Monday, May 25, 2020

Media internet - Free Essay Example

Sample details Pages: 17 Words: 5109 Downloads: 3 Date added: 2017/06/26 Category Internet Essay Type Narrative essay Did you like this example? How Teenagers Consume Media Digital media is profoundly transforming consumer behaviour and traditional media business models. While creating new opportunities, its disruptive influence is being accelerated by the global recession. At the vanguard of this digital revolution are teenagers. Don’t waste time! Our writers will create an original "Media internet" essay for you Create order While their habits will obviously change (especially when they start employment), understanding their mindset seems an excellent way of assessing how the media landscape will evolve. To this end, we asked a 15 year old summer work intern, Matthew Robson, to describe how he and his friends consume media. Without claiming representation or statistical accuracy, his piece provides one of the clearest and most thought provoking insights we have seen. So we published it. There are several issues that immediately jump out from the piece. Teenagers are consuming more media, but in entirely different ways and are almost certainly not prepared to pay for it. They resent intrusive advertising on billboards, TV and the Internet. They are happy to chase content and music across platforms and devices (iPods, mobiles, streaming sites). Print media (newspapers, directories) are viewed as irrelevant but events (cinema, concerts etc.) remain popular and one of the few beneficiaries of payment. The convergence of gaming, TV, mobile and Internet is accelerating with huge implications for pay-TV. For mobiles, price is key both in terms of handset prices ÂÂ £100-200 as well as taking pay as you go as opposed to contracts. Mid-range feature phones still dominate, meaning that Sony Ericsson does well as thats their sweet spot. High-end smartphones are desirable but too expensive. Most prefer to own separate devices for music, and messaging. Texting is still key and use of new data services limited due to cost. Wi-Fi is more popular than 3G. While these trends will not necessarily surprise, their influence on TMT stocks cannot be underestimated. How Teenagers ConsumeMedia Radio Most teenagers nowadays are not regular listeners to radio. They may occasionally tune in, but they do not try to listen to a program specifically. The main reason teenagers listen to the radio is for music, but now with online sites streaming music for free they do not bother, as services such as last.fm do this advert free, and users can choose the songs they want instead of listening to what the radio presenter/DJ chooses. Television Most teenagers watch television, but usually there are points in the year where they watch more than average. This is due to programs coming on in seasons, so they will watch a particular show at a certain time for a number of weeks (as long as it lasts) but then they may watch no television for weeks after the program has ended. allows them to watch shows when they want. Whilst watching TV, adverts come on quite regularly (18 minutes of every hour) and teenagers do not want to watch these, so they switch to another channel, or do something else whilst the adverts run. The majority of teenagers I speak to have Virgin Media as their provider, citing lower costs but similar content of Sky. A fraction of teenagers have Freeview but these people are light users of TV (they watch about 1 ÂÂ ½ hours per week) so they do not require the hundreds of channels that other providers offer. Newspapers No teenager that I know of regularly reads a newspaper, as most do not have the time and cannot be bothered to read pages and pages of text while they could watch the news summarised on the internet or on TV. The only newspapers that are read are tabloids and freesheets (Metro, London Lite) mainly because of cost; teenagers are very reluctant to pay for a newspaper (hence the popularity of freesheets such as the Metro). Over the last few weeks, the sun has decreased in cost to 20p, so I have seen more and more copies read by teenagers. Another reason why mainly tabloids are read is that their compact size allows them to be read easily, on a bus or train. This is especially true for The Metro, as it is distributed on buses and trains. Gaming users, which has had an impact on phone usage; one can speak for free over the console and so a teenager would be unwilling to pay to use a phone. PC gaming has little or no place in the teenage market. This may be because usually games are released across all platforms, and whilst one can be sure a game will play on a console PC games require expensive set ups to ensure a game will play smoothly. In addition, PC games are relatively easy to pirate and download for free, so many teenagers would do this rather than buy a game. In contrast, it is near impossible to obtain a console game for free. Internet Every teenager has some access to the internet, be it at school or home. Home use is mainly used for fun (such as social networking) whilst school (or library) use is for work. Most teenagers are heavily active on a combination of social networking sites. Facebook is the most common, with nearly everyone with an internet connection registered and visiting 4 times a week. Facebook is popular as one can interact with friends on a wide scale. On the other hand, teenagers do not use twitter. Most have signed up to the service, but then just leave it as they release that they are not going to update it (mostly because texting twitter uses up credit, and they would rather text friends with that credit). In addition, they realise that no one is viewing their profile, so their tweets are pointless. Outside of social networking, the internet is used primarily as a source of information for a variety of topics. For searching the web, Google is the dominant figure, simply because it is well k nown and easy to use. Some teenagers make purchases on the internet (on sites like eBay) but this is only used by a small will) so that they can transfer it to portable music players and share it with friends. How teenagers play their music while on the go varies, and usually dependent on wealth -with teenagers from higher income families using iPods and those from lower income families using mobile phones. Some teenagers use both to listen to music, and there are always exceptions to the rule. A number of people use the music service iTunes (usually in conjunction with iPods) to acquire their music (legally) but again this is unpopular with many teenagers because of the high price (79p per song). Some teenagers use a combination of sources to obtain music, because sometimes the sound quality is better on streaming sites but they cannot use these sites whilst offline, so they would download a song then listen to it on music streaming sites (separate from the file). Cinema Teenagers visit the cinema quite often, regardless of what is on. Usually they will target a film first, and set out to see that, but sometimes they will just go and choose when they get there. This is because going to the cinema is not usually about the film, but the experience -and getting together with friends. Teenagers visit the cinema more often when they are in the lower end of teendom (13 and 14) but as they approach 15 they go to the cinema a lot less. This is due to the pricing; at 15 they have to pay the adult price, which is often double the child price. Also, it is possible to buy a pirated DVD of the film at the time of release, and these cost much less than a cinema ticket so teenagers often choose this instead of going to the cinema. Some teenagers choose to download the films off the internet, but this is not favourable as the films are usually bad quality, have to be watched on a small computer screen and there is a chance that they will be malicious files and ins tall a virus. Devices Mobile Phones 99% of teenagers have a mobile phone and most are quite capable phones. The general view is that Sony Ericsson phones are superior, due to their long list of features, built in walkman capability and value (ÂÂ £100 will buy a mid-high range model). Teenagers due to the risk of it getting lost do not own mobile phones over the ÂÂ £200 mark. As a rule, teenagers have phones on pay as you go. This is because they cannot afford the monthly payments, and cannot commit to an 18-month contract. Usually, teenagers only use their phone for texting, calling. Features such as video messaging or video calling are not used -because they are expensive, (you can get four regular texts for the price of one video message). Services such as instant messaging are used, but not by everyone. It usually depends whether the phone is Wi-Fi compatible, because otherwise it is very expensive to get internet off the phone network. As most teenagers phones have Bluetooth support, and Bluetooth is free, they utilise this feature often. It is used to send songs and videos (even though it is illegal) and is another way teenagers gain songs for free. Teenagers never use the ringtone and picture selling services, which gained popularity in the early 00s. This is because of the negative press that these services have attracted (where the charge ÂÂ £20 a week with no easy way to cancel the service) and the fact that they can get pictures and music on a computer -then transfer it to their phones at no cost. Mobile email is not used as teenagers have no need; they do not need to be connected to their inbox all the time as they dont receive important emails. Teenagers do not use the internet features on their mobiles as it costs too much, and generally, if they waited an hour they could use their home internet and they are willing to wait as they dont usually have anything urgent to do. Teenagers do not upgrade their phone very often, with most upgrading every two years. They usually upgrade on their birthday when their parents will buy them a new phone, as they do not normally have enough money to do it themselves. Televisions: Most teenagers own a TV, with more and more upgrading to HD ready flat screens. However, many are not utilising this HD functionality, as HD channels are expensive extras which many families cannot justify the added expenditure. Many of them dont want to sign up to HD broadcasting services, as adverts are shown on standard definition broadcasts, so they cant see the difference. Most people have Virgin Media as a TV provider. Some have sky and some have Freeview but very few only have the first five channels (BBC One, BBC Two, ITV, Channel Four and Channel Five). Computers: Every teenager has access to a basic computer with internet, but most teenagers computers are systems capable of only everyday tasks. Nearly all teenagers computers have Microsoft office installed, as it allows them to do school work at home. Most (9/10) computers owned by teenagers are PCs, because they are much cheaper than Macs and school computers run Windows, so if a Mac is used at home compatibility issues arise. Games Consoles: Close to 1/3 of teenagers have a new ( 2 ÂÂ ½ years old) games console, 50% having a Wii, 40% with an Xbox 360 and 10% with a PS3. The PS3 has such a low figure because of its high price (ÂÂ £300) and similar features and games to an Xbox 360, which costs less (ÂÂ £160). The Wiis dominance is due to younger brothers and sisters, they have a Wii and parents are not willing to pay for another console.) What is Hot? Anything with a touch screen is desirable. Mobile phones with large capacities for music. Portable devices that can connect to the internet (iPhones) Really big tellies What Is Not? Anything with wires Phones with black and white screens Clunky brick phones Devices with less than ten-hour battery life Disclosure Section Morgan Stanley Co. International plc, authorized and regulated by Financial Services Authority, disseminates in the UK research that it has prepared, and approves solely for the purposes of section 21 of the Financial Services and Markets Act 2000, research which has been prepared by any of its affiliates. As used in this disclosure section, Morgan Stanley includes RMB Morgan Stanley (Proprietary) Limited, Morgan Stanley Co International plc and its affiliates. For important disclosures, stock price charts and rating histories regarding companies that are the subject of this report, please see the Morgan Stanley Research Disclosure Website at www.morganstanley.com/researchdisclosures, or contact your investment representative or Morgan Stanley Research at 1585 Broadway, (Attention: Equity Research Management), New York, NY, 10036 USA. Analyst Certification The following analysts hereby certify that their views about the companies and their securities discussed in this report are accurately expressed and that they have not received and will not receive direct or indirect compensation in exchange for expressing specific recommendations or views in this report: Edward Hill-Wood. Unless otherwise stated, the individuals listed on the cover page of this report are research analysts. Global Research Conflict Management Policy Morgan Stanley Research has been published in accordance with our conflict management policy, which is available at www.morganstanley.com/institutional/research/conflictpolicies. Important US Regulatory Disclosures on Subject Companies As of June 30, 2009, Morgan Stanley beneficially owned 1% or more of a class of common equity securities of the following companies covered in Morgan Stanley Research: BSkyB, Informa, Lagardere, Reed Elsevier NV, Reed Elsevier PLC, SeLoger.com, SES, TF1, Vivendi, Wolters Kluwer, Yell. As of June 30, 2009, Morgan Stanley held a net long or short position of US$1 million or more of the debt securities of the following issuers covered in Morgan Stanley Research (including where guarantor of the securities): BSkyB, DMGT, Eutelsat Communications, Havas, ITV, Lagardere, Pearson, Publicis Groupe, Reed Elsevier PLC, SES, TF1, Thomson Reuters Corp., Thomson Reuters PLC, United Business Media, Vivendi, Wolters Kluwer, WPP Group Plc, Yell. Within the last 12 months, Morgan Stanley managed or co-managed a public offering of securities of Thomson Reuters Corp.. Within the last 12 months, Morgan Stanley has received compensation for investment banking services from Eutelsat Communications, Lagar dere, ProSiebenSat1, Publicis Groupe, Reed Elsevier PLC, SES, Thomson Reuters Corp., Thomson Reuters PLC, Vivendi, WPP Group Plc. In the next 3 months, Morgan Stanley expects to receive or intends to seek compensation for investment banking services from Antena 3, BSkyB, CTC Media, Eutelsat Communications, Gestevision Telecinco, Havas, Informa, ITV, JCDecaux, Johnston Press, Lagardere, Pearson, ProSiebenSat1, Publicis Groupe, Reed Elsevier PLC, SES, TF1, Thomson Reuters PLC, Trinity Mirror, United Business Media, Vivendi, Wolters Kluwer, WPP Group Plc, Yell. Within the last 12 months, Morgan Stanley Co. Incorporated has received compensation for products and services other than investment banking services from Publicis Groupe, Thomson Reuters PLC. Within the last 12 months, Morgan Stanley has provided or is providing investment banking services to, or has an investment banking client relationship with, the following company: Antena 3, BSkyB, CTC Media, Eutelsat Communications, Gest evision Telecinco, Havas, Informa, ITV, JCDecaux, Johnston Press, Lagardere, Pearson, ProSiebenSat1, Publicis Groupe, Reed Elsevier PLC, SES, TF1, Thomson Reuters Corp., Thomson Reuters PLC, Trinity Mirror, United Business Media, Vivendi, Wolters Kluwer, WPP Group Plc, Yell. Within the last 12 months, Morgan Stanley has either provided or is providing non-investment banking, securities-related services to and/or in the past has entered into an agreement to provide services or has a client relationship with the following company: Antena 3, BSkyB, Gestevision Telecinco, ITV, Lagardere, Mediaset, Pearson, Publicis Groupe, Reed Elsevier PLC, SES, TF1, Thomson Reuters PLC, Trinity Mirror, United Business Media, Vivendi. The research analysts, strategists, or research associates principally responsible for the preparation of Morgan Stanley Research have received compensation based upon various factors, including quality of research, investor client feedback, stock picking, competitive fac tors, firm revenues and overall investment banking revenues. An employee or director of Morgan Stanley is a director of WPP Group Plc. Morgan Stanley Co. Incorporated makes a market in the securities of CTC Media. Morgan Stanley Co. International plc is a corporate broker to BSkyB, Trinity Mirror, United Business Media. Certain disclosures listed above are also for compliance with applicable regulations in non-US jurisdictions. STOCK RATINGS Morgan Stanley uses a relative rating system using terms such as Overweight, Equal-weight, Not-Rated or Underweight (see definitions below). Morgan Stanley does not assign ratings of Buy, Hold or Sell to the stocks we cover. Overweight, Equal-weight, Not-Rated and Underweight are not the equivalent of buy, hold and sell. Investors should carefully read the definitions of all ratings used in Morgan Stanley Research. In addition, since Morgan Stanley Research contains more complete information concerning the analysts views, investors should carefully read Morgan Stanley Research, in its entirety, and not infer the contents from the rating alone. In any case, ratings (or research) should not be used or relied upon as investment advice. An investors decision to buy or sell a stock should depend on individual circumstances (such as the investors existing holdings) and other considerations. Global Stock Ratings Distribution For disclosure purposes only (in accordance with NASD and NYSE requirements), we include the category headings of Buy, Hold, and Sell alongside our ratings of Overweight, Equal-weight, Not-Rated and Underweight. Morgan Stanley does not assign ratings of Buy, Hold or Sell to the stocks we cover. Overweight, Equal-weight, Not-Rated and Underweight are not the equivalent of buy, hold, and sell but represent recommended relative weightings (see definitions below). To satisfy regulatory requirements, we correspond Overweight, our most positive stock rating, with a buy recommendation; we correspond Equal-weight and Not-Rated to hold and Underweight to sell recommendations, respectively. Data include common stock and ADRs currently assigned ratings. An investors decision to buy or sell a stock should depend on individual circumstances (such as the investors existing holdings) and other considerations. Investment Banking Clients are companies from whom Morgan Stanley or an affiliate receiv ed investment banking compensation in the last 12 months. Analyst Stock Ratings Overweight (O). The stocks total return is expected to exceed the average total return of the analysts industry (or industry teams) coverage universe, on a risk-adjusted basis, over the next 12-18 months. Equal-weight (E). The stocks total return is expected to be in line with the average total return of the analysts industry (or industry teams) coverage universe, on a risk-adjusted basis, over the next 12-18 months. Not-Rated (NR). Currently the analyst does not have adequate conviction about the stocks total return relative to the average total return of the analysts industry (or industry teams) coverage universe, on a risk-adjusted basis, over the next 12-18 months. Underweight (U). The stocks total return is expected to be below the average total return of the analysts industry (or industry teams) coverage universe, on a risk-adjusted basis, over the next 12-18 months. Unless otherwise specified, the time frame for price targets included in Morgan Stanley Research is 12 to 18 m onths. Analyst Industry Views Attractive (A): The analyst expects the performance of his or her industry coverage universe over the next 12-18 months to be attractive vs. the relevant broad market benchmark, as indicated below. In-Line (I): The analyst expects the performance of his or her industry coverage universe over the next 12-18 months to be in line with the relevant broad market benchmark, as indicated below. Cautious (C): The analyst views the performance of his or her industry coverage universe over the next 12-18 months with caution vs. the relevant broad market benchmark, as indicated below. Benchmarks for each region are as follows: North America SP 500; Latin America relevant MSCI country index or MSCI Latin America Index; Europe MSCI Europe; Japan TOPIX; Asia relevant MSCI country index. Important Disclosures for Morgan Stanley Smith Barney LLC Customers Citi Investment Research Analysis (CIRA) research reports may be available about the companies that are the subject of this Morgan Stanley research report. Ask your Financial Advisor or use Research Center to view any available CIRA research reports in addition to Morgan Stanley research reports. In addition to the disclosures on this research report and on the Morgan Stanley disclosure website (www.morganstanley.com/researchdisclosures), important disclosures regarding the relationship between the companies that are the subject of this report and Morgan Stanley Smith Barney LLC, Citigroup Global Markets Inc. or any of its affiliates, are available at https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html. This Morgan Stanley research report has been reviewed and approved on behalf of Morgan Stanley Smith Barney LLC. This review and approval was conducted by the same person who reviewed this research report on behalf of Morgan Stanley. This could create a conflict of inte rest. Other Important Disclosures Morgan Stanley produces a research product called a Tactical Idea. Views contained in a Tactical Idea on a particular stock may be contrary to the recommendations or views expressed in this or other research on the same stock. This may be the result of differing time horizons, methodologies, market events, or other factors. For all research available on a particular stock, please contact your sales representative or go to Client Link at www.morganstanley.com. For a discussion, if applicable, of the valuation methods used to determine the price targets included in this summary and the risks related to achieving these targets, please refer to the latest relevant published research on these stocks. Morgan Stanley Research does not provide individually tailored investment advice. Morgan Stanley Research has been prepared without regard to the individual financial circumstances and objectives of persons who receive it. The securities/instruments discussed in Morgan Stanley Research may not be suitable for all investors. Morgan Stanley recommends that investors independently evaluate particular investments and strategies, and encourages investors to seek the advice of a financial adviser. The appropriateness of a particular investment or strategy will depend on an investors individual circumstances and objectives. The securities, instruments, or strategies discussed in Morgan Stanley Research may not be suitable for all investors, and certain investors may not be eligible to purchase or participate in some or all of them. Morgan Stanley Research is not an offer to buy or sell or the solicitation of an offer to buy or sell any security/instrument or to participate in any particular trading strategy. The Important US Regulatory Disclosures on Subject Companies section in Morgan Stanley Research lists all companies mentioned where Morgan Stanley owns 1% or more of a class of common securities of the companies. For all other companies mentioned in Morgan Stanley Resear ch, Morgan Stanley may have an investment of less than 1% in securities or derivatives of securities of companies and may trade them in ways different from those discussed in Morgan Stanley Research. Employees of Morgan Stanley not involved in the preparation of Morgan Stanley Research may have investments in securities or derivatives of securities of companies mentioned and may trade them in ways different from those discussed in Morgan Stanley Research. Derivatives may be issued by Morgan Stanley or associated persons Morgan Stanley and its affiliate companies do business that relates to companies/instruments covered in Morgan Stanley Research, including market making and specialized trading, risk arbitrage and other proprietary trading, fund management, commercial banking, extension of credit, investment services and investment banking. Morgan Stanley sells to and buys from customers the securities/instruments of companies covered in Morgan Stanley Research on a principal basi s. With the exception of information regarding Morgan Stanley, research prepared by Morgan Stanley Research personnel are based on public information. Morgan Stanley makes every effort to use reliable, comprehensive information, but we make no representation that it is accurate or complete. We have no obligation to tell you when opinions or information in Morgan Stanley Research change apart from when we intend to discontinue research coverage of a subject company. Facts and views presented in Morgan Stanley Research have not been reviewed by, and may not reflect information known to, professionals in other Morgan Stanley business areas, including investment banking personnel. Morgan Stanley Research personnel conduct site visits from time to time but are prohibited from accepting payment or reimbursement by the company of travel expenses for such visits. The value of and income from your investments may vary because of changes in interest rates or foreign exchange rates, securities prices or market indexes, operational or financial conditions of companies or other factors. There may be time limitations on the exercise of options or other rights in your securities transactions. Past performance is not necessarily a guide to future performance. Estimates of future performance are based on assumptions that may not be realized. Unless otherwise stated, the cover page provides the closing price on the primary exchange for the subject companys securities/instruments. To our readers in Taiwan: Information on securities/instruments that trade in Taiwan is distributed by Morgan Stanley Taiwan Limited (MSTL). Such information is for your reference only. Information on any securities/instruments issued by a company owned by the government of or incorporated in the PRC and listed in on the Stock Exchange of Hong Kong (SEHK), namely the H-shares, including the component company stocks of the Stock Exchange of Hong Kong (SEHK)s Hang Seng China Enterprise Index; or any secu rities/instruments issued by a company that is 30% or more directly- or indirectly-owned by the government of or a company incorporated in the PRC and traded on an exchange in Hong Kong or Macau, namely SEHKs Red Chip shares, including the component company of the SEHKs China-affiliated Corp Index is distributed only to Taiwan Securities Investment Trust Enterprises (SITE). The reader should independently evaluate the investment risks and is solely responsible for their investment decisions. Morgan Stanley Research may not be distributed to the public media or quoted or used by the public media without the express written consent of Morgan Stanley. Information on securities/instruments that do not trade in Taiwan is for informational purposes only and is not to be construed as a recommendation or a solicitation to trade in such securities/instruments. MSTL may not execute transactions for clients in these securities/instruments. To our readers in Hong Kong: Information is distrib uted in Hong Kong by and on behalf of, and is attributable to, Morgan Stanley Asia Limited as part of its regulated activities in Hong Kong. If you have any queries concerning Morgan Stanley Research, please contact our Hong Kong sales representatives. Morgan Stanley Research is disseminated in Japan by Morgan Stanley Japan Securities Co., Ltd.; in Hong Kong by Morgan Stanley Asia Limited (which accepts responsibility for its contents); in Singapore by Morgan Stanley Asia (Singapore) Pte. (Registration number 199206298Z) and/or Morgan Stanley Asia (Singapore) Securities Pte Ltd (Registration number 200008434H), regulated by the Monetary Authority of Singapore, which accepts responsibility for its contents; in Australia to wholesale clients within the meaning of the Australian Corporations Act by Morgan Stanley Australia Limited A.B.N. 67 003 734 576, holder of Australian financial services license No. 233742, which accepts responsibility for its contents; in Australia to wholesale c lients and retail clients within the meaning of the Australian Corporations Act by Morgan Stanley Smith Barney Australia Pty Ltd (A.B.N. 19 009 145 555, holder of Australian financial services license No. 240813, which accepts responsibility for its contents; in Korea by Morgan Stanley Co International plc, Seoul Branch; in India by Morgan Stanley India Company Private Limited; in Canada by Morgan Stanley Canada Limited, which has approved of, and has agreed to take responsibility for, the contents of Morgan Stanley Research in Canada; in Germany by Morgan Stanley Bank AG, Frankfurt am Main, regulated by Bundesanstalt fuer Finanzdienstleistungsaufsicht (BaFin); in Spain by Morgan Stanley, S.V., S.A., a Morgan Stanley group company, which is supervised by the Spanish Securities Markets Commission (CNMV) and states that Morgan Stanley Research has been written and distributed in accordance with the rules of conduct applicable to financial research as established under Spanish regulat ions; in the United States by Morgan Stanley Co. Incorporated, which accepts responsibility for its contents. Morgan Stanley Co. International plc, authorized and regulated by Financial Services Authority, disseminates in the UK research that it has prepared, and approves solely for the purposes of section 21 of the Financial Services and Markets Act 2000, research which has been prepared by any of its affiliates. Private U.K. investors should obtain the advice of their Morgan Stanley Co. International plc representative about the investments concerned. RMB Morgan Stanley (Proprietary) Limited is a member of the JSE Limited and regulated by the Financial Services Board in South Africa. RMB Morgan Stanley (Proprietary) Limited is a joint venture owned equally by Morgan Stanley International Holdings Inc. and RMB Investment Advisory (Proprietary) Limited, which is wholly owned by FirstRand Limited. The information in Morgan Stanley Research is being communicated by Morgan Stanley Co. International plc (DIFC Branch), regulated by the Dubai Financial Services Authority (the DFSA), and is directed at wholesale customers only, as defined by the DFSA. This research will only be made available to a wholesale customer who we are satisfied meets the regulatory criteria to be a client. The information in Morgan Stanley Research is being communicated by Morgan Stanley Co. International plc (QFC Branch), regulated by the Qatar Financial Centre Regulatory Authority (the QFCRA), and is directed at business customers and market counterparties only and is not intended for Retail Customers as defined by the QFCRA. As required by the Capital Markets Board of Turkey, investment information, comments and recommendations stated here, are not within the scope of investment advisory activity. Investment advisory service is provided in accordance with a contract of engagement on investment advisory concluded between brokerage houses, portfolio management companies, non-deposit banks and clients. Comments and recommendations stated here rely on the individual opinions of the ones providing these comments and recommendations. These opinions may not fit to your financial status, risk and return preferences. For this reason, to make an investment decision by relying solely to this information stated here may not bring about outcomes that fit your expectations. The trademarks and service marks contained in Morgan Stanley Research are the property of their respective owners. Third-party data providers make no warranties or representations of any kind relating to the accuracy, completeness, or timeliness of the data they provide and shall not have liability for any damages of any kind relating to such data. The Global Industry Classification Standard (GICS) was developed by and is the exclusive property of MSCI and SP. Morgan Stanley Research, or any portion thereof may not be reprinted, sold or redistributed without the written consent of Morgan Stanley. Morga n Stanley Research is disseminated and available primarily electronically, and, in some cases, in printed form.

Sunday, May 17, 2020

The Beginning Of Watsons Career Essay - 1275 Words

The beginning of Watsons career is a little more familiar to people than they realize. IBM research developed Watson to compete on a well-known TV game show. Watson competed as a contestant on Jeopardy. It took a team of twenty researchers and three years to get Watson to the desired level of human expertise. Researchers capitalized of the knowledge they gained from Jeopardy and altered Watson to be even smarter. The researchers created all the necessary functions in Watson to alter research methods in such a way the human race has never been exposed to. Watson can be used in research of medical and business knowledge. Watson can even answer basic everyday questions like those we have in day-to-day conversations. Watson doesn’t just take in information in English but explores document in numerous languages. The increasingly important urge to create a computer system that could hold and comprehend the more broad area of relevance. Computers before Watson have had the ability t o research documents using key words or by popularity. This poses a problem when the topic of discussion is not popular. Now the IBM system Watson can be used to make important decisions in many career fields with a limited time frame. Jeopardy requires contestants to compete quickly and accurately in a non-perfect environment. The complexity of a computer system playing Jeopardy lies within the ability to risk answering incorrectly or to not answer at all. This skill takes precision andShow MoreRelatedFeminism in Mona Lisa Smile Essay915 Words   |  4 Pagesin Los Angeles, California, to teach at Wellesley College, a conservative womens private liberal arts college in Massachusetts, United States. Katherine Ann Watson tries to open her students minds to their freedom to do whatever they want with their lives. She encourages her students to believe in themselves, to study to become career professionals, and to improve their economic futures. She uses her art teachings as a vehicle to put across her opinion to the young women; that her students needntRead MoreThe Job Of A Police Officer1716 Words   |  7 PagesMost people can easily speculate as to which career is the most dangerous one in America. Hollywood has dramatized this career so much through their television shows, that people do not realize that this is no joke. This career is the most dangerous because it has the highest death rates of any career. The reason why the death rates are so astonishingly high is because the people who work in this career put their lives on the line to save others in need, and because they work in dire situationsRead MoreAnalysis Of The Film Mona Lisa Smile 1256 Words   |  6 Page sGiselle is the first to become intrigued with Watson. Connie was a passive character while Joan displayed inner conflict. Significant positive change cannot occur without an atrocity to shed light on the oblivious. Social Grooming Katherine Watson, the professor, was a woman who cared about knowledge. On her first day she was excited to start teaching her students something new but quickly learned a lesson herself. The students had already assumed that Watson was a single woman pursuing knowledge onlyRead MoreLiterature Review. Autism Overview. Autism Spectrum Disorder1496 Words   |  6 Pagesvocational skills that will be essential for them post-graduation. Vocational Skills Vocational skills are extremely important to teach to students, especially those with disabilities. Students of high school age are beginning to think of their futures, including, but not limited to, career goals. Many students in high school lack vocational training that could increase their future success, and many students with disabilities are in need of extra training or exploration to help them establish theseRead MoreThe Origin Of The Word Dna And The Science World Is Well Known Essay993 Words   |  4 Pageshttp://www.livescience.com/39804-rosalind-franklin.html Rosalind’’s father wanted her to go into the line of social work, but at age fifteen, she had decided to become a scientist. In 1938, aged 18, she graduated from Newnham College at Cambridge. Career leading up to major discovery Rosalind’s first job (1938) was with the British Coal Utilisation Research Association. Her work there contributed to the war effort as she did investigations into the structures as well as uses of graphite and coalRead MoreB.F. Skinners Contribution to Psychology1488 Words   |  6 PagesB.F. Skinner’s Contribution to Modern Psychology Ian K. Connelly Oklahoma State University B.F. Skinner’s Contribution to Modern Psychology As I began to study the history and beginning of psychology there was one man who stood out to me clearly as a powerful force of influence and contributor to the direction psychology has taken in its still very young life. What does it mean to be a major influential contributor to the science of psychology? This man shows us with his groundbreaking theoriesRead MoreThe Inequality Trap : Fighting Capitalism Instead Of Poverty1486 Words   |  6 Pagescapitalist venture and excessive wealth. Throughout the eight chapters, Watson keeps a reader interested using modern examples and names such as Sidney Crosby and Steve Jobs. However, these detailed analyses and ample examples fall short due to Watson’s vague and ambiguous arguments which never land on a conclusive point. Further, Watson’s subtitle misleads the reader into think the book will argue against capitalism, yet Watson spends most of the book discussing wealth and its contribution to inequalityRead MoreThe Struc ture Of Dn Cooperation And Competition949 Words   |  4 Pagesleading up to the four who discovered the structure of DNA. The four people who discovered the structure of DNA built upon the EXPLORATION AND DISCOVERY of others: At the time of this discovery, the groundwork in DNA research had been prepared, beginning with the work of Gregor Mendel in the 19th century. NEW TECHNOLOGY: Later, in the decades of the 1940’s and 50’s, the understanding of DNA grew because of new technology. DISCOVERY: It was learned that DNA is made of phosphates, sugars, fourRead MoreThe Mystery Genre Of Novels Essay1477 Words   |  6 Pagescharacter Sherlock Holmes, he started to down a slippery slope in his writing career. The respectable author wrote A Study in Scarlet as a sort of critique of detective novels, as if boasting that he could write a better detective and thus a better detective novel; however, he fell into the trap of sensational writing. Sir Doyle succumbed to sensationalism in A Study in Scarlet as seen through the eyes of the character John Watson in at least two different circumstances and how Sir Arthur Conan Doyle wroteRead MoreThe Nursing Theorist : Dr. Watson1181 Words   |  5 PagesI chose Dr. Jean Watson because I believe and agree with her nursing theories. Dr. Watson’s theories take into consideration the mind, body and spirit of the patient as a whole. She believes that it is not the role of the nurse to cure the patient of his or her disease, but rather â€Å"honor the human dimensions of nursing work and the inner life world and subjective experiences of the people [nurses] serve† (Watson, 1997, p. 50). She feels nursing is an art, not a science (Watson, 1997). Her work illustrates

Friday, May 15, 2020

Historical Document Analysis of Will the Japanese...

One can derive a great deal concerning occurrences, opinions, and day to day life by simply analyzing relevant details within a historical document. Details such as the lives of people in the time and place discussed; the opinions and audience of the author of the document; the biases inherent in the writing and how they are affected by the times; the degree to which the document is representative of the times; and the possible answers one document can provide regarding historical periods. By examining the historical document entitled Will the Japanese Predominate?, one can clearly see that this piece was probably written just prior to the start of World War II, reflected the biases of a population of San Francisco who were prejudiced†¦show more content†¦There are, of course, a number of obvious signs that point to both the authoring and location of this written warning against Japanese industrial imperialism. The easiest way to see the group that published this document is to look at the bottom of the document where, written in large, bold letters, is the name AMERICAN SHOEMAKERS in the Mission of San Francisco. Apparent, this warning against the Japanese industrial siege of America was published and distributed by the AMERICAN SHOEMAKERS in the Mission of San Francisco, or at very least, written by them. There are more subtle hints and clues strewn throughout the text. The only `bolded-font type throughout the entire text of the document is PRESENT DANGER and this phrase resides within the paragraph that highlights the specific effects that Japanese competition has had on the shoe industry. The authors, in doing this, wanted the readers eyes to naturally happen upon that paragraph and thusly, on the plight of the shoemakers in San Francisco. Additionally, this document uses the informal subject when addressing the reader utilizing subject words like you and our referring to industry and the city of San Francisco. It is likely then that thi s document represented some type of anti-Japanese propaganda that was, in actuality, based more on race than on business practices. Within the document there is ample proof for the argument that the AmericanShow MoreRelatedDemystifying Six Sigma - a Company-Wide Approach to Continuous Improvement22857 Words   |  92 Pagesbenchmark for service and administrative quality. This success was based on creating a Six Sigma culture in which goals and objectives were clearly defined and communicated, the creation of a six-step continuous improvement model utilizing the JUSE (Japanese Union of Scientists and Engineers) seven problem-solving tools, and the effective management of the change. This book is written so that others can learn and apply these techniques. This book consists of three sections. Section One is about howRead MoreTeam Work and High Performance Organization21591 Words   |  87 PagesEstonia, Finland, France, Germany, Hungary, Italy, the Netherlands, Portugal, Romania, Spain, Sweden and the United Kingdom. The information on quantitative and qualitative research from the national correspondents is combined with statistical analysis of data from the European Working Conditions Survey (EWCS) of 2000/2001, which makes it possible to compare the individual participating countries. The third EWCS, from 2000, provides data for the EU15 countries, and the same survey was appliedRead MoreA Study on the Effectivity of the Philippine Prison System10770 Words   |  44 Pagesand there was no single prison system in the Philippines. As a matter of fact, imprisonment as a penalty for law-violations was unheard of. There were no prisons to house any felon since punishment was mainly retributive in character. 7 Some historical documents such as the Code of Kalantiao (1433) prescribed death, incineration, flagellation, mutilation, swimming under water for a fixed time, ant treatment and fines . Those guilty of recidivism were beaten to death or exposed to ants for 1 day. SlaveryRead MoreOrganisational Theory230255 Words   |  922 Pages48 48 48 . viii Contents Chapter 2 Modernist organization theory: back to the future? Introduction Modernist organization theory in context What is modernism? Modernism and architecture What is modernist organization theory? The historical roots of modernist organization theory Classical theory of organization Modernist organization theory: an overview The modernist ontology: the ordered world of the modernist organization The epistemological level: the scientific approach to organizationRead MoreOperational Risk Management50825 Words   |  204 Pages2.3.5 Integration into Bank-Wide Capital Allocation and Risk Management 2.4 Operational Risk Management as a Cycle 2.5 Risk Identiï ¬ cation and Assessment 2.5.1 Self-Assessment (Risk Inventory) 2.5.2 Loss Database 2.5.3 Business Process Analysis 2.5.4 Scenario Analysis 2.5.5 Key Risk Indicators (KRIs) 2.5.6 Quantiï ¬ cation of Operational Risk 2.5.7 Exemplary Approaches to Calculating Regulatory Capital 2.6 Risk Treatment 2.6.1 Risk Avoidance 2.6.2 Risk Mitigation 2.6.3 Risk Sharing and Transfer 2.6.4Read MoreManag ement Course: Mba−10 General Management215330 Words   |  862 Pagesresponsible not only for assembling cars but also for continuously ï ¬ nding ways to increase quality and reduce costs. By 1970, Japanese managers had applied the new lean-production system so efï ¬ ciently that they were producing higher-quality cars at lower prices than their U.S. counterparts. By 1980 Japanese companies dominated the global car market. To compete with the Japanese, managers of U.S. carmakers visited Japan to learn the new management principles of lean production. As a result, companiesRead MoreStrategic Marketing Management337596 Words   |  1351 PagesStrategic and marketing analysis 2 Marketing auditing and the analysis of capability 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Learning objectives Introduction Reviewing marketing effectiveness The role of SWOT analysis Competitive advantage and the value chain Conducting effective audits Summary 3 Segmental, productivity and ratio analysis 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 Learning objectives Introduction The clarification of cost categories Marketing cost analysis: aims and methods An illustrationRead MoreDeveloping Management Skills404131 Words   |  1617 PagesLine 58 Understanding and Appreciating Individual Differences Important Areas of Self-Awareness 61 Emotional Intelligence 62 Values 65 Ethical Decision Making and Values 72 Cognitive Style 74 Attitudes Toward Change 76 Core Self-Evaluation 79 SKILL ANALYSIS 84 Cases Involving Self-Awareness 84 Communist Prison Camp 84 Computerized Exam 85 Decision Dilemmas 86 SKILL PRACTICE 89 Exercises for Improving Self-Awareness Through Self-Disclosure 89 Through the Looking Glass 89 Diagnosing Managerial CharacteristicsRead MoreLibrary Management204752 Words   |  820 Pages . . . . . . . . . . . . . . . . . . . . 35 The Learning Organization . . . . . . . . . . . . . . . . . . . . . . 35 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Library and Information Center Management: The Historical Perspective . . . . . . . . . . . . . . . . . . . . . . . 36 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3—Change—The Innovative Process . . . . . . . . . . . . . . . . . 41 Factors Promoting Change . . . .Read MoreHemp Cultivation in China42289 Words   |  170 Pagesa Chinese-Dutch joint venture Figure 1. Shandong hemp farmers use traditional methods to grow and process their crop. invested in the hemp mill and began to influence the local cultivation, market structure, and processing of hemp. This article documents the traditional hemp farming practices and current market situation, especially with reference to the sudden and rapid changes brought about through the influence of Western agricultural advisors, modern cultivation equipment and the introduction

Wednesday, May 6, 2020

Analysis Of The Book The Adventures Of Huckleberry Finn...

Underestimation on the Mississippi History has proven itself again and again with the simple fact that social classes dictate how human lives are treated. The major aspects in life are directly impacted by what social class someone is in. This dictates many things including who this person affiliates himself with and what kind of quality life that person will live. This is very evident in antebellum south. Slavery is at its peak in this time, and half the population are slaves. In the book, The Adventures of Huckleberry Finn by Mark Twain, Huck and Jim travel down the Mississippi river, and encounter a lot of the aspects of the antebellum south. Because of the society Huck has grown up in, he often overlooks his traveling companion, Jim. Throughout the story, Twain creates a division, that widens as the story evolves, between how Huck views Jim and how the reader views Jim as a person. This theme happens in almost every part of the book and it is very clear that Huck underestimates Jim. Jim is a runaway slave that Huck is helping, and this leads Huck to underestimate him, even though Huck acknowledges the fact that Jim is smart multiple times. Jim is presented in the beginning of the book as at most, a side character. No one really expects anything amazing out of him, including Huck and the reader. But as the adventure picks up, the views of Jim from Huck and the reader quickly divide. Mark Twain separates himself from the book altogether on the first pageShow MoreRelatedAnalysis Of The Book The Adventures Of Huckleberry Finn By Mark Twain Essay1492 Words   |  6 Pagesyourself another†. TAG (Title, author, genre): The Adventures of Huckleberry Finn, Mark Twain, satire full of adventure Context/Background: The story follows a teenager boy as he sets off on an adventure with Jim, a runaway slave. Together, they overcome a variety of obstacles and experience what it’s like to go off in the real world. Thesis: Throughout the novel, Mark Twain frequently Southern society through the use of satire. By doing so, Twain ridicules hypocrisy when he satirizes Miss WatsonRead MoreAnalysis Of The Book Adventures Of Huckleberry Finn By Mark Twain Essay2138 Words   |  9 Pages Period-4 MAJOR WORKS DATA SHEET Advanced Placement English Language and Composition Title: Adventures of Huckleberry Finn Author: Mark Twain Date of Publication: 1999 Genre: Satire Explain what makes this work an example of this genre. Explain what makes this work an example of this genre. Satire means to use irony, humor or exaggeration to show the context of society.I think that Twain uses Satire to compare the irony of life back then as it is today. Biographical Information aboutRead MoreAnalysis Of The Book Adventures Of Huckleberry Finn By Mark Twain1917 Words   |  8 PagesStereotype in Adventures of Huckleberry Finn Civilization evolves over time, trading old ideas for new ones. Society grows in intellect and innovation. Though, despite the heights that humanity has soared, impurity still remains. Regardless of the best efforts, millennia of oppression have ingrained the tendency to hate into the psyche of man, despite centuries of reform. Racism continues to propagate every corner of the globe. Yet, in his modern American novel, Adventures of Huckleberry Finn, Mark TwainRead MoreHuckleberry Finn and the use of Satire Essay1109 Words   |  5 Pages Huck Finn and the use of Satire Mark Twains The Adventures of Huckleberry Finn has been controversial ever since its release in 1884. It has been called everything from the root of modern American literature to a piece of racist trash. Many scholars have argued about Huck Finn being prejudiced. In The Adventures of Huckleberry Finn, Mark Twain uses satire to mock many different aspects of the modern world. Despite the fact that many critics have accused Mark Twain’s novel of promoting racismRead Morehuck finn introduction7490 Words   |  30 Pages Huckleberry Finn’s Road to Maturation Huck states to Judge Thatcher Please take it, and dont ask me nothing—then I wont have to tell no lies† (16). That quote is said by Huck to Judge Thatcher when Huck finds his pap is in town and pap will try to take his money. The Maturation of Huckleberry Finn is important because its about Huck making the right decisions to help him and Jim to freedom. The Adventures of Huckleberry Finn, by Mark Twain, begins with Huck introducing himself. He is wild andRead MoreAnalysis Of Mark Twain s Works Made A Huge Impact On Readers And Literary Critics1288 Words   |  6 Pages2/26/17 P:2 Outline Mark Twain’s works made a huge impact on readers and literary critics. His writing occurred during both the romantic and realist time eras in American Literature. He has simple, seemingly artless narrators and an understated style leads readers to arrive at the social commentary of his narratives on their own. Mark Twain’s writing influenced society because he created a new perspective on life with the views pointed out in his books. The distinctive trait of Twain s was his senseRead MoreAnalysis Of Mark Twain s The Adventures Of Huckleberry Finn And Henry James1557 Words   |  7 Pagesmisjudgment between Americans and exotic immigrants. Those famous authors like Mark Twain and Henry James wrote down social and psychological transformations bring out in the nation by creating removed, impartial status of daily life. In order to bring readers to be fascinated and thoughtful by their novels and to depict their character and the reader’s setting to life, Mark Twain in the adventures of Huckleberry Finn and Henry James showed the reality of life in his story Daisy Miller. There areRead More Huck Finn Essay900 Words   |  4 Pages Tim Lively Critical Analysis: The Adventures of Huckleberry Finn Setting: Late 1800’s along the Mississippi River Plot: When the book begins, the main character, Huck Finn possesses a large sum of money. This causes his delinquent lifestyle to change drastically. Huck gets an education, and a home to live in with a caring elderly woman (the widow). One would think that Huck would be satisfied. Well, he wasn’t. He wanted his own lifestyle back. Huck’s drunkard father (pap), who had previouslyRead MoreThe Adventures Of Huckleberry Finn By Mark Twain1854 Words   |  8 PagesThe Adventures of Huckleberry Finn by Mark Twain is a one of a kind novel. The novel has been debated as controversial since it has been published in 1986. It has been considered racist, due to the â€Å"n† word. In its earlier days, racist people felt this book was a disgrace, because of the mingling of the two main characters. Among all of the negative comments, this book is truly a ma sterpiece. It is an unforgettable and enjoyable book for everyone to learn and scrutinize; it contains a multitude ofRead MoreHuck Finn Essay1835 Words   |  8 PagesThe Adventures of Huckleberry Finn By Mark Twain By Brenda Tarin British Literature 2323 Lois Flanagan January 27, 2009 Tarin ii I. Introduction II. Biographical sketch of author A. Past to present B. Experiences and achievements III Plot analysis A. analysis of plot structure 1. Exposition 2. Complication 3. Crisis 4. Climax 5. Resolution B. Theme of plot IV

Consent And The Potential Effects Of Affirmative Consent...

1. TITLE: Consent and What It Means to Utah College Students 2. OBJECTIVE This research is to determine students understanding of what sexual consent is and the possible effects of affirmative consent being implemented schools. The theory is that individuals do not have a common understanding of what sexual consent is. The hypothesis is that in college campuses, students have an unclear understanding of sexual consent, affirmative consent would decrease misunderstandings of consent and ultimately decrease sexual abuse. Requiring affirmative consent may decrease the vagueness of nonverbal consent and encourage parties to make it explicitly clear that they are interested in sexual activity. This study will compare the results of a survey between universities and colleges in Utah for a comprehensive view on attitudes towards affirmative consent. More than half of sexual abuse and rape victimizations are the result of behavior other than force, such as coercion, which puts additional emphasis on the possible relationship between affirmative consent and victimi zation. Data gathering will be done through electronic surveys distributed at colleges and universities in Utah and contain quantitative, closed ended questions only. 3. RESEARCH QUESTIONS Several schools have started enacting affirmative consent requirements, which requires sexual partners to get explicit consent before participating in sexual activity. These questions are important to answer as to the possibleShow MoreRelatedThe Effects Of Gender And Steroid Use On Body Image Dissatisfaction And Distortion Among College Age Bodybuilders Essay1664 Words   |  7 Pages‘Body Image dissatisfaction and distortion, steroid use, and sex differences in college age bodybuilders.’ Under the section ‘Steroid use’ it is made fairly clear towards the end of the paragraph that the main aim of this study is to evaluate the effects of gender and steroid use on body image dissatisfaction and distortion among college age bodybuilders. Based on my interpretation and overall understanding of Quantitative research, I will evaluate/critique this article with professionalism and disciplineRead MoreA Note On The New Baltic Bank1889 Words   |  8 Pagesguarante es, indemnity, and negotiated terms. Moreover, the last section which is the boilerplate section. Key clauses that the lender should be looking for in the loan agreement are lenders rights and obligations, material adverse changes, Default/ Potential default, undertaking, interest, Prepayment, Representation and warranties, Increased costs, Margin and security. Also Fees, costs, expenses as well as the terms of how the Facilities are to be repaid. Other important clauses are Transfer provisionRead MoreSexual Assault Policy During The United States2221 Words   |  9 Pagesoccurs without the explicit consent of the recipient.† This definition is used to create and coordinate policies that address the problem – however, it faces some issues on the state level due to terminology that impact policy on many levels – and often causes confusion. The definition of consent, however, varies from state to state, creating a more complicated picture which contributes to dilemmas surrounding sexual assault. Questions surrounding when a person can give consent, when it c an be revokedRead MoreLight Leadership Initiative1690 Words   |  7 Pagesinformal settlements, compared to an astounding 41% of the urban population in developing regions. Furthermore the report projected that within the next 30 years the number of people living in informal settlements would reach nearly 2 billion if no affirmative action is taken. With these figures being on the increase Millennium Development Goal 7 target 11 sets out to ameliorate the lives of at least 100 million people living in slums by 2025 (UN, 2000). Consequently this has placed emphasis on theRead MoreOrgan Donation1872 Words   |  8 Pageslaw requires that the donor make an affirmative statement during his or her lifetime that he or she is willing to be an organ donor (Donate Life America). Many states encourage donations by allowing the consent to be noted on the driver’s license. Another alternative is expressed notification to one’s family or doctor that he or she wishes to be an o rgan donor. Since an explicit consent by the individual is required, the opt-in system is considered a â€Å"pure consent system† (Matesanz). Individuals inRead MoreComparing California, Massachusetts, And New York s Pay Equity Statutes Essay1742 Words   |  7 Pagestoward certain state legislatures augmenting pay equity statutes have been deemed â€Å"sweeping changes† as compared to the stagnancy of federal pay equity statutes. New York and California enacted pay equity statutes at the end of 2015 that went into effect at the beginning of 2016. A session law enacted in Massachusetts in 2016 expands that state’s pay equity provisions in â€Å"impactful† and â€Å"noteworthy† ways in comparison to other states’ laws. These three states’ significant expansions of pay equityRead MoreProtecting Tyrone From Becky : Sexual Assault, Lies, And Balancing Women S Rights With Racial Solidarity Essay1904 Words   |  8 Pageshand. Beca use the history of falsehood and sexualization of black body, black women are skeptical of rape allegations. At the same time, due to the history of violence against women, black women do not want to ignore the importance of autonomy and consent. Let’s examine the Bill Cosby rape allegations. Bill Cosby philanthropic endeavors coupled with his commitment to providing entertainment to the Black community made Bill Cosby almost untouchable. The Cosby Show was one of the biggest hitsRead MoreOrgan Donation And Organ Organs Essay1308 Words   |  6 Pagesportrait of how these issues may be resolved. As a result, the mission of organ donations are to restore organs for their patients and to promote, education, empower altruism and quality ethics as a resource for existing and potential donors Organ donations has been perceived by potential organ donors to be inhumane activity, a dishonor to the humanized process, circulation of illegal revenue, and conceptual grounds needs to be consistent with altruism as the empowered outcome. Inhumane activity is theRead MoreOrgan Donation : Organ Donations Essay1323 Words   |  6 Pagesportrait of how these issues may be resolved. As a result organ donation mission is to restore organs for their patients and to promote, education, to empower altruism, and quality ethics as a resource for existing and potential donors. Organ donations have been perceived by potential organ donors to be inhumane activity, dishonor a humanized process, circulation of illegal revenue, existing donors, and conceptual grounds as a resort consistently with altruism as the empowered outcome. Inhumane activityRead MoreClinical Research Past and Present6962 Words   |  28 Pagesfor these disasters was that there were no regulations governing the protection of human beings; and there were no guidelines for safety and efficacy of a new medication or treatment prior to the use in humans. Now regulations and guidelines are in effect for the protection of human subjects. These guidelines and regulations also protect the researchers. These regulations have enabled the researchers to further scientific knowledge of diseases and the etiology, along with the bioavailability, toxicology

Black Holes Infinity And BeyondIf Theories Of The Essay Example For Students

Black Holes: Infinity And BeyondIf Theories Of The Essay ir Existence Are True, Black HBlack Holes: Infinity and BeyondIf theories of their existence are true, black holes are the most powerful force in the known physical universe. Many people are familiar with the term black hole, but few people actually know anything about them. A black hole forms as a result of a massive star running out of fuel to burn (Chaisson, 193). Once the star is no longer exerting outward force by burning off gases, it begins to collapse under its own intense, inward gravity (Chaisson, 193). It is like slowly letting the air out of a balloon. Once the star is compacted to a certain size, while its mass, or weight, remains the same, its gravity becomes so powerful that nothing can escape it (Hawking, 87). This critical size to weight ratio is known as the Schwarzchild Radius (Hawking, 87). Once a black hole is created in this way, an invisible area, or line around it exists. If any object crosses this line, it can no longer escape the gravitational force of the black hole (Hawking, 87). This line is called the event horizon (Hawking, 87). If black holes are proven to exist, beyond theoretical physics, then they would probably be a very common anomaly in this universe. In 1915, Albert Einstein put forth the first real proposition of such an anomaly in his Theory of Relativity (Bunn, Black Holes FAQ). In the 1930s, three physicists, doctors Volkoff, Snyder and Oppenheimer, were able to prove the validity of black holes mathematically. Since then, black holes have become a very important and integral part of science and the over all understanding of the universe. It has been proven, mathematically, that black holes have infinite, gravity based, escape velocities and an immense effect on light, time and even the very fabric of space. All bodies in space have gravity. According to Einsteins Theory of Relativity, this is because bodies with a large mass, or weight, actually warp space (Chaisson, 77). For example, if a two dimensional sheet of cloth, stretched and suspended at four corners, represents space, and a bowling ball is placed in the center, the sheet will warp downward. If a golf ball is then set at the edge of the sheet and allowed to move freely it will be attracted toward the bowling ball, unless the golf ball is traveling at a speed great enough to not be effected by the curve. This critical speed is known as an escape velocity. This is the speed at which an object must travel to escape a bodys gravitational force (Chaisson, 77). If a body is compacted, such that its weight stays the same but its radius, or size, becomes smaller, its escape velocity increases in parallel (Chaisson, 196). The simple formula for this, in physics, states that a bodys escape velocity is equal to the square root of its mass, divided by its radius (Chaisson, 77). For example, if a bodys mass is two-hundred, and its size is twelve and one half, the escape velocity would be four. If the size of the same body is reduced to two, while its mass remained at two-hundred, the escape velocity increases to ten. Since a black holes size is always decreasing and its weight is always the same, the escape velocity is infinite (Chaisson, 195). This means that nothing can escape a black hole past the event horizon, not even light. Light is made up of waves and particles. It was discovered, in 1676, by Danish astronomer, Ole Christenson, that light travels at a very high, but finite speed (Hawking, 18). .u00454c69498c44611bbed1706ae84b86 , .u00454c69498c44611bbed1706ae84b86 .postImageUrl , .u00454c69498c44611bbed1706ae84b86 .centered-text-area { min-height: 80px; position: relative; } .u00454c69498c44611bbed1706ae84b86 , .u00454c69498c44611bbed1706ae84b86:hover , .u00454c69498c44611bbed1706ae84b86:visited , .u00454c69498c44611bbed1706ae84b86:active { border:0!important; } .u00454c69498c44611bbed1706ae84b86 .clearfix:after { content: ""; display: table; clear: both; } .u00454c69498c44611bbed1706ae84b86 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u00454c69498c44611bbed1706ae84b86:active , .u00454c69498c44611bbed1706ae84b86:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u00454c69498c44611bbed1706ae84b86 .centered-text-area { width: 100%; position: relative ; } .u00454c69498c44611bbed1706ae84b86 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u00454c69498c44611bbed1706ae84b86 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u00454c69498c44611bbed1706ae84b86 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u00454c69498c44611bbed1706ae84b86:hover .ctaButton { background-color: #34495E!important; } .u00454c69498c44611bbed1706ae84b86 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u00454c69498c44611bbed1706ae84b86 .u00454c69498c44611bbed1706ae84b86-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u00454c69498c44611bbed1706ae84b86:after { content: ""; display: block; clear: both; } READ: Developmental Views of Parenting Style and Effecti Essay These properties of light govern that it must be subject to forces of nature, such as gravity. Light travels at such a high speed that it is not observably effected by gravity, unless that gravity is very strong. A black holes gravity is powerful enough to trap light because its escape velocity, being infinite, exceeds the speed of light (Hawking, 82). This is why a black hole is black. Once light crosses the event horizon it is drawn into the hole in space. Although the light is still hitting objects, it is not able to bounce off to indicate their existence to an observer, therefor the black hole appears as a void in space. Closing in on the edge of the event horizon, light travels back to an observer at a slower and slower rate, until it finally becomes in.. visible. This is due to heavy gravity and the effect that a black hole has on time (Bunn, Black Holes FAQ). According to Einsteins General Theory of Relativity, time is not a constant (Hawking, 86). Time is relative to an observer and his or her environment (Hawking, 86). It has been proven that time moves slower at higher speeds (Hawking, 86). An experiment was conducted in which two synchronized atomic clocks were used. One was placed in a jet and flown around the Earth at three times the speed of sound, while the other was left stationary, on the ground (Hawking, 22). When the jet landed and the clocks were compared, the one in the jet displayed an earlier time. This leads to the reasoning that time is just as volatile as light or dirt. In cosmology, a singularity is an event or point that has a future or a past, but not both (Hawking, 49). In human life, death would be considered a singularity. A black hole is also considered a singularity. If an object crosses the event horizon of a black hole, it relatively ceases to exist, it has no future (Hawking, 88). Absolutely nothing in the known universe can survive in or escape from a black hole, so it can be said logically that time is stopped within the event horizon. The only way for an object to escape this fate would be for a strange anomaly to occur in the fabric of space, caused by a theoretically different type of black hole. If the mathematics that describe a black hole are reversed, the outcome is an object called a white hole (Bunn, Black Holes FAQ). As the complete opposite of a black hole, a white hole is an object into which nothing can fall and objects are only spit out (Bunn, Black Holes FAQ). At this point, white holes are strictly theory. Their existence is highly improbable. If certain properties, such as motion or a positive or negative charge are applied to a black hole, then the possibility of a white hole forming within the event horizon arises (Bunn, Black Holes FAQ). This leads to an even more improbable occurrence called a wormhole (Bunn, Black Holes FAQ). In theory, a wormhole would truly be a tear in the fabric of space. Since time essentially has no effect on a black or white hole, if an object were to fall into a worm hole, it could conceivably be spit out anywhere in time or space (Bunn, Black Holes FAQ). If an object falls into a black hole, which has undergone the transformation into a wormhole, it could probably avoid hitting the singularity (Bunn, Black Holes FAQ). Therefor it would not be turned into spaghetti and compacted to the size of a base particle. Instead, it would follow the closest thing to a straight line that it could find, which would be to slip completely through the wormhole (Bunn, Black Holes FAQ). It sounds impossible, but it looks good on paper. If wormholes could exist, according to calculations, they would be highly unstable (Bunn, Black Holes FAQ). If anything were to disturb it, like an object passing through it, it would likely collapse (Bunn, Black Holes FAQ). .ufa85a15a5a2905e7c9f502fb064c9c3b , .ufa85a15a5a2905e7c9f502fb064c9c3b .postImageUrl , .ufa85a15a5a2905e7c9f502fb064c9c3b .centered-text-area { min-height: 80px; position: relative; } .ufa85a15a5a2905e7c9f502fb064c9c3b , .ufa85a15a5a2905e7c9f502fb064c9c3b:hover , .ufa85a15a5a2905e7c9f502fb064c9c3b:visited , .ufa85a15a5a2905e7c9f502fb064c9c3b:active { border:0!important; } .ufa85a15a5a2905e7c9f502fb064c9c3b .clearfix:after { content: ""; display: table; clear: both; } .ufa85a15a5a2905e7c9f502fb064c9c3b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ufa85a15a5a2905e7c9f502fb064c9c3b:active , .ufa85a15a5a2905e7c9f502fb064c9c3b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ufa85a15a5a2905e7c9f502fb064c9c3b .centered-text-area { width: 100%; position: relative ; } .ufa85a15a5a2905e7c9f502fb064c9c3b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ufa85a15a5a2905e7c9f502fb064c9c3b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ufa85a15a5a2905e7c9f502fb064c9c3b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ufa85a15a5a2905e7c9f502fb064c9c3b:hover .ctaButton { background-color: #34495E!important; } .ufa85a15a5a2905e7c9f502fb064c9c3b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ufa85a15a5a2905e7c9f502fb064c9c3b .ufa85a15a5a2905e7c9f502fb064c9c3b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ufa85a15a5a2905e7c9f502fb064c9c3b:after { content: ""; display: block; clear: both; } READ: echnology vs. Humanity Essay Though the equations are valid, wormholes most assuredly do not exist. If they did it would probably send shivers up the science fiction communitys spine. In the book, Relatively Speaking, the Author, Eric Chaisson says, The world of science is littered with mathematically elegant theories that apparently have no basis in reality (182). Although black holes have not been conclusively proven to exist, there is strong evidence, in the observable universe, that they do. Black holes are very important to the world of cosmology. They allow for the study of common particles under very uncommon environmental variables. Scientists have vastly increased their knowledge of the universe and the properties of matter through the study of a black holes effects on light, time and the fabric of the space.Works CitedBunn, Ted Black Holes FAQ. NSF Science and Technology Center (September 1995): Online. Internet. http://physics7.berkeley. edu/Bhfaq.HTML Chaisson, Eric. Relatively Speaking: Relativity, Black Holes, and the Fate of the Universe. New York: W. W. Norton Company, 1988. Hawking, Stephen. A Brief History of Time: From the Big Bang to Black Holes. New York: Bantam Books, 1988.

Tuesday, May 5, 2020

Spoof Email Phishing Scams and Fake †Free Samples to Students

Question: Discuss about the Spoof Email Phishing Scams and Fake. Answer: Introduction Phishing also termed as Spoofing is a type of computer crime in which a victim or victims are communicated either through electronic mail, text message, or mobile phone for coaxing the individuals to procure the sensitive information like personal information, banking details, credit card details, and security pin. This information is then utilized to acquire the significant accounts and can leads to monetary theft. The first phishing case was registered against a teenager belonging to California. He imitated the website called America Online and performed the illegitimate access of the users sensitive details like credit card details for withdrawing the money from their own bank accounts. In addition to website and electronic mail phishing, there exists vishing or voice phishing, smishing or SMS phishing, etc. The Anti-Phishing Working Group (APWG) defines phishing as Internet hackers are utilizing the electronic-mail enrapturing to fish for the security pin and monetary information from the sea of Internet users. The phishing attacks can be performed by the following methods illustrated below: The money making offers and attention-grasping emails are created to draw the peoples observation instantly. For example, many scammers assert that you win a lottery, or some other expensive price, iPhone, etc. These types of doubtful emails should not be clicked. One of the preferred strategies used among the hackers is to make you to act as soon as possible. Some of the emails notify that you have only short amount of time to respond (Bright, 2004). When the user receives these types of emails, they should ignore it. Sometimes, the hackers will notify the users that their account will be deleted until the users update their personal information instantly. Most of the legitimate enterprises offer more time before the termination of the user accounts and they do not ask the customers to update the sensitive information over the Internet. The customers must go to the source website directly rather than using the email link to avoid the confusion. The hyperlink looks like the actual URL of the website but the user will be forwarded to some other website or any other famous websites with some mispellings after clicking it. For example, www.bankofarerica.com the m in the actual approved website is misgiven as r. If the user views the unexpected email attachments, it should not be opened. They contain malware information like virus or ransomware. The safer file that can be clicked anytime is a text (.txt) file. If the message received by the user arrives from the trusted or un-trusted persons, and if it contains any usual, unrelated, or suspicious information, this particular message should be deleted. Trojan Horse is a malevolent software or malware that is pretended as the approved legitimate software. The malwares can be uploaded by viruses, or without the awareness of the user, having a line of thought that the software is a utility of an internet browser plug-in. It can also be inaugurated through Internet Relay Chat sites. Most of the phishing attacks utilize the Trojan Horse to induct key loggers for obtaining the users details and the bank account numbers. These type of images contain username, credit card numbers, or passwords that are sent to the phishing attackers. The security holes are present in the web browsers that can easily accomplish the phishing attacks. The hacker incorporates a URL into the e-mail by using the given format: When the user places the mouse cursor over the link, the link appears to be www.legitimatesite.com; But the link navigates to the malicioussite.com, where the counterfeit webpage is provided. This insecurity hole is resolved by the Microsoft, but another security hole can be intruded by the attackers at any time. Malevolent Javascript: According to the Anti-Phishing Working Group, one of the main phishing technique used is employment of the Java scripting for creating hoax browser address or other portion of the browser consolidation called as Chrome. The Javascript changes the address bar, menus, status bar, etc (Festa, 2005). When the user keys in the URL in the address bar, the malevolent software code can forward the users to the fraud web site. The cross-site scripting injects the malevolent codes into the web application. If the login page of the bank web application is not well crafted and is not provided better validation, the malevolent software code can be injected and executed on that web site. An attacker could make the user to use the link for the vulnerable website and draft the web address that his malevolent software code executes on the bank web application. The user will think that he is browsing securely on the bank web application, when the malicious code is executed. Phishing attacks are getting increased and are evolved through various methods ranging from spear phishing to CEO fraudulent. It places the risk to all the users who are having email accounts. The phishing attacks are successful and popular for the following reasons provided below: The lack of extensive training in phishing and other virus attacks is the key reason for the success of these attacks. The research states that 6% of the users never procured the safety recognition training (Gonsalves, 2013). If the employees are given the security awareness training, they can easily detect the phishing attacks and perform the action accordingly. The users should be trained on the scams and malicious emails that they encounter on social media websites. Insufficient Diligent Performance of the Enterprises The firms are not performing enough to suppress the risks related to phishing and malevolent software. The lack of backup processes and the inability to detect the untrained users who need extensive training is another reason for the success of phishing attacks. The lack of strong intrinsic control methods makes the organizations to be affected largely by the CEO process. Most of the cyber criminal firms contain larger funds, which in turn makes them to gain additional expertise in phishing and allows them to perform more difficult phishing attacks. The utilization of the Dark Web has reduced the value of the stolen data and the cost of remittance record is reduced from 25 dollars in 2011 to 6 dollars in 2017, and so the cyber offenders changes their line of focus on innovative ways for earning more money as before (Gray, 2013). Subsequently the offenders discovered a fund source through data owners, where they focus by means of phishing and ransom worm attacks. By scared of data loss, data owners will think more before expending the money to the cyber criminals.ls The phishing tools and ransomware-as-a-service availability provides easy opportunity to the hackers for making an entry into the market and make a competition with experienced criminal firms. Starting the first action of stealing the users information into clicking illegitimate links to the recent CEO fraudulent activities, the skill sets or expertises of the criminals are enhanced. There is a prediction of more type of threats like ransom worms by this year. Importance of handling phishing attacks on organizations Over the past years, there is lavish growth and success of spear phishing threats that provide severe consequences for business organizations. The spear phishing is related with many cyber crimes including the top organizations like JPMorgan Chase Co., Sony, Ebay, Target, etc (Barret, 2007). A survey is conducted by the research organization Vanson Bourne to enquire 300 technology decision makers regarding the organization perspective. Based on the survey, almost 80% of the interviewed decision makers told that spear phishing threats is the enterprise main security concern. According to the IT professionals, spear phishing is a top vulnerability faced by many top organizations today. The survey is primarily performed to collect the organization information based on the overall cyber attacks percentage represented by spear phishing. The 84 percentage of the users responded that their security defending mechanisms are penetrated by the spear phishing over the past 12 months (Jack, 2010). Moreover, 38% cyber attacks are encountered in organizations (Moulds, 2006). These are costlier attacks as the average cost over all organizations attacked by spear phishing threats was 1.6 million dollars. Email is highly prone to the spear phishing attacks. Moreover, 1 in 6 firms is affected by the reduction in their stock price. The phishing was defined as the utilization of scam emails that are designed as original mail from the trusted source like banks, E-commerce sites, or auction websites (Jack, 2010). Recently, the phishing is performed by various new social methods for hacking the sensitive information of the users. For example, there will be an invitation for filling out the survey containing questionnaire on personal information and account information of the users for any other banking websites with cash reward. Then the users will be asked to verify the credit card details stored by the users in the secure website for the purpose of registration. Currently the phishing definition has transformed to carry out several financial cyber crimes. Once the malicious code enters into the physical computer, it uses several techniques to lure on web site communication details and account details. The phishers contain various tools performing many illegal activities given below: Hosting phishing websites Botnets Technical Deception Hijacking of the communication session Exploitation of Domain Name Service (DNS) system Functional Malware There has been distressing increase in the usage of social media as a platform for performing the phishing attacks. In the year 2016, there is 150 percentage increases in the phishing attack on social media (Dworak, 2003). It is also known as angler phishing and involves the hackers having fraud social media accounts, posting popular brands, banks, etc for procuring the unauthorized access to the accounts of the users, users financial details, or other sensitive information. A phishing tactic used in social websites like Facebook and Twitter are the latest examples containing a fraudulent Barclay customer service that lure the users conversations by means of online support. Phishing attacks are the real threats that all organizations should deal with. The cyber criminal firms are utilizing phishing as a threat that incurs with improved frequency and high sophistication level. These attacks are real threats in both the business and in personal lives of the users. The organizations should invest for preventive measures and must contain a quick response plan against the phishing threats. They should provide training to the staff regarding the phishing dangers and actions after encountering these types of attacks. Process for preventing phishing in organizations: Employing a systematic vision and convey it The leadership of an enterprise should employ a systematic vision of protecting and securing the sensitive information properties across users, methods, and various technologies (Hurst, 2014). This vision should be transferred all over the enterprise and are constantly employed. Creating an information administration plan - The enterprises must create an information administration strategy inclusive of the differentiation and administration of the sensitive information. Counterfeit Phishing Attacks - The firms should assume the phishing threats for measuring the efficiency of the training and record the responses. This analysis helps the enterprises to spot the individuals who require intensive training and for identifying the security rules and policies. Create a feedback process By creating the milestone feedback process, which defines the main responsibilities, intrinsic, and extrinsic arrangements throughout the milestone, an enterprise can make the employees to defend various cyber crimes. Moreover, the firm should verify its ideas regularly for ensuring that the employees are able to respond for the cyber attacks and the created process are more efficient. Combating Phishing Attacks using Technology Update Antivirus and Antispyware software regularly Effective administration of applications like add-ons of web browser such as Adobe Flash and Java are the main components for the efficient defence against the cyber crime attacks. An enterprise must make sure that the installed antivirus software, patches of operating systems, and patches of applications are updated for increasing the overall safety and security against the cyber crimes. Incorporate dual factor authentication The enterprises should incorporate dual factor authentication for access of the information from remote location. The dual factor authentication is based on both the password and cell phone that a message is transferred to for obtaining the remote access. For example, if an employee discloses the password without his knowledge, the phishing will not be performed by the attacker since he does not know the second factor (Gelles, 2014). Restrict the system administration admittance of their workstation Most of the employees do not require the system administration access for their desktop computer or laptops. Therefore, by restricting the administration entrance to those employees, they will be able to complete their jobs and the execution of the phishing attack through malware codes can be avoided. Conclusion: The phishing attacks impose severe threats to the users and the organizations dealt by them. The online scams are increasing substantially and the complicated methods are employed by the attackers for injecting the phishing attacks and malwares. There are no magical ways to keep these threats away. The users should be extensively given training on these online threats. The organizations should ensure that the online fraudulent and other scams are reported by their consumers. The security organization should find possible solutions to safeguard the emails and E-commerce websites. References: Bright, M. (2004, February 12). Spoof Email Phishing Scams and Fake Web Pages or Sites. Retrieved from https://www.millersmiles.co.uk/identitytheft/gonephishing.htm. Gelles, J. (2014, March 27). Consumer Watch: Phishing Scams Continue to Bite. Retrieved from https://www.philly.com/mld/philly/business/columnists Hurst, P. (2014, February 2). Millions at Risk from Cyber Phishing Gangs. Retrieved from https://www.crime-research.org/news/29.02.2004/95 Dvorak, J. (2013, April 5). Gone Phishing. Scams for Personal Information Are Getting Worse. Retrieved from https://abcnews.go.com/sections/ Jack, R. (2010, April 6). Online Phishing Uses New Bait. Retrieved from https://www.vnunet.com/News/1154101. Moulds, R. (2006, March 29). Whose Site is it Anyway?. Retrieved from https://www.net-security.org/article.php?id=669. Barrett, J. (2007, April 15). Phishing Fallout. Retrieved from https://msnbc.msn.com/id/4741306/. Gray, P. (2003, December 10). IE Bug Provides Phishing Tool. Retrieved from https://news.zdnet.co.uk/internet/security/0,39020375,39118421,00.htm Gonsalves, A. (2013, January 16). Latest Trojan Phishing for Personal Data. Retrieved from https://www.techweb.com/wire/story/TWB20040116S0007 Festa, P. (2005, December 10). IE Bug Lets Fake Sites Look Real. Retrieved from https://news.com.com/2100-7355-5119440.html?tag=nl.