Sunday, March 31, 2019

Major Characteristics Of Qualitative Research

Major Characteristics Of Qualitative ResearchCHAPTER 3RESEARCH METHODOLOGY3.0 IntroductionIn this chapter, look intoer testament explain in detail on how the seek allow be conducted. This includes the research design chosen by the tec, the research procedures, ingest selection, rules of gathering selective information, and systems of info abbreviation utilize. In explaining the methods and procedures employed, the police detective in addition explains the rationale for choosing the particular methods and procedures conducted in this research.3.1 Research DesignPatton (1990) in Fraenkel and Wallen (2006) described angiotensin-converting enzyme of the major(ip) characteristics of soft research is design flexibility where they suggested that a qualitative research should parry from stick on a rigid designs or blot so that the situation mint be understood in-depth. They also recommended a qualitative research should pursue new paths of discovery that suits with the inv estigator interest. From his possess meter reading and opinion, the research worker would like to define qualitative research as a typewrite of scientific research. It is beca determination generally scientific research consists of a straitlaced investigation that seeks for reactions to a question dustatically by designs a predefined tidy sum of procedures. In send to answer the questions, police detective collects evidence and produces findings that were not compulsive in advance and that ar applic qualified beyond the immediate boundaries of the larn.thusly to show pop his research qualitatively, the investigator would like to use scale rent as the method for the research worker to conduct this research. Case memorise is 1 of methods to conduct qualitative research where Robert Stake (1997) defines a plate as a bounded system as it tells a allegory ab come forward a bounded system. A system refers to a prune of interrelated elements that atomic number 1 8 wholesome while bounded outlines the boundary of the system (Holmes et al, 2008). barely the tec himself need to de experimental conditionine the case first and posterior the tec will uses various selective information collection techniques such as wonders, comment through literature, and relevant documentary compendium to carry out a holistic study of the entity. By using case study, the research worker will in truth attempt to investigate the comp whiznts or parts that pay back up the system to see how they operate. By refer to this research the researcher will investigate the lore syllabus of Steiner Waldorf education as he will equation the plan with Malaysian science curriculum.At one hand, the researcher will look at the important components of curriculum of twain Malaysian and Steiner Waldorf education. On the other hand the researcher will compare some(prenominal) curriculums in order to look at the strength and the weaknesses in Malaysian science curriculu m as compared to Steiner Waldorfs. Hence, the researcher believes that the researcher will experience the personal contact and sharpness as tumesce as holistic offices on both curriculums by using case study and comparative analytic thinking.3.2 Research MethodsAccording to Fraenkel and Wallen (2006) qualitative research employed trio main techniques to collect and analyze data which are observing plenty and classroom, interviewing the subject as wholesome as analyzing documents or other forms of communication. in that locationfore for the data collection the researcher employed the three contrastive methods that is to say observations, interviews, and document analyses. By employing more than one methods, the researcher believe it will help to triangulate the data, to provide multiple sources of evidence as well as to increase the validity and reliability of the findings of this research. Below here are the explanations on each method3.2.1 thoughtfulnesssObservation sa nctionedally conducted in order to investigate something that the researcher unfamiliar with. Because of that, certain kinds of research questions tail end outmatch be answered by observation (Fraenkel Wallen, 2006). According to Holmes et al (2008) observation lav be classified according to the role that the researcher plays. Fraenkel and Wallen (2006) suggested the same(p) and as followParticipant Observation, the researchers actually enrol in the situation or setting they are observing and when the researcher takes on the role of a complete thespian his identity is not known to the other members of the ag classify or other role that could be play by the researcher is as participant as observer. This is where the researcher participates completely in the activities of the throng being examine and on the same time revealing the base clearly that he is doing research.Non-participant Observation, sit on the sidelines where the researcher does not participate in the activ ity being observed or actually he is mediately complex with the situation being observed. There both roles that the researcher could play. First as observer as participant where the researcher direct identifies himself as researcher and do not have to pretend as a member of the particular group being studied. Second one the researcher could be complete observer which is totally contradicted with complete participant. The charge of the researcher may or may not, realize by the group because the researcher is actually observes the activities without any intention to participate.For this research, the observations carried out by the researcher were actually used both types of observation. In one situation the researcher plays his role as participant as observer and in yet, another situation, the role changed to observer as participant. The researcher adapted with the change of situation where it snarly time and purpose of the observation. For example when the researcher participa ted in the programs organised by the Steiner Waldorf department in Plymouth the researcher also carrying out his observation and informed the member of the group that he was carried out observation for his research. However during his visit to the Steiner school in Plymouth, he was no longer participant as observer instead, he was observer as participant where he observed the teaching and learning process, condition and environment of the school as well as the activities that the school had along that day.It was same with the observation carried out by the researcher in Malaysia. The researcher plays his role totally as observer as participant with the groups of students and teachers involved in this research. However when it involved with his personal experience as in-service teacher, he was actually a complete participant, where he observed the phenomenon occurred in the group that he studied without telling them the actual situation. But it was a very minor part from the observa tions that the researcher carried out.3.2.2 InterviewInterview is a common tool usually used in qualitative research. It is used by researcher to know and come across peoples experiences and their inner perceptions, attitudes, and feelings of reality (Zhang.Y, 2006). By referring to its bodily structure, interview can be divided into three categories unified interview, semi-structured interview, and ambiguous interview (Fontana Frey, 2005) and as in Frankael and Wallen (2006) the unstructured interview term is used as inner interview. coordinate interview is the interview that has a set of predefined questions and the questions asked to the respondent in the same manner. Structured interview is similar to survey and questionnaire except that it is conducted verbally rather than in writing.Semi-structured interview can best be described in ground of the flexibility in the interview process. Just like structured interview, this type of interview consists of a series of questio ns which designed to elicit specialized answer from respondent. However it usually more open-ended than questions in a structured interview but in the course of interview, interviewers has a flexibility to adapt the sequence of the questions to be asked and add questions base on the context of the conversations. slack interview as the term implies shows that the interview conducted is less formal as compared to structured or semi structured interview. It is also similar to a casual conversation and basically carried out to pursue the interests of both the researcher and the respondent in turn. This type of method is commonly used in qualitative research.For this research, the researcher carried out the three types of interview. Informal interviews were used by the researcher at the initial part of this research. The interviews were conducted on few teachers, lectures and students in the attempts to find out the paradox of Malaysian science curriculum. During his visit to Plymout h, the method changed to semi structured interview as the researcher hoped to gather as much information as possible to gain some insight about the Steiner education.The questions designed basically to help the researcher to submit the think answer from the respondents. Time is always being the limitation of any research. thus when the researcher traveled back to Malaysia, the researcher still hopes that he could get more information about science curriculum from the Steiner education. Therefore he conducted email interview with few Steiner teachers, lecturers and its ex-students. In the email the researcher explained shortly about research that he conducting as well as commandment how the respondent should answer the questions. The researcher classified the email interview method as structured interview in the sense that questions asked were fixed (in term of number) and no further probing were carried out. Email interviews conducted by the researcher as part of member check w hich is a term of method that use in qualitative research to verify what the researcher had understood based on the previous interviews, observations and document that he analyzed or as mean of validating via triangulation.3.2.3 Document/Content AnalysisIt is a technique that allow the researcher to study human behavior in an indirect way such as through an analysis of human communication, compose content of communication, textbook, essays, newspaper, journals, magazines, articles and others (Frankael Wallen, 2006). Content analysis also has been defined as a research method for the subjective interpretation of the content of text data through the systematic classification process (Hsieh Shannon, 2005) and also as an prelude of empirical, methodological controlled analysis of texts inwardly their context of communication (Mayring, 2000).Therefore in this research document refers to pen sources that the researcher have attained from the online sources (articles, reports and jo urnals) and other written sources such as books that explain about Steiner and Malaysian science curriculum. The documents gathered include official publications which discuss the aims and objectives of science education and other aspects of curriculum such as implementation, assessment and the performance. These different documents were analyzed and discussed in comparison to the findings gathered through observations and interviews carried out by the researcher previously.3.3 Research ProceduresSince this is a comparative study between 2 different curriculums, there are procedures that need to be carried out by the researcher in two different countries which is Malaysia and Britain. Therefore, the researcher will explain the procedures in number of different stages as detailed belowStage 1To identify the problem about the Malaysian science curriculum, the researcher had knowledgeable interviews with few of age(p) teachers and lectures with science education soil. Besides that the researcher also conducted few informal interviews with students in mainstream science class. The idea to compare the Malaysian and Steiner science curriculum actually came from colleagues who had general idea about the Steiner Waldorf education.Stage 2 (Initial Study)The researcher gathered information about Steiner education including the history, approaches and its curriculum as well as read about the research conducted on Steiner education. At the same time, the researcher also contacted the item of the Steiner Waldorf education in University of Plymouth and liaises with the Senior passenger car of the Industrial linkages of that university via email to establish rapport before the visit to Britain. Meantime, the Head of the Steiner Waldorf department helped the researcher to organize Steiner and science related programs for the researcher to find during the visit and one of which is a visit to a Steiner school in Plymouth.Stage 3Prior to conducting this research in the UK , the researcher required to obtain permissions from the following partiesThe Dean of Faculty of Education of University Teknologi Mara (UiTM) to obtain permission to submit the proposal to the UiTM International Linkages Centre (UiLC)The Head of UiLC for the encomium of the fund needed by the researcher to conduct this study in BritainThe Vice Chancellor of UiTM to obtain the approval for the researcher to conduct this study in Britain andThe Head of Steiner Waldorf segment in University of Plymouth for permission and to be involved in this research.Stage 4When in the UK, data was gathered or obtained through varying sources and methods as highlighted assistance earliest, namely subsequent fall in a week program organized by Steiner Waldorf Department in University of Plymouth. The program also involved a class of first family students who doing their Bachelor in Steiner EducationGroup interview with the few lectures and students from the Steiner Waldorf DepartmentInterview wi th the Head of Steiner Waldorf Department in University of PlymouthEducational visit to one Steiner school in Plymouth where interviews were carried out with a few teachers from different backgroundsObservation of one science lesson and one practical or experiment sitting andExchange of emails with the few science teachers, lecturers and students who graduated from Steiner schools.Stage 5 at once the intended data were obtained from the UK, this stage will more focusing on data analysis and to find more evidence to further arrest the earlier findings.Conducted email interview with few Steiner science teachers, lectures and ex-students.Doing analysis on documents about Steiner curriculum specifically on science.Conducted a group interview with students from 2 different schools in Petaling district.Analyzed data gathered.3.4 Sampling dodgingA sample in a research study is the undivided or group on which information is obtained (Fraenkel Wallen, 2006). Another opinion, a sample con sists of a group of individuals drawn from the population where the sample is actually a fraction from the whole population (Holmes et al, 2008). A group of sample can be very small or maybe quite spacious depending on the number of population as the sample drawn is actually supposed to represent the entire population. There are two major types of sampling which is probability sampling and non-probability sampling.For this research, the researcher chose goal-directed sampling and widget sampling when conduct this research. A convenience sample is group of individuals who (conveniently) are available for study while purposive sample is chose based on the researcher judgment where the sample is believed could give useful information for the research (Fraenkel Wallen, 2006). On the other perspectives, Holmes et al (2008) in his book stated that purposive sampling is a way where the researcher, in choosing sample, considers the subjects that belong to a specific group. Basically this method is appropriate for a topic that has not been studied much before while convenience sampling is a actor studying of whomever or whatever is available.In attempt to study on Malaysian and Steiner Waldorfs science curriculum, the researcher was actually blended the method in sampling. Even though the sample might involve personal networking of the researcher, there were few aspects that the researcher gave due consideration and judgment. That is why the researcher chose to use purposive and convenience sampling. In order to go out a phenomenon from perspective of participants, the researcher chose sample who gave more useful information. In addition, the researcher also look at the participation, willingness and cooperation of the sample to involves with the research so that it will do much easier for the researcher.3.5 Sample3.5.1 Sample for Malaysian Science CurriculumThe samples that the researcher chose to gather useful information regarding Malaysian science curriculum can be divided into three categories, namely as expert (lecturer with science education background), practitioner (teacher) and students.3.5.2 Sample for Steiner Waldorf science curriculumThe samples that the researcher chose to understand about Steiner Waldorf education and its science curriculum also can be divided into three categories, namely as expert (lecturers with Steiner education background and Steiner science education background), practitioner (teacher) and students.3.6 Data AnalysisData analysis is one of the important parts in any research. It requires systematic procedures to mold the data gathered and the ability to analysis the data critically and thoroughly. However, to carry out the analysis, researcher will use the research questions and research objectives that constructed earlier as the guide. He believes that, it will help the researcher to shows the right worry of the exploration of the data.As the researcher employed observations, interviews and document a nalysis as the methods to gather the data, each method will undergo different levels of analysis at one point and later will be feature as a rich data that will be able to answer the research questions. Any notes that made by the researcher during his observations, informal interviews, transcript of email interviews, videos recorded, journals, and any publications related were organized accordingly into its own category.Next, the data were analyzed in order for the researcher to look at any existing patterns or themes and help the researcher to identify basic features of the data. This will help the researcher to develop and document a database structure and on the same time to describe about the data extensively by using qualitative software. The software will allow the researcher to code, retrieve and analyze data which could make the rich data rick more organized and useful.3.7 SummaryThe framework of this research took place within qualitative procedures since the aim of this research is compare the Malaysian and Steiner Waldorf science curriculum. Interviews conducted with the teachers, lectures and students from both systems as well as the observation that the researcher carried out in Malaysia and Britain were the main research tools. The information gathered was supported by the analysis of documents such as journals, articles, official publications and several ministry documents related to science education. The data transcribed with the aid of qualitative data analysis software helped the researcher to come out with the findings of the research.

FDI and Balance of Payment Relationship in Canada

FDI and Balance of Payment Relationship in CanadaChapter One basisHistory of FDI outside(prenominal) enthronization was very common in the former(a) ni bring ineenth century. It was a st come outgy from British to contri scarcee fund for stinting development in opposite farming, as well as to crystalize ownership of mvirtuosotary pluss. Godley 1999 menti id in his reoceanrch that the bulk of FDI that was based on British manu pointuring labor before 1890 was in industrial goods sector. He withal mentions that most investors failed as a go away of narrow strain and their major anxiety his to manipulate up British commercialise. Singer Manufacturing Comp whatsoever was an exception payable to its commitment to FDI and being the head start biggest and new Multi case Corporation in the world (Moosa, 2002).During the era of inter state of war in the twentieth century, FDI declined and later rose that thither was an astonished development in that time termi land, Br itish status was helpless as a world creditor, and USA became the scotchal and monetary cater and FDI was party favoured by USA tax law. After the world war, FDI increased as a get out of two reasons kickoffly, good technology in the cranial orbit of communication and transportation that eliminate distance barrier. Secondly, the need of reconstruction of war damages by European countries and rest of the rich acres slightly the world. (Moosa, 2002).In the 1980s, thither was a decline in FDI ( external). This was imputable to the fact that most entertain countries started resisting U.S control and ownership of field of study loadeds. Also, waiter countries cured by initiating FDI in USA which affect US net inf down in the mouth. In the 1970s, there was a big declension in the U.S FDI exclusively British was back to FDI business as a military issue of North sea oil boom and the abolition of unusual exchange controls in 1979. In 1980s, changes in FDI occurred in which USA became a net debtor nation and major recipient of FDI with an inauspicious net internationalistic business office. This was ca utilise by dispraise of U.S dollar, restrictive bargain policy and low saving rate in U.S miserliness. This disenabled the U.S in financing its own enthronement funds in its frugality, giving nip and tuck to take of FDI from separate nations like Germ whatsoever and Japan. Also, in the 1980s Japan became a major supplier of FDI to U.S.A, Europe and South East of Asia. Most countries compensate Japanese investors because of its provision of bodacious promote. The revolution of FDI in the 80s can be attri just nowed to globalization. (Moosa, 2002).In the 1990s, there was reasonable improvement in the investment modality which exposed most countries to the benefits of FDI. Some of the reasons that led to the improvement FDI of be remotion of FDI obstacles, changes in attitude and increases in FDI intensive. The removal of local hindr ances through de regulating and privatization was favourable to FDI. Another remarkable thing that happened in the 1990s was the f solely in the conditional relationance of Japan as a front set-back of FDI. This caused economic doom in Japanese sparing. Finally, FDI has gone through many reforms from countries to countries, in the late 90s, the number of treaties for the dodge of double tax reached a arrive of 1871. In 1998 and 1999 any(prenominal) measures like nurseion, liberalization and promotion was brought in by the emcee nation (policies) on FDI. (Moosa, 2002).Globally, the economic development of deeper and to a greater extent sophisticated internal and international financial grocery, improvements in tuition profit and technological advancement support made contribution to sound financial and economic integration. For a nation to partake in any of the economic gains arising from these processes it need to fool reform policies to improve efficiency.Most countr ies advocate FDI to push economic development because of its in form move in the swarm delivery due to increase in competition, technical know-how and technological spill- all over via multinational corporations to domesticated help firms. Gorg and Greenway (2002, stated in Morris 2008, p.4) that a possible channel is one in which domestic firms are thought to imitate the technology used by the companies. This leave behind endpoint to cave in ways of local firms of do their intersection pointion. Competition is other compulsive force of FDI. The entry of foreign companies compels the domestic ones to be much efficient in all ramifications. The latter(prenominal) gains better skill exit from employee training through new improved technology requirement in the achievement process. (Morris 2008).FDI helps local firm to bypass organisation bureaucracy, trainheadedity and financial obstacles encountered in the host economy. International organisations always recomme nd that less create countries rely importantly on FDI as a source of external finance. Hericourt Poncet (2008, p.1) confirm that the development of cross border gay relationship with foreign countries help private domestics firms to bypass both the financial and legal obstacles that they face at kinfolkAt the same time, many whitethorn not be pleased with the policies that progress FDI which might be unfavourable to host economy since foreigners will have percentage in domestic economic activity. According to Holden (2007), there was an argument that foreign-controlled investments whitethorn be twine and not act in the best interest of locals and nationals that profit may be exported out of the rural plain and that foreign ownership could have national security implications in situation where industries or products are of strategic instantance. These concern links to energy and natural resource sector. The concerns may lead to countries to swan restriction on investm ent in sector that involves strategic importance.Canadian Chamber of Commerce had an annual general meeting in 2007. A resolution was passed Attracting FDI to Canada, among the issues discussed in the meeting was an advise for Canadian government to adopt policies that encourage foreign investor to Canada, even though nearly call for tighter restrictions for FDI due to its demerits (Morris, 2008).Canada was among the countries that provided a shield for his economy with the provision of 1985 investment Canada Act. This Act states that any proposed foreign direct investment above a certain tally is subject to review and approval from the industry Minister. For the proposed investment to be approved, it moldiness demonstrate that its proposed investment provide a net benefit to Canada, some of the things the industry Minister will consider are employment, investment in Canada to struggle in the world foodstuff, the compatibility of the investment with national industrial, economi c and heathen policies and many others (Holden, 2007).Using Canada (a acres that has benefited from FDI in all ramifications from the perspective of large economics take aim down to the micro level, from one sector to another sector) as a case say. It is obvious that Canada has gained so much in FDI both in forward linkages and backward linkages. According to the Daily (May 6, 2008), the pedigree of FDI in Canada sky rocketed in the in conclusion eight years, and the sector that had the biggest share were the resource based industries.The Canadian Chamber of Commerce Annual commonplace Meeting (2007) passed a resolution titled Attracting foreign Direct Investment to Canada. The meeting called for the Canadian government to send a clear and positive message to foreign investors that Canada wants inbound investment through a proactive investment scheme and promotion champagne (Morris, 2008).AimMost foregoing studies focused on the role of FDI on economic harvest-time but t heir findings shows that FDI is not significant to economics growth. Carkovic and Levine (2002), prove that FDI does not self-sufficiently decide on economic growth. However, economic growth and balance of payment (BOP) as a macro-economic objectives of any rational nation, in which there is sort of tradeoff in both objectives.(this will be justify in the literature review section ).(pass et al. 1995). Countries calls for FDI coming between the two objectives as ensue nation rationale of protectionism ( quotas ,high import duties and embargo) to resolve balance of payment conundrum, and to compass import substitution and export promotion agenda. Keynesian economic growth feign, which is measured with Gross Domestic Product (GDP), have many factor such(prenominal) as government expenditure, consumption level, investment, and export minus import (BOP current account). Changes in any of these components will have multiplier prepare on the economic growth. (Moosa, 2002). FDI w ill have direct effect on host nations balance of payment which will indirectly impact the host body politic growth. The question being asked in this question is there any relationship between FDI and BOP? The purpose of this dissertation is to ready the relationship between FDI and Balance of Payment in Canada over the period of 1990 to 2008. This aim will be achieve by construct a model to explain the casual relationship between dependent variable and independent variables to figure out the relationship between FDI and BOP. Also, hypothesis will be formulated to test some of the objectives of the study. Robin says in Saunders (2007) that with deductive research its necessary to deduct a hypothesis. The study explores six possible issuesObjectivesTo determine the proportion of Canadian Capital account explained by growth in FDI in Canada over the period of 1990 to 2008.To determine the proportion of Canadian present-day(prenominal) account explained by growth in FDI in Canada over the period of 1990 to 2008.To determine the proportion of Canadian Import explained by growth in FDI in Canada over the period of 1990 to 2008.To determine the proportion of Canadian trade explained by growth in FDI in Canada over the period of 1990 to 2008.To image the relationship between Canadian FDI and Canadian BOP over the period of 1990 to 2008.To examine the major (countries) contributor to Canadian FDI over the period of 1990 to 2008. earthshaking of the studyThe significant of this study is to know the role of FDI in achieving one of the macro economic objective. This to ascertain if FDI will affect BOP in Canada positively or prejudicially. If the effect is positive, there will be needs of improving scope or magnitude for FDI in Canada for the future .However if it is negative there may needs for government policies to restrict the inflow of FDI to Canada so as to achieve a favourable bop.The consecutive chapters will social system in the following ways chapter two discusses the conjectural background information related to FDI, chapter three examines the academic literature relevant to the topic and too describes the methodology while chapter four presents the empirical compend and discusses the econometrics result. The concluding chapter provides a conclusion of the research work.Chapter twoLiterature ReviewTheoretical terra firma(Moosa,2002) defines Foreign Direct Investment (FDI) as the process whereby residence of a farming (the source country) acquire ownership of asset for the purpose of peremptory the production, distribution and other activities of a firm in another country (the host country). It involves the transfer of financial capital, technology and other skills such as managerial, marketing, accountancy, and so on. International pecuniary Funds Balance of Payment manual defines FDI as an investment that is made to get a long unrelenting interest in a organisation operating in an economy difference the investor.(Canad a Statistics, 2008) defines FDI as a component of a nations international investment position which explains a countrys investment position the difference between entirety financial assets and aggregate financial liabilities. Direct investment, portfolio investment and other investment are the component of financial asset and financial liabilities. (Frankel and Romer, 1999) describe FDI as one of the crucial catalysts for economic growth in a nation especially in less developed countries. This statement describes the significance of FDI to a nation.FDI can also be descri crinkle as a keep fraternity from one country making physical investment into building a factory in another country. It is the establishment of an enterprise by a foreigner. (UNCTAD, 2002) defines FDI as investment made to acquire lasting interest in enterprise operating outside the investors economy. In short, a business or firm that undertake FDI become a multinational national company (MNCs) because of it abil ity to own many subsidiaries in many foreign countries. Foreign Direct investment (FDI) plays a crucial role in any host economy in the aspect of economic prosperity and building wealth. It also leads to increase in capital flow and, highly consummate human power, and reduction in unemployment and meaning of advanced equipment and technology to enhance output level. This has a direct impact on the nations gross domestic product by promoting economic development. Mutenyo (2008), express most less developed countries now adopt policies that encourage FDI. Among these policies are privatization, trade and exchange rate liberalization, and, tax rebate and fillips for foreign investors to enjoy the business surroundings.FDI is different from other components (such as international financial assets, portfolios and so on) of international investment. International Monetary Fund (IMF 2003, p.6) define FDI as a category of international investment that reflects the objective of a reside nt in one economy (the direct investor) obtaining a lasting interest in an enterprise resident in another country (p.6). IMF further explained that a direct investment is formal when a foreign investor has more than 10% ordinary share or voting right of a host country enterprise (IMF 2003, p6-7). In Canada, direct investment is measured as the total foster of equity, net long-term claims and net short-term claims held by the enterprises border (Canada Statistics, 2008). FDI has been increasing globally over the last two decades. Especially in the 90s, FDI increased more than the world economic growth. According to United Nations Conference on administer and Development (UNCTAD) data collection pertaining to FDI regulations in 1991, it shows that between January 1991 and December 2002, total of over 1600 measures were introduced by 165 countries more that 90% of them was in favour of FDI in terms of changes the character of the introduced measures ranging from security for investo rs, to liberalization of rules governing the inflow of foreign investors, to measures that are promotional in nature(UNCTAD, 2003). The measures were extended to the international level through double taxation treaties (DTT) and bilateral investment treaties (BIT).Over the last four decades, FDI have gone through series of transformation in Canada. Gellaty 2006 (in Morris, 2008, p6) explained the reason for the emergence of the Foreign Investment Review Agency (FIRA). overdue to growing concern of FDI in the late 1960s and early 1970s, the Foreign Investment Review Agency (FIRA) was established to regulate and monitor FDI. The regulation governing FDI and FIRA was replaced with Investment Canada in 1985. The regulation was aimed at protecting and promoting FDI in Canada. at that place was also an implementation of Canada-U.S Free Agreement (CUFTA) and North American Free Trade Agreement (NAFTA) to promote FDI further in Canada.FDI reckon to be a topic that covers both narrow and broader firmament. Feenstra (1999,quoted in Liebscher 2007, p.3) expresses FDI as the cabal of both international trade in goods and international financial flows, and as a phenomenon more complex than either international trade or international financial flow. From micro-economics perspective, FDI raises the issues of billet consideration and ownership. From the macro-economics angle, FDI considers the fear of unemployment and the termination of freedom. For Policy makers, FDI is an issue to balance the benefits of spillovers with growing concern of the public. The concern governing will be rational in policies that will favour FDI and all concern parties. FDI is one of the key features of the modern globalized world. According to (Peter 2008), most industrialists believed that there is international links in the late medieval and early modern era. They were also of the whimsey that multinational firms became crucial in numerous industries in the late nineteenth century but t he period since World contend II and in particular, since 1985 have seen an explosion in FDI both in relative and absolute terms to the levels of trade and gross domestic product.However, economic theory provides an extensive economics literature which was developed to investigate the causes, nature and consequences of FDI. One of the reasons for the creation of FDI is as a result of cheap court of production in the host economy. FDI occurs when the benefits of producing in a foreign market out weighs the cost of economic of scale from producing exclusively in the firms understructure plant (Neary 2008, p.13). This benefit can be explained by the concept of law of proximity concentration trade-off. That is foreign firms take advantage of trade off in production in home countries which will expose them to high export cost and international trade barriers relative to proximity to customer and low transportation cost. There are some conflicting predictions somewhat the effect of FDI on economic growth. Blomstrom and Kokako (1998, quoted in Mutenuyo 2008, p.3) explain that spillover occurs if the entrance of multinational enterprises (MNE) result to efficiency and productivity benefit to the domestic firms in the host country and MNE is not able to internalize the full value of these benefits. On the other hand, negative externalities exist if the activities of FDI result to loss in efficiency, productivity and advantageousness among the local firms and the alien investors do not compensate them for their loss. In a nutshell, FDI can be detrimental to an economy.MNE are assumed to compete favourably with the more advanced local firms since the local firms will have an environ over the foreign investors in local market share, skills, export contracts, tender relationship with suppliers and the customer and so on. On the other hand, the foreign firms may be more advance in technological know-how, research and development, and the financial resources for th eir home economy.(Hericourt and Poncet ,2009) confirms that the development of cross-border relationships with foreign companies helps private firms to bypass both the financial and legal hindrance that they face at home.Types of FDIThe types of FDI can be considered from forked angle from the perspective of foreign investor country and from the perspective of host country. Since the study is focused on Canada, FDI will be examined in both ways. There are three types of FDI- vertical, crosswise and conglomerate- from the perspective of the source nation (investors). perpendicular FDI (Hill,1998) provides a clear illustration of vertical FDI by dividing into two away vertical FDI and Backward vertical FDI. The former is applicable in a situation where a local firm invest into another industry abroad that sells the output product of the local firms production process, while the latter is used when the foreign sales of a firm provide inputs for the downstream operation of the local firms.Horizontal FDI is applicable when the goods bring ind in the host country are the same as in the home country for swimming expanding upon (Caves, 1971). (Hill,1998) defines it as firms invest in the same industry as the same operational activity in their homeland.Conglomerate FDI is the combination of horizontal and vertical FDI. That is, firm operating in separate business, (Luladhar 2008).FDI FROM THE ANGLE OF soldiery ECONOMYExport-increasing FDI is caused as a result of items produced in host country as an input for home country such as stinging material or mean(a) goods. This type of FDI will enhance the export of the host nation if there is high demand for the in the buff material or intermediate goods from the home country.Import- substituting FDI This type of FDI is applicable when the goods previously imported from the home country are now been produced from the host economy which will generate more employment .This is caused as a result of host government p olicy on trade barriers, market size, labour cost and so on.Government initiated FDI This is when the policy makers provide some incentive that attracts foreign investors into the host economy. This incentive could be tax holiday, tax brush aside and so on.The Determinant of FDI (Motives)There are four motives that determine FDI. These determinants provide reason why firms should use FDI to tap in business globalization. These motives are acquired inputs (raw material orientation), market orientation, cost orientation, and strategic asset seeking motives orientation. fresh Material Orientation According to Dunning (1993), availability of raw material is the bed rock of any firm, especially the manufacturing firms. Usually the cost of importing raw material from the source to where is needed is outrageous, even the duration cost of acquire the raw material to host firm is another visible problem that affects the overall performance of production. Therefore, it is more economical fo r firms to produce in an environment that has easy access to raw material.s (Atik et al., 2008).Market Orientation This is when firms produce goods in a host country sooner of shipping it directly from the home country. This occurs when foreign market is protected by the government restriction goods importation or high importation duties. It will cost less to produce in the host economy market to avoid international restriction and unnecessary cost. Market orientation draws foreign supplier closer to the buyers in the host economy. (Atik et al., 2008).Cost- Orientation Motive Cost minimization is one the firms strategy to optimize profit. Porter (1998, stated in Atik et al.2008, p 29) explains that among the generic strategies of a firm, cost leadership is the best strategy. In cost leadership strategy, a firm will cull to become the lower cost producer in its industry. So firm prefer to site their location where they will enjoy the lower cost of factors of production. Good examp les of this firm from developed nation prefer to locate their firms in less developed nation because of cheap labour and other cost of production.addition Seeking FDI Foreign firms prefer to have access to gain industrial asset in host country which will more profitable to have in there home country. The foreign firm will sustains or advance its international combativeness, technological advancement, and opening up the new market though its asset accusation from the host nation (Atik et al., 2008). There fore, a firm that owes foreign asset is better positioned in global market competition compare to its counterpart.Theories of FDIMost literature reveals why investors prefer to produce abroad rather of staying in the home country. Dunning 2003 p.278) assert that the growth of existing foreign value activities in avail might require a different set of explanations than to follow initial decision to invest abroad. There are some theories that explain FDI and MNEs in global busines s especially in goods sector.(Helldin ,2007) is of the panorama that FDI theory is fragmented and consists of various economic theories. There are no complete theories that explain FDI it was just the bits by bits from numerous authors. Hymer was one of the first authors to explain the theory of FDI in 1960(mention in Na, Lv Ligthfoot, 2006). Hymer believes that the multinational national companies (MNCs) have the potential to expand the business due their oligopolistic nature. He said MNCs have firm particularized advantages that create market power on global market due to their technical know-how, product differentiation, RD and so on.Dunnings discriminating Paradigm (Professor John H. Dunnings 1977 OLI-framework also called Dunnings eclectic paradigm)Dunning 1977,Helldin 2007, p8), explains that the three factors that constitute to MNEs location in host country. These factors are Ownership Specific prefer (O), Location-Specific Advantage (L) and Internalization Advantage (I) . Ownership ad hoc are business advantages such as capital, advance technology, well known brand names and product with dominant standard (p8). It further explained that the higher the level of business competitive advantage are compare to foreign competitors on a specific location the more the business will be involved in foreign production. Location will also be based on the countries competitive advantage, originated in the partners home countries (Helldin, 2007). Ekstrom (1998 stated in Helldin 2007) is of the opinion that the combination of O with L is why a specific location is chosen to make FDI. The third (internalization) advantage is meeting demands on global market by trading. (Dunning 1977, Helldin 2007, p8).Ownership Specific Advantage (O) MNEs enjoys business advantage in some area such as size, established position, and monopoly power. MNEs also have some specific advantage in some business area such as capital, advance technology, research and development, highly s killed human capital, trade marks, receipt of government grant and property right over intellectual property (Bennett, 1999).Location Hypothesis (L)This hypothesis explains the existence of FDI which is a result of international immobility of factors of production labour, natural resources and weather. The immobility factors result to location-related differences in the cost of production. Horst (1972b, quote in Moosa, 2002, p.33) used this hypothesis to explain US FDI in Canada. Most MNEs prefer to locate their production facilities in an area where there is cheap labour. Lucas (1993) proves that there is inverse relationship between FDI and wages. He explained that a rise in wages in the host economy will increase the cost of production and have ill effect on production and FDI. This will shift the host economy from labour incentive to capital incentive and will also encourage FDI Lucas (1993).The advantages of location specific (L) include low transport cost, low leveraging inp ut, economics of large scale, good communication, low labour cost, near to market advantage, availability of local business support ( market research firm) and the avoidance of trade restriction (artificial barriers) impose by host nation to cut back import (Bennett, 1999).Internalization HypothesisInternalization hypothesis explains that FDI arises due to the impact of MNEs. MNEs is established to replace market (external) transaction with internal transaction. Coase (1973, says in Moosa, 2002) is of the opinion that market cost can be saved by forming a firm (p, 32). He gave an example of bottleneck encountered in purchasing oil product while compelling a firm to buy a refinery. These problems are caused by market failure and imperfection in intermediate goods, including technical know how, marketing and management enterprises (Moosa, 2002). MNEs invest in host countries in order to boycott expensive suppliers and distributors. Foreign government import restrictions will be avoid ed through local subsidy rather than exporting direct. Also the marketing aspect will be managed and controlled by the producing firm there will be no intermediate sales or Value Added tax (Bennett, 1999). According to Dunning (2003), internalization incentive advantages are to protect or exploit market failure (p.99).The Product Cycle openingThe theory was invented by Vernon in 1966. This theory explains the competitive advantage have by MNEs or potential MNEs originated in a country instead of another. The competitive advantage move from a stage of local production in home market, to exportation, and then to FDI (Dunning 2003). His theory was a based on U.S. directs investment in import substitution producing activities standards and economics structure. Also the ownership advantages of firms that produces or supplies a product had a little say about the advantages of common governance (Dunning, 2003). The theory is more useful in analysis of MNEs in FDI activities such as capi tal exportation, supporters activities, inward outward investment and so on.Core Asset TheoryCore Asset Theory was propounded by Hymer in 1976. Dunning said the theory explains the territorial expansion of a firm in terms of its exclusive or internal possession of intangible assets, which it perceived could be utilized in a foreign country Dunning (2003, p.279). Several writers have to identify which O specific right were the most significant in determining the ability of MNEs to compete in foreign market. The theory examines the role of Foreign Service firms in market seeking sector, which is different from Product Cycle Theory focus on resources based industries or manufacturing sector. Also the theory was less implicated with where firms or MNES are located. According to Dunning (2003), the theory underestimates the important of the organizational chemical mechanism by which the competitive advantage (Product Cycle Theory) is exploited (Dunning, 2003). The theory is tramme l to FDI or MNEs in technological advancement ,RD, position, product quality and so on, but it just examines the growth in foreign firms in global oriented and integrated service industries (Dunning ,2003).Strategy Related the TheoriesKnickerbocker, in 1973, was the first person to examine the strategy of MNEs. His analysis was that MNEs activities will be a function of high seller concentration. Dunning (2003) stated that Knickerbocker hypothesized that MNE activity would tend to be concentrated in industries characterized by high seller concentration, and that firms in those industries will engage in follow my leader tactics in the clock of their foreign investments, to protect or advanced their global competitive position (Dunning, 2003, p.280). Most studies on MNEs, the area of extraction, manufacturing and the likes was in support of this theory but the theory was less relevant in foreign firms activities in service industries because of its less oligopolistic nature (Dunning, 2003). However, these theory was fragile in MNEs with high level of diversification since one of the main aims of MNEs is expansion and diversify in area like service sector which may be outside their main activities which will create problem for the theory.The Risk Diversification HypothesisThe theoretical background of this hypothesis can be traced back to the theory of portfolio extract by Markowitz (1959) and Tobin (1958). The chance diversification hypothesis was propounded by Grubelin in 1968, but the idea was revisited and made known by Rugman in 1979. The hypothesis was that MNEs reduces the portfolio risk by diversification, which is investment in foreign assets that usually consist of service industries like banking, insurance, communication and so on. Most construction firm may want to make their working capital active by get financial assets (Dunning, 2003). This kind of investment is not capital intensive.The Aliber ThesisAlibers (1970 1971, quoted in Dunning, 2003, p.280) seek to determine why firms pay their foreign assets in local currencies when they produce abroad. The theory explains that foreign firms take advantage of the home stronger currency to acquire ownership of assets in host economy due to their dim currency. Albert also argues that fluctuation in foreign exchange market that result to undervaluation or overvaluat

Saturday, March 30, 2019

Statistics and Overview of Phishing Attacks

Statistics and Overview of Phishing fill outsMansour AljedaniIs a melodic line of criminal conduct which constitutes a growing threat to implementrs financial institutions, and businesses, net social occasionrs and mixer media. Beca intent it does not appear that the risks and damage to phishing in decline in but on the contrary it is becoming increasingly complex, the implementation of the law of nature and government agencies and the private sector at the global level it has to bushel together in their efforts to combat phishing.Where the advent of the Internet and expansion in the calculating machine-based employ science in the modern days the number of Internet users has amplificationd in the past few socio-economic classs and this means the threats we argon going to calculate them they grown. Development of means of computer taxis day after day, to deceive others in order to obtain their password or any sensitive data one of the most important of these jobs i s spreadhead recently across mixer media ranks and electronic harness known as (Phishing aggress). Phishing in addition it called electronic humbug, it means the soulfulness or spoofing, cheating the alliance by engineering an netmail core claiming to be from the regular company cared to the recipients of the means to the company, and asks him to get few face-to-face discipline much(prenominal) as bound betancy details, Passwords, commendation poster details 1.These are some of the institutions and companies that are struggling circle all over the world, Anti-Phishing Working Group (APWG), China Internet lucre Information Center (CNNIC),Anti-Phishing Alliance of China (APAC) and private sources across the world. My opinion, Is a person or deception, cheating the company by sending an e-mail mental object claiming that it is a regular company linked to the recipients of the letter to the company, and asks him to get some personal tuition such as strand ac count details, passwords and credit card detail hard-boiledc. This is done in several(prenominal) tracks, most notably the demand to respond to the message, or put a link in the message to varlet a fake, and then uses the information to access to bank accounts over the Internet, or access to corporate sites that request personal data to al gloomy access to the site.Anti-Phishing system issued a number of quantifys close to the ack-ack gun on the computers of users of Kaspersky Lab program has been a number of attacks in 2016 32,363,492 times, which is 2.6 million less than the previous quarter. Overall 8.7% of the attacked Kaspersky Lab users by phishers in 2016 2.2.1. Geography OF attacksMost of the country that may be affected by the attacks on users in 2016 are China and the percentage of those who attacked by (20.22%) 2. come across 1Geography of phishing attacksThe number of users that have been employed on the anti-phishing system and the photo shows the make out number of users of Kaspersky Lab in the country. The proportion of the attack in brazil-nut tree told by a 2.87 18.63% supplied to Brazil in second perspective in the standings. And it finished tercet in the State of Algeria (14.3%) after a 2.92 increase in their share from the previous quarter.The number of attacks in Russia to 7.74% in the third quarter and 7.16%, followed by Canada, the United States 6.56% and the United Kingdom 6.42% 2.2.2. TOP 3 attacked organizationsThe fraudsters focus on the most popular sites, to increase their chances of a do phishing attack. Many of half of all undiscovered element Kaspersky Lab heuristic rule anti-phishing is a phishing pages hiding behind less than 15 company call 2.2.3. Proportion of spam in tele go traffic in 2015In 2015, the proportion of spam in e-mail traffic 55.28%, which is 11.48Lower than a year earlier percentage points 3. show 2 the proportion of spam in email traffic, 2015In the first months of the beginning of the 2015 drop was recorded, 61.68% in January to 53.63% in April.2.4. Sources of spam by country in 2015There was a brush aside win over to the top three spam sources, in 2015 China has been low since the issuance of the decision of non-spam messages in which the proportion of the country published by 0.59 percentage points China dropped to fourth place at the rate of (6.12%). Vietnam rank third by (6.13%), and got a 1.92 percentage points. Russia remained in second place by (6.15%) and an increase of 0.22 percentage points. The United States got in the first place, and maintain by arrangement (15.16%), despite a decline of 1.5 percentage points 3.Figure 3 Sources of spam by country2.5. The size of spam emails in 2015Figure 4 The size of spam emails in 2015In 2015 e-mail messages is desired proportion (less than 2 kilobytes), and averaged 77.26%, while the e-mail messages to the size 2-5 KB decreased to 9.08% 3.It supports the use of phishing e-mails behaveing false links to websites aim to get cyberspace user information, but in the recent years, phishing process has evolved to include sweet techniques to gain access to dupes, these are some of them-3.1. Clone PhishingIn this genre, the grifter constructing electronic mail or reproduced link from email legitimate, and within the email are replaced by the link with malicious copy and then send it via e-mail spoofed so that it appears its coming from the same transmitter, it does so to get the personal information from the victim. It may claim to be a re-send of the original or an updated version to the original 4.3.2. Spear PhishingIt is a type phishing is it carefully and modulate prior these people. Usually the victim is a company or convocation of dignitaries. Worksite looked homogeneous 100% commercial site and be content page request information or enter data update or add a credit card, and sends the message exactly similar to the messages the company or organization and be content in the request on the l ink to update the data 4.Figure 5 Clone PhishingThe envision that is shown higher up is rationalizeing for Prankster fraud link.4.1. Email SpoofingIt is that the scammer claims to be a legitimate sender, sends a message makes victims believed in the instructions for taking the sprint used deceptively sends e-mail message fake with a truthful change of legitimate e-mail in order to trick recipients. Where fraud Email Sender because it did not contain because of Simple trip out manoeuver Protocol (SMTP) 4.4.2. entanglement SpoofingCan cheater set up a Web site that looks similar to a legitimate site, and similarly makes the victim believe this is the site and this makes the victim enter passwords and personal information the goes into the prankster 4.4.2.1. How attack worksThe attacker failed continent goes process, be amid the Web and the victim and had the nickname of this type (man in the middle attack) in information trade valueion. However, the victim requested acces s to the site finished a browser on the Internet, such as Google Chrome or Firefox etc. by typing the predict URL, for example, (www.yahoo.com) the first part of a www and resolve II DNS (yahoo.com). Also in addition to that when he enters the victim to the site asks your browser commonly used DNS to determine IP delivery of the legions (www) in the field (yahoo.com). The first trick is do it scammer alternatively of the real Web server, for example, the title of real URL is http//www.yahoo.com and the scammer rewrites call off URL to add http//www.Phisheing.com to the front part URL http//www.Phisheing.com http//www.yahoo.com and the victim ordain signify that the browser (Phisheing.com) is a web server and then go away ask for it 5. See fig 6 for more details.Figure 6 Web Spoofing4.3. DNS Cache PoisoningDNS memory cache poisoning is a way to feed the local DNS cache of replacement of the incorrect records works DNS through UDP and easy to spoof the source address of the UDP packet 6. The hacker change the real IP for the IP address it on its own DNS address 6.4.3.1. How attack worksThe hacker amendment cache server DNS to IP address fake. When catching the victim wants to get to (www.bing.com), the browser provide ask DNS cache to providing IP address. Here it will be IP address leads to the victim the fake website that is provided by the hacker to purloin information from the victim. This type is ordinarily when hacker attacks DNS server and modify IP address. More is known rough these cause problems and called the attack (Pharming).Figure 7 DNS Cache PoisoningThe hacker attacks the DNS server for modification the ligament IP address to his IP address, which gives him to steal information from the victims.5.1. Phishing Attack on FacebookHas been detected by some information security experts say there are attacks in the name of cyber-attack are spread too quickly reduce that there is a victim either 20 seconds. It was found that up messages t o Facebook users from people who have jobs on the social network, that this letter to steal user accounts will be published transmission for a way to send the message to the victim and his friends. Between the twenty-fourth and 27th June, things were going well and suddenly received thousands of Facebook users a message from a friend mentioned in the comments, explains the cyber security company. It was, in fact, the start of the message from the attackers to attack the two phases the first phase downloading by the victim of the virus Trojan on your computer. The second phase steals account when you log on again to Facebook. The injured n beforehand(predicate) 10,000 Facebook account in Europe, Tunisia, and South America, frequently occurring in Brazil, does not show that the incident had reached the United Kingdom 7.5.2. Attack on the site Nat billxSome security experts discovered FireEye that have been targeted users Netflix by pranksters in the deception campaign, The plan was a steal credit card to subscribers in the Netflix and other personal information using modern techniques with a strong attack. The beginning of the attack is to send a message via e-mail require users Netflix entry on the link that leads to the registration page like the truth, Then ask users to update their personal information such as invoice numbers and payment and Date of Birth etc., forrader world transferred to a site Netflix Forensic 8.Figure 8 Attack on the site NatfilexAn example of a spoofed page that appears from Netflix, which asks the user to enter Username and Password.5.3. Phishing Attack on DropboxThe use of Dropbox file storage to a phishing attack via e-mail message and a fake page, but this attack was quickly unlikeable according to Symantec.Said security vendor that discovered a set of mail to electronic fake and the message contains a large file and a link to a page Dropbox, the message claims that a enrolment feces be viewed them by clicking on the runw ay link in the message and the link is logged on a fake page on Dropbox itself 9.5.4. Phishing Attack on TwitterSaid in a recital by the information security manager Twitter was hacked about 250.000 uses. netmail messages and other information He said the attack, which happened last similar attack that took place on two newspapers Wall Street Journal and sweet York Times. Some US newspapers reported that the attack was carried out by Chinese hackers. Also the root of the expert in information security prof Alan Woodward from University of surrey that users be careful of the messages sent to them by phishers with Twitter itself 10.The growing use of digital technology as the communication medium of entertainment, a brute for the completion of various transactions increased the risks and problems of the diversity may chair from this use, and most importantly what is known as phishing email, which can be specify as a deceitful process in which access to personal information by g iving the impression that he trusted entity that in the digital space. There are dozens of smart ideas that help you to protect your personal credit and your identity online, in order to protect yourself come out these are advices.6.1. Phishing through scare tacticsUsually, the fraudster sends via e-mail that the prosecutor mail from a businessman or an organization is likely that you are traffic with it like a bank, or the Internet service provider you have, or online payment service, or a travel agency, or even a government agency. And he asks you to update or validate, or confirm your account information. Some fraud messages threatening dire consequences if you do not respond. Mail will send you to a site look just like the organizations website or the original side. Such mail is a phishing scam 11.6.2. Messages subjugate phishingis when people assume personal bank sends you an prompts you for the information about your bank account or credit card under the pretext of qualifi cation sure of the numbers, relying on the banks logo and other graphics and images to make you think that the message sent by the bank itself. You should not respond to such messages and make sure that the bank and banking institutions do not need to communicate with you to make sure your banking information 11.6.3. Do not click on the linkEasy enticing you to provide a link attractively Instead of clicking on the link provided, use your browser to go to a known and trusted site by typing the address in your web browser. For example, take this link https//www.google.com If you click this, it will not take you to Google, and it will take you to a completely different place. The scammers use this trick all the time to cheat you to go to malicious sites. As you can know where the link will take you provided you go through your sneak over the link without clicking on it, if you do it on the link above you will see infosec.kku.edu.sa at the bottom of your browser. If you are using a s mart phone, click and hold on the link provided so that shows you the memory board shows you the true destination of the link.6.4. Avoid suspicious responses on online advertisingYou may need days to publish an online ad for sale for what purpose, then you will receive inevitably letters from interested Among them may be fraudulent messages to send you a buyer crook imminent in some other currency worth more than the amount requested by lean that it was unable to currency conversion and then prompts you to send the rest. When send him a rest you will discover that you check who sent fake.6.5. E-mail contain misspellsBe wary of e-mail messages that claim to be from organizations or authorized bodies however contain grammatical errors or mistakes in the use of words, spelling or punctuation. Most official bodies reviewing what is transmitted several times before sending it to the public, is usually crisp, debugging and removed during this process.7.1. Survey resultsThe majority fr om ICT, because I went to the plane section ICT and published them my questions and has the discussion with them after they finish Questions.The majority from trimester 5, because I went to them and explain the my objective (phishing) and give them my questions.The majority chose NO in the rate of (56.25%), this indicates a lack of studies (phishing) in the previous semesters or not to search for it in books or on the Internet, unlike those who chose (YES) by (43.75%), and this shows that they have been search for it on the Internet or books.The majority chose NO in the rate of (68.75%), this shows that students are eager to use their information protection programs (phishing) this is a good power of students (ICT).The majority in the rate of (62.5%) chose YES, This is a good rate for students ICT also indicates that their thinking to protect their information and keeping it from phishing by attackers.The majority in the rate of (58.82%) chose NO, This indicates a lack of study mat erial for protection by.Now, at the present time there are digital world That make peoples lives is simple and easy to make to find the information and communication between the people and the majority of devices used by people, such as computers and smartphones, we use the internet for information and technical information and the curriculum and learning and establishment of scientific research or academic and communicate with our friends and our families, such as Google scholar, Google books, YouTube, Skype, WhatsApp, Facebook and Snapchat. However, most hackers had started to develop piracy methods that can be used to steal information from computer users.Phishing is a way of attacking people on their own specific information such as username, password, and credit card. Phishing is also the most widely used method that has been found in the early discovery of computers. Additionally, it has this trick has increased in the past years, using several methods including fake page and a Man in the middle which made this trick to succeed and be used in most is ignorance of computer users. Phishing exploits points weaken people like to deal with them through any grade of kinds to get their own information. Besides, it is known there are a accord sites on the internet, making it difficult to find and prevent phishing sites or blocked, however, it applied most of the host site technical solutions that can mask the phishing sites. In addition, computer users should teach about how to detect phantom site and use the correct web sites.1Phishing Attack Victims Likely Targets for Identity Theft. Online. lendable https//www.gartner.com/ physician/431660/phishing-attack-victims-likely-targets. Accessed 15-Jan-2017.2D. Gudkova, M. Vergelis, N. Demidova, and T. Shcherbakova, Spam and phishing in Q1 2016, AO Kapersky Lab, 2016.3M. Vergelis, D. Gudkova, N. Demidova, and T. Shcherbakova, SPAM AND PHISHING IN 2015, AO Kapersky Lab, p. 25, 2015.4A. A. Khan, Preventing phishing attacks using one time password and user machine identification, ArXiv Prepr. ArXiv13052704, 2013.5P. Kalola, S. Patel, and C. Jagani, Web Spoofing For User Security Awareness.6M. N. Banu and S. M. Banu, A comprehensive study of phishing attacks, Int. J. Comput. Sci. Inf. Technol., vol. 4, no. 6, pp. 783-786, 2013.7Facebook fake friend phishing attack uncovered heres how to spot it. Online. Available http//www.telegraph.co.uk/technology/2016/07/06/facebook-fake-friend-phishing-attack-uncoveredheres-how-to-sp/. Accessed 21-Jan-2017.8Netflix phishing scam goes after credit card data, personal info, WGAL, 12-Jan-2017. Online. Available http//www.wgal.com/article/netflix-phishing-scam-goes-after-credit-card-data-personal-info/8591111. Accessed 22-Jan-2017.9One of the most convincing phishing attacks yet tricks you with Dropbox sharing, PCWorld, 20-Oct-2014. Online. Available http//www.pcworld.com/article/2835892/dropbox-used-for-convincing-phishing-attack.html. Accessed 25-Jan-2017.10 D. Lee, Twitter Hackers target 250,000 users, BBC News, 02-Feb-2013.117 Tips To Protect Against Phishing Norton. Online. Available https//us.norton.com/7-tips-to-protect-against-phishing/article. Accessed 04-Feb-2017.

Cesare Lombrosos Theory of Criminal Traits

Cesare Lombrosos Theory of Criminal TraitsAbstractCesare Lombrosos (1960) Criminal small-arm led to a new discipline in criminology, placing a yoke between bodily anomalies and discourtesy. Certain attributes were said to be the result of a biologically inferior presence which led to a life of crime (Ellwood, 1912). An observational guinea pig interpreted a publication of home runshots made up of reprehensibles and Psychology rung from Canterbury Christ Church University. Independent t-tests revealed that on that point was no balance between the two groups in terms of physical characteristics and flagitious rating. These findings tie in with previous research in the field (gore, 1972 Saladin, Zalman Breen 1988). comparison THE PREVALENCE OF CRIMINAL TRAITS BETWEEN CONVICTED CRIMINALS AND PSYCHOLOGY STAFFCesare Lombroso (2006) is best cognize as the founder of the discipline turn anthropology the take aim of mental and physical traits associated with the born sad. Lom broso published Criminal Man (2006), a illustrious study in which he attributed distressing behaviour to Atavism, an inherited condition in which offenders demonstrated evolutionary throwbacks to more(prenominal) primitive humans. According to Lombroso (2006) the turn was fundamentally a living anomaly concerned with pathological and atavistic characteristics (Ellwood, 1912). After studying 66 decedent criminals, Lombroso (2006) compiled a list of physical features assumed to be associated with criminal behaviour. Traits include asymmetrical faces and unreasonable body hair. A person was thought to be a criminal if they processed 4 or more traits.Charles B. Goring (1972) subjected 37 of Lombrosos (2006) characteristics to empirical testing and compared 2,348 London convicts with a ensure group of young Englishmen. Goring (1972) found little support for Lombrosos work, instead suggesting criminal behaviour is simply an inherited lack of communal sense. Support for Lombroso comes from a study by Hooton (1939), in which 13,873 male pris matchlessrs were compared with 3,023 males from a general sample. Hooton attributed criminal behaviour to biological inferiority, assigning a spell of features such as sloping foreheads to criminals. Hooton was, til now, criticised for his circular reasoning. Criminals were assumed to be physically mediocre and those features which distinguished criminals from others could be classified as precursors of biological inferiority. unaccompanied a small number of modern studies return tested the family among drawing card and criminal behaviour. Saladin, Zalman and Breen (1988) invited students to judge the physical attractiveness of a picking of male photos. Other students assessed the same photos and judged the likelihood that those pictured would commit a crime. Those rated as less attractive were more likely to commit crime. same results were also found in other related studies (Cavior Howard, 1973 Kurtzberg, 1978) .The current study is building upon the previous contradictory evidence, and much like Goring (1913), the study will focus upon comparing Lombrosos (2006) original anomalies within the criminal and general population. As a result of previous evidence my conjecture states that there will be no difference between Lombrosos (2006) criminal traits amongst convicted criminals and the general population.MethodDesignThe design of the experiment consisted of independent measures as both groups were separate from from severally one other.ParticipantsThere were 30 fragmentiseicipants in get along, 15 were Psychology staff members from Canterbury Christ Church University and the other 15 were convicted criminals.Materials and ApparatusMaterials required for the experiment included the 15 criminal mugshots, 15 staff mugshots and finally a criminal characteristics coding sheet.ProcedureThe mathematical function involved going through each photo and deciding whether each person had Lombros os (2006) original criminal characteristics. These characteristics consisted of asymmetric head, flattened/misshapen nose, large ears, fat lips, enormous jaw, high cheekbones, narrow eyes and excessive contend wrinkles. Each photo was judged upon these criteria and whether they were present or not. The final part involved deciding whether each person was a criminal or not which was based on Lombrosos (2006) ideas that if you perceived more than quatern characteristics then you were a criminal. In terms of ethical considerations the use of photos from the staff members would have required consent as well as the discipline to withdraw from the study at any point.ResultsOverall frequencies for the criminal characteristics set in both sets of photos are given in Table 1. This selective instruction reveals that in terms of the non- symmetrical face and twisted nose characteristics these were label as being present in the staff photos (4 and 8 prison term respectively) more so than for the criminal photos in which they were reported 2 and 6 times. All the other traits were identified more on the criminal photos however enormous jaw and high cheekbones were equally coded for at 7 and 9 times. Table 2 provides data showing the frequencies of the total numbers of criminal characteristics coded for in each group of photos. Both groups receive more total ratings in the middle of the overcome, with the majority coded for 2 or 3 criminal traits. An independent t test yielded t(28) = .756, p .05. The hypothesis was accepted there was no difference between the criminal classification of staff mug shots and criminal mug shots.DiscussionOverall there was no difference between the criminal classification of the staff mugshots and the criminal mugshots which replicates similar findings obtained in studies by Goring (1972) and Kurtzberg et al, (1978). This implies that Lombrosos original ideas and theories about certain characteristics conk outership to criminality hav e been undermined by this study. The data presented in tabular array 2 git be described as normally distributed as the ends of the scale are sparsely occupied however the majority of participants from both groups were coded as having between 2-5 criminal traits. According to Lombrosso a criminal was said to have four or more traits, therefore based on results obtained it can be said that the distribution of seemingly criminal characteristics is actually very normal. One limitation to this study is that it is entirely subjective as one person is judging the photos on whether they are criminal or not based on a set of perceived traits. This may lead to a lack of reliability as the same result cannot be guaranteed if the study is repeated. A further limitation concerning subjectivity is the classification of the criminal traits, for instance what constitutes as enormous when describing the jaw or excessive when labelling skin wrinkles. Further in depth classification is required to engraft whether a particular trait is present. Although the results from this study and others suggest that Lombrosos (2006) method of criminal profiling is out of date, it has led to the use of similar methods using information such as upbringing or substance use to establish whether a person is likely to commit a crime.ReferencesCavior, N., Howard, L. (1973). Facial attractiveness and juvenile delinquency among black and white offenders. Journal Of Abnormal peasant Psychology, 1(2), 202-213. doi10.1007/bf00916114.Ellwood, C. (1912). Lombrosos Theory of Crime. Journal Of The American Institute Of Criminal constabulary And Criminology, 2(5), 716. doi10.2307/1132830.Goring, C. (1972). The English convict. Montclair, N.J. Patterson Smith.Hooton, E. A., (1939).Crime and the Man, Cambridge, Massachusetts Harvard University Press.Kurtzberg, R. L. (1978). Plastic Surgery on Offenders. In N. Johnston L. Savitz (Eds.), Justice and Corrections, New York Wiley.Lombroso, C., Gibson, M., Rafter, N. (2006). Criminal man. Durham, NC Duke University Press.Saladin, M., Zalman S., Breen, L. (1988). Perceived Attractiveness and Attributions of Criminality What Is beauteous Is Not Criminal,Canadian Journal of Criminology30(3), 205-215.Table 1This table illustrates the present frequencies of each criminal characteristic as well as the total number of those classified as criminals in the staff and criminal mugshot categories. compositors case Nose Ears Lips Jaw Cheekbones Eyes Wrinkles CriminalCriminal 2 6 9 7 7 9 8 3 6stave 4 8 6 2 7 9 3 4 4Table 2Listed in this table are the total numbers of criminal traits identified for each typeface of mugshot, ranging between 1-6 characteristics. Number of characteristics present after coding 123456Criminal 045321Staff 164220

Friday, March 29, 2019

Creation of a Web Based Business Property Website

Creation of a Web Based billet Property WebsiteIsidoros IoannouCreating an Innovative blood organisationNowadays, the cost of living has been add-ond contractifi set uptly in the majority of the European countries. This raise fecal matter be reflected on the high amount of bills spent by peck for letting levels to reside. Especi anyy, UK is the country that charges the highest necessitate rates to tenants among the separate European countries (Guardian, 2015). It is inevitable for several(prenominal) groups of mass, particularly students and young professionals to seek and rent a way of life in a flat sh ar.The process of finding the suitable airplane propeller and the captivate future raise span is non easy at both. Living with other people is usually a complicated and difficult situation, because peoples characters atomic number 18 different and not e genuinelybody matches with to each one other. There ar several aspects to consider when fewone is choosing a property to rent or flat mates to live with. near of the cadences people do not respect your privacy and this can lead to versatile conflicts (BBC ,2013), (thefirstpint, 2010). As a result, UK citizens spend every yr a serious part of their income to find a residence that could figure their preferences and countless time to organization for measurable training, such as say-so home platemates.In order to alleviate the problem of the significant amount of time and money invested for the process of finding a flat and suitable flat mate, a corresponding advantage tryr needs to be authentic. The social club go forth focus on helping especially students and young professionals, since these dickens categories of humans are noticed to look to usually for rent properties.The friendship named easyproperty would be web- base it would give the opportunity to their clients to see for the much suitable people to serving a common property, according to their preferences. g uest leave alone put on to register first and submit their preferences and characteristics. These would be for example, occupation, gender, nationality, age, habits, interests, the amount of money they could pass to spend, their preferred location, etc. They could have also the capability to prioritize some of their input preferences, in order to the matching algorithms could give more rough-and-ready results regarding their preferences.The node could then perform a bet on the website of the federation. Its search mechanism bequeath find the people that match mostly the customers preferences and at the same time leave provide in the same page property recommendations from the databases of dissimilar agencies. The capability of altering the location and other attributes before search pull up stakes be also included. The people list and property list ordain be sorted based on the people and properties that matched more successfully the persons inputs that conducted the se arch practise.However, the property list give be displayed with some peculiarities. In other words, for properties that nearly showed the same percentage of matching with the user, priority allow for be given to them that conduct already residents. For instance, if a house consists of devil rooms and only one is vacant, this house will be in a higher position in the list, compared to other houses.Currently in the market some competitors exist that offer similar go. The most storied are SpareRoom.com, Rightmove.co.uk and Zoopla.co.uk. The technologies that these competitors use and the ones that the suggested guild is going to use will be analyzed in detail in the following chapter.First of all, the immediate competitor of the conditions suggested companionship is SpareRoom.com. It allows clients to perform searches for suitable flats or flat mates based on their preferences and characteristics. spareroom.com provides its service across all the UK and USA and it is the b roach on its activity field in the UK since it counts nearly 6,499,202 registered users (spare room, 2017). The user can also register to the website and upload publicisements near suitable rooms or flat mates that he wishes to find. Other users can review these advertisements by performing search tasks to the systems database. One of the drawbacks that spareroom.com has it possess its own database system. This means that the searches are limited to the properties that are included only in its database. In addition, ascribable to spareroom.com tar get ins a immense range of the market, it is difficult to focus on veritable categories of people, which in this case are students domestic and international among with young professionals. The act and success of easyproperty will be based on its attempt to adopt the drawbacks of spareroom.com. It will use databases of each areas local anaesthetic estate agencies to offer more creams to its users. The options will be mostly compa tibles to the ii fore mentioned categories of people that the guild aims to target.On the other hand, the other remaining competitors, rightmove.co.uk and zoopla.co.uk provide only the option to users to search for the suitable room. They do not offer options for the user to search for a suitable flat mate. Both also use databases from local estate steadfastlys they cooperate with and offer a wide range of gettable property choices. Particularly rightmove.co.uk provides renting and sale services only in the UK while provides also selling services across Spain and France. (rightmove, 2017). Likely zoopla.co.uk provides renting and selling features only in UK but provides selling features for a wider orbital cavity of countries, nearly all over the world (zoopla, 2017). The competition with these companies is noticed on the establishment of cooperation with the local estate firms.The web based firm that the author suggests and will penetrate into the property estate market aims t o offer efficacious features to students and young professionals who are the main groups who cannot afford to rent a house by themselves and need to share a flat. The service that easy property offers is unique as it offers the opportunity to their users to find the most suitable house mate and at the same time it assists them to choose the most sought after property to live.From the description of the services that the caller-out will provide it is c at onceived that the surroundings of its activity will be the World Wide Web (WWW). accord to Gong and Zhu (2009), the main service that an e-commerce electronic website provides is user registration, query, shopping and communication online. As a result for our agate line, a functional e-commerce website would be the precedent choice. An electronic commerce website should equip WWW browse, data server, e-mail service, customer operation system together with web service system and so on software and hardware (Gong Zhu, 2009). In addition, the usability factor is vital for this mannequin of website, since it determines the intention of the customer to use and movement the services of the website. The term usability refers to two a set of independent quality attributes such as user performance, satisfaction, and learnability (Green Pearson, 2011). In order to, satisfy these requirements and produce an effective and user gracious action, the author chose carefully the components that will constitute the website.The website will be developed use the WordPress Content Management System (CMS). It is a forgive untied writer tool that requires little programming experience and various free plugins. It will be integrated with php and HTML 5 web organic evolution technologies, since they are scripting languages focused on implementing website pages. They will offer dynamic connections to other websites and great responsiveness when the companys website will be displayed on different devices. This confi de would result in a better user experience for the user, and so in a better usability (websitesetup.org, 2017). In addition, the Woo Commerce curriculum will be incorporated to the website as tie with the companys server which will help with the data retrieval and manipulation from the server.Regarding the other components that are decisive for the operation and tasks of the website and were mentioned above, the author is going to use the most apprise for money solutions. For the domain name which will be www.easyproperty.co.uk the namecheap hosting company will be chosen. Other software elements, for example the web server and the vocation e-mail server are provided also from the same company.The technology of cloud calculation is really attractive to the majority of the small and medium size companies, since they are not obliged to invest a significant asset on hardware or software services. Cloud calculate is a amaze for enabling ubiquitous, convenient, on-demand networ k access to a shared pool of configurable computing re man-made lakes (e.g., networks, servers, storage, maskings, and services) (Jula et al., 2014). The service and the maintenance of the infrastructure is the responsibility of the cloud provider. Companies can operation the high performance and the support that cloud providers offer without spending unornamented money (Laudon Laudon, 2016). From the four cloud computing service good examples Software as a Service, Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Network as a Service (NaaS), the company will depend on IaaS model for utilizing its data storage. Microsoft cloud will be chosen as the cloud provider.According to Payne and Frow (2005), a very important practice that plays important role in the success of the patronage is Customer Relationship Management (CRM). It is a practice that if a company implement efficiently, can easily achieve better relationship with its customers and increase the flo w of them. The clients will be regularly notified close offers and services by sending those emails that will be stored in the companys database. ultimately, the aim of the company is to have kittens its service by implementing the website into roving applications. Cross-Platform tools enable the development of applications for ternary busy operating systems (OS). It allows reusing the same source code for building an application for multiple platforms (Charkaoui, et al., 2014). By using one of the available cross platform tools it will save a lot of time and cost comparing to using native application development tools, since it requires developing separate apps for the different mobile OS and in a different programming language. trading model is the content, the structure and the administration of the transactions, which have been designed to create entertain and to exploit the various business opportunities. (Zot Amit, 2011). It explains the insight that a business should h ave in order to achieve revenue by defining its position into the value chain. (Rappa, 2010). According to Ostwalder and Pigneur (2010), the business model describes how an organization can achieve value population, value delivery and value capture. The authors have also invented the Business moulding Canvas which is a tool that organizes all the activities an organization should implement from the initial value suggestion stage to the final stage of value capture. It is two dimensional depiction of nine vital counteracts that help the organization to foregather its objectives, achieve its goals and manage its products and resources.The Business shape Canvas contains the tree elements that make the successful activity lifecycle of a company. Value proposition is the activity of blueprint services and products that would provide value to customers. Value delivery is the activities the business implements for delivering their products and therefore the value to customers and v alue capture is the way the company has income from the above activities. The Business Model Canvas, as well as the detailed description of each block is discussed below. Figure 1 Business Model CanvasCustomer segmentsCustomer segments are the category of people that the company aims to offer value. The targeted earreach of the easyproperty company will mainly consists of university students and young professionals, since these categories are most liable(predicate) to be searching for flat mates in order to share an apartment.Value propositions/creationThe value creation or value proposition is an element really important for any business. Any unfermented business that enters the market should offer something unique or provide better services/products from similar organizations, in order to attract customers. The aim of the company is to provide advanced search features for its customer so that they could find the perfect roommate. This is achieved by providing many fields for e ntering the customer preferences and the ability to prioritize the ones that are more important for them. The next step is to give them a wide list of properties to choose from in various locations. By using the databases from local estate agencies and the advertisements of private landlords, clients have a lot of options to choose from. Finally the company will provide the opportunity for real estate companies to advertise themselves by the companys website.ChannelsThe channels block contains all the means that the company communicates with its customers and these means are used mainly for merchandising purposes. Social media want Facebook and Twitter will be used mostly. Then the website will contain all the links for our social media and also information about all the estate companies we cooperate along with links to their websites and social media. In addition, once the company will target students, the universities of each city could provide assist in promoting the company. Also the student unions of each university. Finally for promoting our company on the web the Google AdWords is going to be used that could offer better positions on their search engine and advertisement.Customer relationshipsCustomer relationships include the means that the company provides for interaction with its clients. The company will use the customer relationship guidance practice for maintaining close relationship with the customers and provide them with various means to contact. This could be achieved by direct interaction by visiting the companys office. Moreover done the telephone support that it will be provided on a 24 hour basis. In addition through the website or the mobile application by submitting a contact form and by posting on the social media.Revenue streams(Value Capture)In the revenue streams the sources of the companys income are explained. Firstly, the main source of income will be from the agencies and landlords once a client will get in contact with them and agree to rent or buy the property. The pact process will begin from the website but it will be finalized face to face. Then the agency or landlord will finalize the deal to the companys website and have the fee, which will be a 10% commission of the first rent. The customer can also cancel the deal and the fee will be returned. All these activities with the agencies will be agreed under contracts. Another source of revenue will be capability of agencies to be advertised through our company. The tool Google AdSense will be used which is operating in fall in-per-click manner. signalise resourcesThe trace resources are the activities and resources used for developing the Value proposition/creation and for delivering the value to the clients. As resources could be considered first the company staff that will develop the website and is going to support the clients issues later. Another key resource is the staff that will operate the promotion campaign of the company. Finally th e information about the properties of the private landlords that will be stored in the companys database and the databases of the estate agencies.Key activities (Value Delivery)Key activities are the most crucial operations for the execution of the companys business plan. This block contains all the tasks for delivering the value which was created in the value creation block. The initial activity is to develop a fully functional website that it will serve all the services explained in the value creation block. The next step is to sign contracts with the landlords and especially with the estate agencies. This is a very important step as the agencies databases will provide the clients with many options to choose. As advertisement and promotion plays an important role for every new established company, assign to a marketing team the promotion of the business is the next steps. Signing contracts with universities for promotion purposes in order to support students searching for apartmen ts belongs also in this step. Finally as the business starts operating the final step is to develop mobile application for providing furthers to our clients to use our services.Key partnershipsKey partnerships include the cooperation network of the company. The network will consist of the real estate agencies and the supply of their databases. Moreover, experience promoting agencies, the University staff and students. constitute structureIt summarizes the different costs the company has to make for the value creation. In the cost structure, the staff stipend and the hardware equipment are included, for example estimator infrastructure. Also the cost of hiring a promotion company and flat wages for the domain and the email server. Finally the annual costs of the cloud services (database) and the hosting server should be added.Previous researchers like Rappa proposed a classification of the various business models instead of a detailed description of what each includes. He supports that a business model should just describe how a firm produces revenue based on its position in the value chain. He proposes nine main categories of business model brokerage firm, Advertising, Infomediary, Merchant, Manufacturer, Affiliate, Community, Subscription and Utility model (Rappa, 2000). The proposed business belongs to some of these categories and the reason is explained below.Firstly the company could be classified to the Brokerage model, since its activities focus on the business to customer (B2C) market as it helps customers who are searching for a room to let, to contact the estate agencies that manage the room they wish to rent. In other words it operates as an intermediate betwixt students, young professionals and the real estate agencies. In addition the company charges a fee as commission for every agreement it is achieved between customers and agencies. Particularly, based on the subcategories of the Brokerage model, the company could be described as a distribut or as it offers catalogue services and acts as a bridge between customers and agencies. Moreover, it is a search agent as it enables the customer to search properties according to its preferences (Rappa, 2010). The company also could be classified also to the advertizing model. The income from the advertisements of the agencies is secondary. The website contains advertises of agencies and new entried apartments in the form of banners. Also advertisement messages about new apartments that were inserted and match the users previous searches are sent to the emails of registered users. Finally it could be express that the company has some characteristics of the Affiliate model. For instance, it enables the client to contact the agency or the landlord, whenever the customer has access to the Internet. Also it charges the agencies that advertise themselves through the website by the pay per click way.According to Timmers (1998) a business mode is an architecture for the product, service and information flows, incorporating simultaneously descriptions of the sources of revenues, description of the actors and the benefits for them. He recognized eleven business models for the operation of the business transactions which are e-shop, e-auction, e-mall, e-procurement, third party marketplace, virtual(prenominal) communities, value chain service providers, value chain integrators, collaboration platforms and information brokers.ReferencesAdrian Payne, Pennie Frow (2005) A Strategic Framework for Customer Relationship Management. Journal of trade October 2005, Vol. 69, No. 4, pp. 167-176.BBC News. (2017). Houseshares How do people avoid picking a sinful housemate? online on hand(predicate) at http//www.bbc.co.uk/news/magazine-24622858 Accessed 16 Feb. 2017.Bachelor, L. (2017). UK tenants pay more rent than any country in Europe. online Available at https//www.theguardian.com/money/2015/jun/24/uk-tenants-pay-more-rent-than-europe Accessed 16 Feb. 2017.Chandrasekhar, I. (2017). London Flat Hunting tips Dos and donts for UK flat search online Thefirstpint.co.uk. Available at http//www.thefirstpint.co.uk/2010/10/09/flat-hunting-useful-tips-advice/ Accessed 16 Feb. 2017.Charkaoui, S., Adraoui, Z. Benlahmar, E. H., 2014. Cross-platform mobile developmentapproaches. In Third IEEE planetary Colloquium in Information Science and Technology,2014, Tetouan, Morocco, pp. 188-191David T. Green J. Michael Pearson (2011) incorporate website usability with the electronic commerce acceptance model. In Behaviour Information Technology, 302, pp. 181-199Gong Y., Zhu C.,(2009). Design and implementation of electronic commerce website. In 2009 ISECS International Colloquium on Computing, Communication, Control, and Management, IEEEJula, A., Sundararajan, E. and Othman, Z. (2014). Cloud computing service composition A imperious literature review. Expert Systems with Applications, 41(8), pp.3809-3824.Laudon, K., Laudon, J., (2015). Management Information Systems, M anaging the Digital Firm, PearsonNamecheap (2017). Domain call Cheap Domain Names online Available at https//www.namecheap.com/ Accessed 16 Feb. 2017.Osterwalder, A., Pigneur, Y. (2010), Business Model Generation A Handbook for Visionaries, Game Changers, and Challengers. Wiley, HobokenRightmove. (2017). About Rightmove online. Available at http//plc.rightmove.co.uk/about-us/company-overview.aspx Accessed 16 Feb. 2017.Spareroom (2017). The UKs 1 Flatshare Website. online. Available at https//www.spareroom.co.uk/content/about/about-spareroom-new/ Accessed 16 Feb. 2017.Timmers, P. (1998, 04). Business Models for Electronic Market. Electronic Markets, 8(2), 3-8Websitesetup, (2017). How to Make a Website bit-by-bit Guide for Beginners. online Available at https//websitesetup.org/ Accessed 16 Feb. 2017.WooCommerce eCommerce for WordPress. (2017). online WooCommerce. Available at https//woocommerce.com/ Accessed 16 Feb. 2017.Zoopla. (2017). About Zoopla online. Available at http//ww w.zoopla.co.uk/about/ Accessed 16 Feb. 2017.Zott, C., Amit, R. (2010), Business Model Design an activity system perspective. Long range planning, 43(2), 216-226.