acts to those of wild animals and criticized the â€Å"practical jokes played by unruly young men that injured the hazed and citizens who go in the way† (Nuwer, 1999, p. 92). In AmericaRead MoreMahfuz7742 Words   |  31 PagesSPOTLIGHT ON HBR AT 90 Spotlight About the Spotlight Artist Each month we illustrate our Spotlight package with a series of works from an accomplished artist. We hope that the lively and cerebral creations of these photographers, painters, and installation artists will infuse our pages with additional energy and intelligence to amplify what are often complex and abstract concepts. This month we showcase the â€Å"rayographs† of Man Ray, the modernist giant. Born in PhiladelphiaRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages10.5/12 ITC New Baskerville Std Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Copyright  © 2013, 2011, 2009, 2007, 2005 by Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrievalRead MoreAutobilography of Zlatan Ibrahimovic116934 Words   |  468 Pagesbut I sensed something else behind his words. Kind of: don t think you re so special. I had already at that point understood that Barca is like a school. The players were all nice, nothing wrong with them, and there was Maxwell, my old friend from Ajax and Inter. But honestly, none of the guys acted like superstars, and I thought that was odd. Messi, Xavi, Iniesta, the whole gang, was like school kids. The world s best players stood there nodding, and I couldn t understand that. It was ridiculousRead MoreTeaching Notes Robert Grant - Strategy 4th Edition51665 Words   |  207 PagesJanuary 2001 77 9 Online Broking Strategies: Merrill Lynch, Charles Schwab and E*Trade 83 10 11 12 Emi and the CT Scanner [A] [B] 88 Rivalry in Video Games 98 Birds Eye and the UK Frozen Food Industry 109 1 CONTENTS 13 14 15 16 Euro Disney: From Dream to Nightmare, 1987–94 116 Richard Branson and the Virgin Group of Companies in 2002 125 General Electric: Life After Jack 131 AES Corporation: Rewriting the Rules of Management 139 2 Introduction This new edition of Cases in ContemporaryRead MoreOrganisational Theory230255 Words   |  922 Pagesdilemmas. The book engages in an imaginative way with a wealth of organizational concepts and theories as well as provides insightful examples from the practical world of organizations. The authors’ sound scholarship and transparent style of writing set the book apart, making it an ingenious read which invites reflexivity, criticalness and plurality of opinion from the audience. This is a book that will become a classic in organization studies. Mihaela L. Kelemen, Professor of Management Studies, KeeleRead MoreHbr When Your Core Business Is Dying74686 Words   |  299 Pagesmay be hidden right under your nose. Here’s how to evaluate your current core and where to look for a new one. 78 Promise-Based Management: The Essence of Execution Donald N. Sull and Charles Spinosa The most vexing leadership challenges stem from broken or poorly crafted commitments between employees and colleagues, customers, or other stakeholders. To overcome such problems and foster a productive, reliable workforce, managers must cultivate and coordinate promises in a systematic way. 66 Read MoreFundamentals of Hrm263904 Words   |  1056 Pagessave money From multiple study paths, to self-assessment, to a wealth of interactive visual and audio resources, WileyPLUS gives you everything you need to personalize the teaching and learning experience.  » F i n d o u t h ow t o M A K E I T YO U R S  » www.wileyplus.com ALL THE HELP, RESOURCES, AND PERSONAL SUPPORT YOU AND YOUR STUDENTS NEED! 2-Minute Tutorials and all of the resources you your students need to get started www.wileyplus.com/firstday Student support from an experienced