Wednesday, July 31, 2019

A CLC assignment Essay

Your CLC group will interview four different people about the ethical dilemma selected for Part 1 of this assignment. After sharing the interview results, the group will make a written recommendation. For complete directions for this assignment, refer to â€Å"Collaborative Learning Community: Analysis of an Ethical Dilemma.† Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required. This assignment uses a grading rubric. Instructors will be using the rubric to grade the assignment; therefore, students should review the rubric prior to beginning the assignment to become familiar with the assignment criteria and expectations for successful completion of the assignment. You are required to submit this assignment to Turnitin. Refer to the directions in the Student Success Center. Only Word documents can be submitted to Turnitin. Collaborative Learning Community: Analysis of an Ethical Dilemma Collaborative Learning Community: Analysis of an Ethical Dilemma (Part 1) In your CLC group, select one of the following three options and view the video related to your chosen topic (a description of each is provided along with a link to access the electronic media): Dilemma 1: Embryo Harvesting and Freezing/Genetic Manipulation (Posthumous Conception Case) Ethical issues related to case: http://www.youtube.com/watch?v=EIenB7qgIVk Washington Post article of Karen Capato Case: http://articles.washingtonpost.com/2012-03-19/politics/35450022_1_karen-capato-robert-capato-survivor-benefitsUS Supreme Court (2011) Ruling on Capato Case: http://www.supremecourt.gov/opinions/11pdf/11-159.pdf Description: Eighteen months after her husband, Robert Capato, died of cancer, re ¬spondent Karen Capato gave birth to twins conceived through in-vitro fertilization using her husband’s frozen sperm. Should technology be used to create live posthumously? Dilemma 2: Marketing of Medical / Pharmaceutical Products http://planetgreen.discovery.com/videos/30-days-anti-aging.html. While medical treatments and pharmaceuticals are common approaches to address a wide variety of conditions, there is growing concern from consumer groups and the medical community regarding current marketing practices which result in overconsumption or no medical benefit. The medical industry however, argues that these technologies are revolutionary in relieving suffering. Consider the ethical dilemmas of this case. What are the possible ethical dilemmas and implications? Dilemma 3: Voluntary/Assisted Euthanasia Dax Case 1 http://www.youtube.com/watch?v=IsxaaMbZMtA&feature=related The Terry Schiavo Documentary http://www.youtube.com/watch?v=cki55BM42kw 1)The quality of life for two individuals has been dramatically affected following traumatic events. What are the ethical implications in the scenarios? What response should be given to the patient and family in response to their requests for assisted euthanasia? Write a formal paper of 750-1,000 words identifying important components of the topic. Include the following: a)A description of the topic and related ethical implications: i)Obligations to your profession and work as a nurse. ii)Laws regarding this topic. iii)Stake holders in this scenario. b)A summary of the impact on social values, morals, norms, and nursing practice. c)An explanation of how an ethical theory and/or ethical principle might be applied to address the chosen topic. 2)Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required. 3)Submit the assignment to the instructor by the end of Module 4. Collaborative Learning Community: Analysis of an Ethical Dilemma (Part 2) 1)In your CLC group, interview a hospital administrator, a spiritual  leader, a health care colleague, and a neighbor/friend. (A total of four different individuals must be interviewed by the group in-person or by telephone). a)Ask all individuals interviewed to share their philosophy and worldview in relation to the ethical dilemma your group identified for Part 1 of this CLC assignment. b)Summarize the responses of each of the four individuals interviewed. c)As a group, consider the responses of the individuals interviewed and assess their similarities/differences. 2)Compose a written recommendation (750-1,000 words), incorporating the research your group has done as well as the four interview results to come to a resolution to the ethical dilemma. Be sure to clearly articulate your group’s position and the rationale for your position. 3)Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required. 4)Submit the four interview summaries and the group resolution to the instructor by the end of Module

Tuesday, July 30, 2019

The Development of International Relations

INTRODUCTION This paper begins by outlining the definitions and what exactly is meant by international relations. Secondly, it tells the story of how and why the study of international relations emerged when it did, during the course of modern history.Even though, the history and the origins of this discipline alone does not reveal everything we need to know about how international relations functions in this day and age, it certainly would help us to understand the legacy left behind by this study’s original purpose, international gains and calamities, and by its traditional schools of thought; explanations starting from the time of the Great Powers, to the French Revolution, the first of the alliances, the Industrial revolution, the two World Wars along with the consequent Cold War, the formed international organizations such as the League of Nations and the United Nations, and finally, to where international relations stands today.The final outcome of this paper is to creat e a detailed understanding on the readers mind on how international relations developed into what it at present is – a science, or rather a field of study – during the course of the modern history, starting from the 16th century. WHAT IS INTERNATIONAL RELATIONS? International relations is a field of study that seeks to understand a variety of global issues, foreign affairs and the interactions of nations and states within the international system. International relations draw upon its expertise from a variety of other fields such as social science, including geography, history, sociology, political science, economics, law, etc†¦It is therefore a challenging field to master due to its both diverse and complex nature. Strictly defined, the field of International Relations (IR) concerns the relationships among the world’s governments. However, these so called world’s governments or in other words nation states, alone cannot regulate the events taking pl ace in international arena. They in fact are connected or rather influenced by other actors, namely, inter-governmental organizations (IGOs), international nongovernmental organizations (INGOs), non-governmental organizations (NGOs) and multinational corporations (MNCs) along with other social structures such as economics, cultural differences and ideology. Furthermore, the study of nternational relations has always been heavily influenced by normative considerations, such as the goal of reducing armed conflict and increasing international cooperation. International relations are an exceptionally important aspect of citizenship in a global society. As our world becomes smaller and smaller through communication technology, speedy air transportation and a complex international economy and interactions, the value of peaceful and cooperative relationships between nations is increasingly important. HISTORY The concept of international relations on some level is probably quite old, given that humans have been establishing governments and communicating with each other for thousands of years.Aspects of international relations have been studied for thousands of years, since the time of Thucydides, but IR became a separate and definable discipline in the early 20th century. However, many people agree that international relations truly began to emerge around the 15th century – the dawn of the modern era – when people started exploring the world and interacting with other governments and cultures. THE TREATY OF WESTPHALIA (1648) The modern international system is often dated from the Treaty of Westphalia in 1648, which established the principles of independent, sovereign stated that continue to shape the international system today. Many even consider this treaty, also knows as the Peace of Westphalia as the birth of international relations as a field of study.The Treaty of Westphalia was a series of peace treaties signed between May and October 1648 in Osnab ruck and Munster, Germany. These treaties ended the Thirty Years' War (1618–1648) in the Holy Roman Empire, and the Eighty Years' War (1568–1648) between Spain and the Dutch Republic, with Spain formally recognizing the independence of the Dutch Republic. These treaties resulted from a big diplomatic assembly, thus initiating a new system of political order in central Europe, between the Hapsburg alliance (Austria-Hungury and Spain) and the Protestant countries (France, Britain, Sweden). Later it was called by many parties as the Westphalian sovereignty. The key factor to this ystem was the ability of one state to balance the power of another state so that it could not obtain power of smaller units and create a universal empire, thereby forming a relationship between the many nations within the European terrain. THE FRENCH REVOLUTION (1789 – 1799) The French Revolution (1789–1799), was a period of drastic social and political turmoil in France and one tha t had a major impact not only on France but also throughout the rest of Europe. The absolute monarchy that had ruled France for centuries collapsed within a mere three year period. However, 5 directors established control of the French state in 1795 and held power until 1799, when it was replaced by the Consulate under Napoleon Bonaparte. Meanwhile, by the nearing end of the 18th century Britain’s power multiplied due to industrialization along with its rival at the time, France.What was once the great powers in Europe and the adjacent terrain were by this era beginning to decline, namely Sweden, Netherlands and the Ottoman Empire. Nevertheless, nations such as Russia and then followed by Prussia (the forerunner of modern-day Germany) also developed in to major players or rather great powers. THE NAPOLEANIC WARS (1803 – 1815) The Napoleonic Wars (1803–1815) were a series of wars declared against Napoleon's French Empire by opposing coalitions. The underlying cau ses for these Napoleonic Wars took place due to many reasons. For one thing, the French Revolution inspired a desire among the French to export the ideals of freedom, equality and union. As a result, neighboring monarchs, especially the British Empire, found this very threatening.Napoleon happened to be both brilliant and energetic in defending the state from its enemies. Eventually, the dynamics of war and the changes in revolutionary spirit made Napoleon King of France and the territories he had conquered. Now he became a different kind of threat as he wanted to maintain his popularity and control in France through conquest of neighboring states. Thereby France, a single, very powerful European state was regarded as a threat to world stability and had to be put down. One way or the other France was defeated at the Battle of Waterloo by an alliance of Britain, the Netherlands, Spain, Austria-Hungary, Russia and Prussia.Nevertheless, Europe’s’ supreme, the British empi re realizing the threat that another challenging nation (the Napoleon’s empire) could bring upon, and therefore established an alliance with fellow European nations in 1815 named as the Congress of Vienna. THE CONGRESS OF VIENNA (1814 – 1815) The Congress of Vienna was a conference of ambassadors of European states chaired by the Austrian statesman and held in Vienna from November 1814 to June 1815. The objective of the Congress was to settle the many issues arising from the French Revolutionary Wars, the Napoleonic Wars, and the dissolution of the Holy Roman Empire. This is to date considered as one of the first the most prominent alliances, or a series of relations between nations in the history of international relations. THE CONCERT OF EUROPE (1815 – 1914)The Convert of Europe was the balance of power that existed in Europe from the end of the Napoleonic Wars (1815) to the outbreak of World War I (1914). Its founding powers were Austria, Prussia, the Russian Empire and the United Kingdom, the members of the Quadruple Alliance which was responsible for the downfall of the First French Empire. However, in time France was established as a fifth member of the concert. The Concert of Europe, however, is closely connected to the congress of Vienna. It was the balance of power that existed in Europe from the fall of Napoleon in 1815 to the beginning of the First World War. THE INDUSTRIAL REVOLUTION (1760 – 1830) The term Industrial Revolution is normally reserved for a set of events that took place in Britain roughly from 1760 to 1830.The historical events in question consisted of a set of technological, economic, and social changes that in the long run revolutionized not just the British economy but that of the rest of Western Europe, North America, and eventually much of the rest of the world. For Instance, The industrial Revolution sparked in Britain with the invention of the steam engine in 1769. Wooden sailing ships were discontin ued in production. Instead, the manufacturing of larger and faster coal powered iron steamships took its place. These accomplishments put Britain as the leading role in world’s economy along with two other competitors; USA from the west ; Japan from East.These developments in the fields of marine, road going and rail roads not only increased the world production and trade but also tied distant locations more closely together more faster and more economically. Furthermore, Britain dominated world trade in this period due to its advancement in technology was way above par at the time. Thus, it products met massive competition and as a result British Policy tend to favor free trade. The United Stated nevertheless overtook the British in terms of economy by the end of the 19th century, despite the fact that they suffered greatly during the great depression. However the United States government’s role in the economy intensified during World War II.By the dawn of the 20th ce ntury not only the British but also the United States and Japan were in the process of selling their merchandise in foreign land, and this to economically, industrially and socially influenced the field of international relations immensely. THE TWO WORLD WARS (1900 – 1950) The twentieth century saw the lights of two unfortunate World Wars. World War I took place during 1914 to 1918 and World War II, during the period of 1939 to 1945, together occupying a decade of the 21st century. Unlike a conventional war between two nations these two world wars were global or hegemonic wars in which almost all major states participated in an all out struggle over the future of the international system. WORLD WAR I (1914 – 1918)World War I was a global war centered in Europe that began on 28 July 1914 and lasted until 11 November 1918. This war is one which symbolizes the tragic irrationality of war. It was predominantly called the World War or the Great War from its occurrence until the start of World War II in 1939, and the First World War or World War I thereafter. It involved all the world's great powers. It involves the almost all the worlds great powers, which were assembled in two opposing alliances: the Allies (based on the Triple Entente of the United Kingdom, France and Russia) and the Central Powers (originally centered around the Triple Alliance of Germany,Austria-Hungary and Italy; but, as Austria–Hungary had taken the offensive against the agreement, Italy did not enter into the war). Although the participating great powers made plans for a quick, offensive and rapid victory – what has been called the cult of offensive, the war was neither short nor decisive. In fact scholars indicate it was a catastrophic war that was unnecessary and perhaps even accidental. Russia happened to be the first nation state to crumble as Revolution at home made it retreat from war in 1917. The revolution eventually let to the founding of the Soviet Union . Further, the entry of the United States on to the war turned the tables upside down for Germany.The Triple Alliance was consequently defeated by the United Kingdom, France and Russia which saw the end of the 1st World War. THE TREATY OF VERSALLIES (1919) The Treaty of Versailles was one of the peace treaties at the end of World War I. It ended the state of war between Germany and the Allied Powers. The treaty was signed on 28 June 1919, exactly five years after the assassination of Archduke Franz Ferdinand (which was a reason for the occurrence of the world war). At the Treaty of Versailles, Germany was forced to give up territory, pay reparations, limit its future armaments and most importantly admit to guilt of the war, while the other Central Powers on the German side of World War I were dealt with in separate treaties.Even thought the treaty was agreed upon, the German resentment against the harsh terms of the Versaillian treaty would contribute to the German aggression in the mid 1930’s and later on, during the course of World War II. THE LEAGUE OF NATIONS (1920 – 1946) Witnessing the painful experience in World War I, at the time US president, Woodrow Wilson, along with other idealistic mindsets placed their hopes for peace in the newly formed League of Nations. The League of Nations (abbreviated as LN in English, and SDN in its other official languages), was an intergovernmental organization founded as a result of the Paris Peace Conference that ended the First World War. It was the first international organization whose primary and principal mission was to maintain world peace.Its primary goals, as stated in its Covenant, included preventing wars through collective security and disarmament, and settling international disputes through negotiation and arbitration. At its greatest extent from 28 September 1934 to 23 February 1935, it had 58 members. Yet, the League lacked its own armed force and depended on the Great Powers to enforce its resolutions, keep to its economic sanctions, or provide an army when needed. However, the Great Powers were often reluctant to do so. After a number of notable successes and some early failures in the 1920s, the League ultimately proved incapable of preventing aggression by the Axis powers in the 1930s.Germany withdrew from the League, as did Japan, Italy, Spain and others. The onset of World War II showed that the League had failed its primary purpose, which was to prevent any future world war. The United Nations or the UN (which would be discussed later on) replaced it after the end of the war and inherited a number of agencies and organizations founded by the League. WORLD WAR II (1939 – 1945) World War II, or the Second World War was a global war that was underway by 1939 and ended in 1945. It involved a vast majority of the world's nations – including all of the great powers – eventually forming two opposing military alliances: the Allies (U. S. Britain, Fr ance, Soviet Union, Australia, Belgium, Brazil, Canada, China, Denmark, Greece, Netherlands, New Zealand, Norway, Poland, South Africa, Yugoslavia) and the Axis (Germany, Italy, Japan, Hungary, Romania, Bulgaria). It was the most widespread war in history, with more than 100 million people serving in military units. In a state of â€Å"total war†, the major participants placed their entire economic, industrial, and scientific capabilities at the service of the war effort, erasing the distinction between civilian and military resources. Marked by significant events involving the mass death of civilians, including the Holocaust and the only use of nuclear weapons in warfare, it resulted in 50 million to over 70 million fatalities. These deaths make World War II by far the deadliest conflict in all of human history.Even though, the Empire of Japan was already at war with the Republic of China in 1937, the world war is generally said to have begun on 1 September 1939, with the in vasion of Poland by Germany, and subsequent declarations of war on Germany by France and most of the countries of the British Empire. Germany therefore set out to establish a large empire in Europe. From late 1939 to early 1941, in a series of campaigns and treaties, Germany conquered or subdued much of continental Europe. Later on however, the nominally neutral Soviet Union fully or partially invaded, occupied and annexed territories of its six European neighbors, including Poland. As a result the United Kingdom remained the only major force continuing the fight against the Axis, with battles taking place in North Africa as well as the long-running Battle of the Atlantic.In June 1941, the European Axis launched an invasion of the Soviet Union, giving a start to the largest land theatre of war in history, which tied down the major part of the Axis' military forces for the rest of the war. In December 1941, the Empire of Japan, which aimed to dominate East Asia and Indochina, joined the Axis, attacked the United States and European territories in the Pacific Ocean, and quickly conquered much of the West Pacific. The advancement of the Axis nations were stopped in 1942, after Japan lost a series of marine battles and German troops were defeated in North Africa and followed by, at Stalingrad. In 1943, with a series of German defeats in Eastern Europe, the Allied invasion of Fascist Italy, and American victories in the Pacific, the Axis lost the initiative and undertook strategic retreat on all fronts.Meanwhile in 1944, the Soviet Union regained all of its territorial losses and invaded Germany and its allies. The war in Europe ended with the capture of Berlin by Soviet and Polish troops and subsequently the Germans fell into surrender on 8 May 1945. After two devastating nuclear bombing n Hiroshima and Nagasaki, the war in Asia ended on 15 August 1945 when the Empire of Japan agreed to surrender. Thereby, victory of the Ally nations over the Axis in 1945 ended th e conflict. World War II altered the political alignment and social structure of the world. THE UNITED NATIONS (1945 – Present) The United Nations was established to encourage international cooperation and prevent future conflicts.The great powers that were the know as victors in the war – nations such as the United States, Soviet Union, China, United Kingdom & France – became the permanent members of the United Nations Security Council. The United Nations is in fact an international organization whose original aims were regard to facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace. Founded in 1945 after World War II it went to replace the League of Nations, in hopes to stop wars between countries, and to provide a platform for dialogue. So far the United Nations has been successful in preventing a third World War, which otherwise would probably mean nuclear wa rfare & consequent destruction of the world.Furthermore, the United Nations proclaims to consist of 193 member states, which includes every sovereign state in the world with the exception of Vatican City. Nevertheless, this forming of this organization is known to be the biggest and the most successful alliance between nations in the history of International Relations. THE COLD WAR (1945 – 1889) The Soviet Union and the United States emerged as rival superpowers, creating a bipolar world and setting the stage for the Cold War. The cold war lasted for the next 46 years and each of them had its own ideology, its collection of alliances, third world consumers and a deadly armory of nuclear weapons.Meanwhile, the influence of European great powers started to decline, while the decolonization of Asia and Africa began. Most countries whose industries had been damaged moved towards economic recovery. Political integration, especially in Europe, emerged as an effort to stabilize post war relations between fellow nations. In addition, the United States forged NATO (North Atlantic Treaty Organization), a military alliance using suppression of communism and encouraging capitalism as a main strategy in 1949, while the Soviet Union formed the Warsaw Pact in 1955. Some countries aligned with either of these 2 superpowers, whilst others chose to remain as Non-Aligned Movement.The Cold War was named likewise as it never featured direct military action, since both sides possessed nuclear weapons, and its use would result in mass destruction. However these two parties’ third world allies fell victim to s streak of devastating wars, namely, the Korean War (1950–1953), the Suez Crisis (1956), the Berlin Crisis of 1961, the Cuban Missile Crisis (1962), the Vietnam War (1959–1975), the Yom Kippur War (1973), the Soviet war in Afghanistan (1979–1989), the Soviet downing of Korean Air Lines Flight 007 (1983), and the â€Å"Able Archer† NATO m ilitary exercises (1983). However, by 1991 the cold war came to an end as the Soviet Union collapsed and reformed in to 12 different states.In the 1980s, the United States increased diplomatic, military, and economic pressures on the Soviet Union, at a time when the communist state was already suffering from economic stagnation. In 1991 occurred the collapse of the Soviet Union, leaving the United States as the dominant military power, and leaving behind a resulting uni-polar world. Nevertheless, the Cold War and its events have left a significant legacy, a huge impact and a rather solid attitude towards the functions of International Relations. The aftermath of Cold War conflict, however, is not always easily erased, as many of the economic and social tensions that were exploited to energize Cold War competition in parts of the Third World remain sensitive.In Eastern Europe, the end of the Cold War has ushered in an era of economic growth while in other parts of the world, such as Afghanistan, independence was accompanied by state failure. SCOPE OF INTERNATIONAL RELATIONS TODAY The scope of international relations has greatly expanded in modern times. Initially international relations concerned only upon the study of contemporary foreign affairs with a view to draw certain lessons. Later on emphasis began to be laid on the study of both foreign affairs and international law and international relations began to be studied within the framework of international law. The field of the study of international relations was further widened with the establishment of the League of Nations after the First World War and the study of international organizations and institutions.The scope of international relations in the post World War II period got further widened due to significant changes which took place, with the emergence of USA and USSR as two superpowers; the entry of a large number of non-European states into the society of nations; the threat and danger of nucle ar warfare; increasing interdependence of states and rising expectations of the people in the under developed third world, etc†¦ CONCLUTION It is in this way quite evident that world history, especially modern world history plays a major role in the development of International Relations as a field of study. Although initial events indicate that war held prominence in international affairs, things were prone to change with the spark of the industrial era and the rapid globalization of the world economy.It is also evident that greater importance began to be placed on scientific study of international relations, which led to development of new methodologies and introduction of new theories in the study of international relations. It is therefore in this way quite clear that all in the recent past, the present and in the future, the scope of International Relations will be thoroughly important for the functions carried out in the international arena. ———â€⠀Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€œ [ 2 ]. Goldstein, Joshua S. International Relations, Sixth Edition. Pearson Education Inc. and Dorling Kindersley Publishing Inc. 2005: 29 [ 3 ]. Columbia Encyclopedia: international relations [ 4 ]. Goldstein, Joshua S. International Relations, Sixth Edition.Pearson Education Inc. and Dorling Kindersley Publishing Inc. 2005: 53 [ 5 ]. â€Å"Principles of the State System†. Faculty. unlv. edu. Retrieved 2012-09-11. [ 6 ]. Bloy, Marjie. The Congress of Vienna, 1 November 1814 – 8 June 1815. The Victorian Web. 2009 [ 7 ]. Dockrill, Michael. Atlas of the Twentieth Century World History. NY: Harper Collins, 1991. Ferguson, Niall. The pity of war: Explaining World War I. NY Basic, 1999 [ 8 ]. Willmott, H. P. World War I, New York: Dorling Kindersley Inc. 2003: 27 [ 9 ]. The Triple Entente was the name given to the alliance between France, Britain, and Russia after the signing of the A nglo-Russian Entente on August 31, 1907.The alliance of the three powers, supplemented by agreements with Portugal and Japan, constituted a powerful counterweight to the Triple Alliance. [ 10 ]. Bade, Klaus J; Brown, Allison (tr. ) (2003), Migration in European History, The making of Europe, Oxford: Blackwell (translated from the German). [ 11 ]. Goldstein, Joshua S. International Relations, Sixth Edition. Pearson Education Inc. and Dorling Kindersley Publishing Inc. 2005: 53 [ 12 ]. â€Å"Covenant of the League of Nations†. The Avalon Project. Retrieved 30 August 2011. [ 13 ]. Jahanpour, Farhang. â€Å"The Elusiveness of Trust: the experience of Security Council and Iran† (PDF). Transnational Foundation of Peace and Future Research. p. 2. Retrieved 27 June 2008. [ 14 ].Barrett, David P; Shyu, Lawrence N (2001). China in the anti-Japanese War, 1937–1945: politics, culture and society. Volume 1 of Studies in modern Chinese history. New York: Peter Lang. [ 15 ]. à ¢â‚¬Å"General Assembly of the United Nations – Rules of Procedure†. UN Department for General Assembly. Retrieved 15 December 2010. [ 16 ]. â€Å"Milestones in United Nations History†. Department of Public Information, United Nations. Retrieved 17 July 2008. [ 17 ]. Goldstein, Joshua S. International Relations, Sixth Edition. Dorling Kindersley Publishing Inc. 2005: 67 [ 18 ]. Cold War, From Wikipedia, the free encyclopedia. http://en. wikipedia. org/wiki/Cold_War

Monday, July 29, 2019

Marks and Spencer is one of the leading and the most recognized name Research Paper

Marks and Spencer is one of the leading and the most recognized name in the fashion industry - Research Paper Example The company, by applying prudent marketing techniques, has been able to grab market share of around 11.7% by value and 12.4% by volume. Marks and Spencer has also been actively involved in the business of marketing and selling edible products which has earned the company immense revenue in the past few years. Through its unmatchable food quality, Marks and Spencer is now regarded as one of the finest when it comes to quality food products. The financial outlook of the company also looks quite stable. During the financial year of 2012, the company has been able to increase its revenue by an impressive 2.0% to a striking ?9.9 billion though the operating profit of the company took a slight downward plunge of about 1.2%. In addition, the financial ratio analysis of the company and the comparison of the company with its competitor also show that a positive financial outlook can be forecasted. INTRODUCTION The paper presents evaluates the financial performance of Marks and Spencer, a high ly recognized name in the fashion market. Marks and Spencer is a listed company and has been operating lucratively for the past many years. The company operations have been highly successful in the past many years and it portrays sound and stable financial outlook. Following is a brief and recent financial highlight of the company Financial Highlight of the Company The paper primarily discusses the financial outlook of the company as evaluated through its financial statements. The initial section of the page discusses the key operations of the company and under what conditions it is operating in the UK market. The paper briefly discuses the historical financial performance of the company focusing group revenue and profit before and after tax. Moving forward, the paper presents a comparison of the current and last year financial performance of the company through financial statement ratio analysis. The primary reason to conduct a ratio analysis is to quantify the results of the opera tions of a company and compare them with that of the prior year(s) in order to assess different aspects of the financial feasibility. The ratios are divided into profitability, liquidity and gearing ratios. The paper identifies the areas, through ratio analysis, where the company is performing well and where it needs improvements. In conclusion the paper presents a comparison of the financial and operational performance of Marks and Spencer with one of its primary competitors, Debenhams. Major financial ratios are compared and in addition, historical share prices are also analyzed of both companies in order to identify which company has a better market capitalization and better reputation from investor’s perspective. For the purpose of the financial analysis, the historical financial information from the financial year 2012 till 2008 has been used. RECENT ANALYSIS OF UK RETAIL INDUSTRY During the current financial year 2012, the UK retail industry witnessed a mix trend. As re ported by the Marks and Spencer in its press releases, the start of the current financial year was better than expected and the company reaped great profit. However it was observed that later half of the current year proved to be more difficult for doing business, especially the month of August and September. During that particular period, the share price of Marks and Sp

Sunday, July 28, 2019

Anatomy Essay Example | Topics and Well Written Essays - 1000 words

Anatomy - Essay Example D is the correct answer because acetylcholine is just involved in minor signal transmission, in the nervous system. B is not correct answer because Serotonin is well known, and it is involved in the regulation of anxiety and feelings of depression. B is the correct answer because the primary motor area of the brain is the one responsible for the voluntary, fine motor movements. C is wrong because primary sensory area is responsible for detecting signals that are sent to the brain. D is the correct answer (he was frustrated). This is because alpha waves are detected when the brain is experiencing quietly flowing thought. C is wrong because when someone when the brain is asleep, it does not experience quietly flowing thoughts. C is the correct answer because delta waves suspend all external awareness and are only detected when the brain is dead asleep. B is not correct answer because when someone is awake or resting with the eyes wide open, then they their brains are subjected to external feelings. Action potential refers to the short lasting event or an impulse that occurs in the neurons when the electrical membrane potential (charge) of the cell rapidly rises then falls. It takes place in the excitable cell like neurons and muscle cells. This action plays a crucial role in the communication between the cells, for instance, it is the first step that occurs to lead to crucial actions like contraction. Neurotransmitters that are released from the synaptic end of the motor neuron binds with the proteins that are released from T tubules. This is because T tubules do not have the voltage-gated Na+ and K+ channels, which are found on the plasma membrane. Therefore they carry action potential through their interior muscles cells through voltage-gated Na+ and K+ channel. Voltage-gated ion channels, on the cell’s plasma

Saturday, July 27, 2019

Marketing mix stimuli (including products, brands, advertisements, Essay

Marketing mix stimuli (including products, brands, advertisements, packaging, point-of-purchase display) are designed and manage - Essay Example In marketing a product, a marketer will always have to look at the four Ps of marketing and make sure that all the four Ps have been well considered and addressed. The four Ps Product The seller must look at the product and make sure it meets consumers’ needs. The product is the centre of the marketing strategy because it is the eventual interest f he customer. According to Belohlavek (2008, p. 15), the product is extremely influential in the marketing mix because it is the ultimate way in which the firm will deliver value and worth to the consumer. Produce development should therefore be the first point at which the marketing mix begins because the customers can only be willing to buy products that they think or know provide them with the value for their money. Price Every product has its price at which it is delivered to consumers. In this regard, the price of the product is an extremely beneficial aspect of marketing because it affects consumer behavior and decisions. It is itself affected by so many other factors such as culture, consumer attitudes and economic factors. Pricing is hugely valuable because the right pricing can give the firm a long term success while the wrong pricing strategy ca lead to the firm dying from the market. Place This refers to the availability of the product. Having the right product will not help the firm unless and until the brand is in the convenient place at the proper timing. Place plays a particularly significant role in the way the brand and its producer will be successful in the market place. It is therefore, every necessary to ensure that the brand is available to the target market to make sure users can conveniently access the product every time they need it. This increases the sales of the product as well as improving the user awareness of the product thus making it endeared to the consumers. Promotion To boost sales and deal with competition, promotion of the product becomes exceedingly prominent and makings su re has visibility is hugely crucial. There are a number of ways that any marketer or any firm scan use to expand the market. Promotion is communication with the potential and existing customers to enlighten them about the brand and its advanatages. One can use all of the possible methods such as internet, mass media, print media and any other available channel to communicate with consumers. Case: Apple and iPhone One of the firms that have been able to take care of the marketing mix is the American technology firm, Apple Inc. Apple Inc. produces a number of technology product from cell phones, table computes, laptop computers, desktop computers and including consumer software. However, for the purposes of this paper, the iPhone will be the only product considered. However, Apple has been able to apply the marketing mix for all its products and thus creating a tremendous success for its products. Product With regard to its product, Apple Inc. has been able to understand its industry in an exceptionally clear way so as to deliver a product that resonates with the needs of the consumers. Instead of being reactive to the market conditions, Apple Inc. is one of the fewest firms in the world that decided to be proactive in the way it meets consumers’ needs. It always delivers a product that is ahead of other firms in the same industry. This has enabled the

Friday, July 26, 2019

North America, Latin America, The Caribbean and Sub-Saharan Africa are Essay

North America, Latin America, The Caribbean and Sub-Saharan Africa are Joined Economically and Culturally - Essay Example People from diverse backgrounds come together through the cyber-world, work together, socialize, discuss issues and keep themselves updated about whatever is going on through media. America is considered to be the world’s greatest global economy, especially the Northern region, which is a comprehensive mix of people from diverse backgrounds. The major global changes begin in this region of the world and then spread everywhere quickly owing to the numerous benefits of globalization. On the other extreme, there is Africa, where growth has been minimal throughout the years, which means that globalization was also at a bare minimum. In the middle of these two extremes lie Latin America and the Caribbean where globalization and growth were at a steady rate, much lesser than in North America but much higher than in Sub Saharan Africa. For instance, Mexico had a very high rate of globalization as compared to other Caribbean States. Africa is typically seen as a place where there is a severe lack of resources and, in extreme cases, people are dying of hunger. There are huge geographical and demographic differences amongst these regions, America being the greatest developed country and most regions of Africa being the least developed. There is a huge gap in resources, culture, eating habits, kind of jobs people do, level of living of people. Americans have a lavish style of living and mostly have service-based economies, while a part of Africa is still suffering from lack of resources and a fairly large percentage of people who do not have any way to make a living. They are less educated; and in America, education is a primary concern available to all.

Security and Portfolio Analysis (MBA course) Essay - 1

Security and Portfolio Analysis (MBA course) - Essay Example ans, that the price of the security has moved at a pace less than the market volatility while a value higher than the price of the security means a higher rate of volatility. However, the greater the volatility, the greater the returns, of course accompanied by an equally greater risk. Next the trustee alleges that the common stock performance was specially poor for the five year period. The common stock of ATC was 13.3% 14.3% while the Standard & Poor’s 500 Stock Index stood at 13.8% 21.1% over the same period. It is clear that the common stock of ATC had stagnated just with a single point value gain while the Standard & Poor’s Index gained 7.3%. Again the trustee scores a point. Once again it might have been due to a poor investment decision in choosing to buy stocks that were risk-free but gave lower returns. His next allegation is focused on Treasury Bills, a very secure investment, though again the return is questionably lower. US Treasury Bills during the period have gained 3.8%. He continues to talk about the assumed actuarial rate of return. Basic actuarial formulas used to calculate benefits and contributions that are needed to fund those benefits, are based on a series of assumptions such as individual life expectancies, employer and employee contributions, possible returns on investment, salary increments and inflation rate. It is very rare that current plan assets would equal the current accrued plan benefits. So the probability is that a constant actuarial rate of return equal to 6.0% over the period would not match the accrued plan benefits. . Passive investing is the opposite of active investing and involves a buy-and-hold strategy. It is often identified with index tracking. Those who favour it, argue that the market is indisputably efficient, and therefore efforts to outperform the market are likely to produce nothing but a rise in costs. It is also assumed that as much as there are people who might succeed in beating the market, others

Thursday, July 25, 2019

Porter's Competitive Forces Model-Information Systems Research Paper

Porter's Competitive Forces Model-Information Systems - Research Paper Example Thus the competitive forces model helps one to understand the different strategies that the firm can take to counter the competition posed by the different external entities as reflected. Porter’s Five Forces Model of Business Competitiveness can be reflected as follows. Figure 1 (Source: Laudon, 2010, p.96) The business gains competitive advantage in its pursuits of governing the competitive threat imposed by these different parameters that can be analyzed as follows. Firstly the company would have potential competitors existing at the market place that can work on product or brand development and thereby gain on its existing market share. This product or brand development can work in encouraging the consumers to switch over to gain the benefits of the products and services delivered. Secondly the business company in question also needs to effectively compete in regards to new entrants in the industry. Owing to lower economic and trade barriers it is found that companies focu sing on the opening up of small retail arms and food joints tend to face lesser trade and economic constraints than companies in other industries where investment required is huge. In larger investment sectors it is hard for the companies to retrieve potential returns on the amount invested and thus are deterred from entering. Again in the third case the business company operational for a longer period happens to create a more popular understanding of the type of the attributes of the products and services developed. Thus this fact encourages the emergence of substitute products in the marketplace with both the prevalence of more innovative products and also of lesser value and price. Fourthly the company needs to counter the bargaining power of consumers in meeting the requirements both in regards to quality and pricing conditions. The number of companies in the industry being large enables the consumers to switch over to different concerns at the cost of the initial company holdin g the consumer. Finally in the fifth case the company needs to hold on to its suppliers from switching over to another company in the same industry rendering more leverage. Henceforth the business companies need to work on a greater network of suppliers where the company can tend to exert influence over the supplier groups in regards to pricing, quality and timely and effective delivery management guidelines (Laudon, 2010, p.94-97; Rainer and Cegielski, 2009, p.45-48). Thus the Porter’s Five Forces model effectively presents the situational analysis of a company’s external environment based on which the firm is required to develop its potential strategies required for market growth and business development. Utility of Information Systems in Porter’s Competitive Forces Model The analysis of the above model reflects the various competitive forces that a company is required to counter to successfully exist in the competitive business market. Herein the modern busin ess companies tend to put into use information technology applications that would help the company to effectively counter the different competitive forces. Firstly it is found that business companies in order to largely reduce the price structure of its products and services and at the same time work to generate profitability can largely integrate information systems in its applications. Retail organizations through the use of effective information systems can help reduce the amount of working capital that would be kept locked in regards to

Wednesday, July 24, 2019

Mercks transition to open innovation strategy Essay

Mercks transition to open innovation strategy - Essay Example The paper will focus on the open innovation strategy by Merck pharmaceutical company in form of merging with Schering-Plough. The writer will provide answers to the following questions: 1. Can open innovation help Merck meet the needs of its customers in creative and cost effective ways that also bring value to its shareholders. Why or why not? 2. Assuming open innovative is the path to follow, what implementation issues would you expect? How would Merck overcome its cultural resistance to change? 3. What positive or negative effects will the recent Schering Plough Merger have on Merck’s transition to a more open innovation strategy? Introduction. Merck historically believed in closed innovation strategy. This involves ideas being developed from within the company and the resulting products manufactured and marketed. On the contrary, open innovation involves the search for new ideas from outside and including them in business models. This is through bringing new ideas, personnel and technologies. Open innovation also allows some knowledge to flow outside the companies to other people. Most companies do not use their original technologies because it may be too costly making these ideas unutilized. Open innovations allows some of these good ideas to be shared to companies where they will be put into use. Therefore, open innovations make companies more creative in terms of research and development. ... It has achieved all this success at only one sixth of the cost. Since the approach has worked in other companies, it can also work in Merck. Through open innovation, Merck can develop new cost effective ideas and products. The breakthrough for such products can bring great sales for the company thus benefiting the shareholders. (Rothaemel, 2008) Question 5: Assuming open innovative is the path to follow, what implementation issues would you expect? How would Merck overcome its cultural resistance to change? Merck has been deeply rooted in the culture of closed innovation. This is the culture that they are the best in what they do and need no assistance from outside. Merck assumed that they had the best and brightest personnel. They believe that whatever they invented was the best. Merck believed that all great discoveries were to be unveiled at Merck. This overconfident notion was deeply instilled in the minds of the people at Merck. This makes everyone in the company to be very rigi d to any sought of change. Implementing the new open innovation strategy would therefore, be difficult because of this rigidness. The workers people have strong believe in themselves and would resist any new idea from outside. It would be a problem for the workers at Merck to adapt and accept this change (Rothaemel, 2008). Therefore, for successful development of open innovation at Merck, change has to start with each person. Change from the use of closed innovation to open innovation would mean that people have to change their attitudes and minds. This would erase the earlier culture of closed innovation and replaced it with open innovation. The resistance to change can be dealt with by sending top

Tuesday, July 23, 2019

Female Entrepreneurs Essay Example | Topics and Well Written Essays - 4500 words

Female Entrepreneurs - Essay Example The paper has clearly brought out the fact that the managerial qualities of women are entirely different from male entrepreneurs and it rests a great deal on the circumstances that motivate her to establish her own business set-up, apart from her own characteristics and qualities that she has imbibed. The management techniques adopted by them and their impact on the organizational performance are brought to fore by interviewing few female entrepreneurs in UK by providing them with a questionnaire. The result showed that though charismatic and transformational leadership are made use of by the women entrepreneurs, the driving force that makes them into a success story is the relational approach practiced by them, which includes open communication, sharing of information, empathising and nurturing of the employees. The management techniques adopted by women have shown more number of employees in female owned enterprises than others. Consequently, the number of female entrepreneur billionaires has been increasing at a fast pace and we hope to have double the number of women entrepreneurs in the next five years. The importance of women entrepreneurs has been greatly fe... 1. Introduction The importance of women entrepreneurs has been greatly felt across the globe in the last decade. Interestingly, in developed countries, women own 25% of total businesses and are starting up new ones at a faster rate than men (Woldie and Adersua, 2004). Infact, besides making a contribution to the economy, women through their different management styles have been adding innovation, diversity and choices to the business organizations they own. While studies done in the past have improved the understanding about female entrepreneurs, the issues which have not been addressed in-depth are - What are the management styles adopted by women and how do they affect or have an impact on various aspects of organizational performance. This paper, will, therefore, focus on the growing number of women entrepreneurs in the last decade, their management styles, the impact of their management strategies on the success of the organization and whether their style is different from their male counterparts or not. The purpose of this report is to provide information on this research topic which will be used as a basis for my third year project for the BA Honours for Business degree with a management minor at Croydon College. As a woman in business I have spent over twelve years conversing and engaging in business activities with many other women and it has intrigued and inspired me to investigate, explore and examine a few of the variables that make a woman into a successful entrepreneur. As part of the research, I also want to investigate management styles to understand if there are any particular types of management styles which assist the women in becoming successful and how do they differ from management styles adopted by their male counterparts. I have personally

Monday, July 22, 2019

Early Autum Essay Example for Free

Early Autum Essay Langston Hughes short story â€Å"Early Autumn† demonstrates how distance and time can heal a broken heart. The main character Bill illustrates his distance from Mary showing that he has moved on with his life and relationship. The symbolism in Langston Hughes short story â€Å"Early Autumn† reveals the coldness and distance Bill has towards his and Mary’s once relationship. Hughes writes, â€Å"It was late afternoon. Nearly sunset. Cold. † (Hughes, n. d. , para 4) is a perfect example of Bill’s and Mary’s lost relationship. The sunset symbolizes the darkness and coldness in Bill and Mary’s now relationship. Bill is unable to see anything other than a casual friendship with Mary. The coldness has moved in and fall has packed her bags and winter has now arrived to take up residence. The trees are bare and lifeless, it resembles how Bill feels towards the relationship him and Mary once shared, he is emotionless almost lifeless towards Mary. For Bill the darkness is so thick he is unable to see anything in front of him. This woman standing before him may have been someone he once knew a long time ago but she is now someone he no longer recognizes. It’s like the grim reaper had made his appearance taking any life and happiness that had been for Bill and Mary’s once relationship. For Bill that part of his life had been buried and laid to rest a long time ago. The handshake symbolizes the finality of the once relationship for Bill. Mary still clings to the hope that Bill has feelings for her upon seeing him again (â€Å"Unconsciously, she lifted her face as though wanting a kiss, but he held out his hand. Hughes, n. d. , para 3). Bill extends his hand to Mary almost instantly severing any idea of romanticism that Mary could have possibly had. Bill extends his hand to Mary almost instantly severing any idea of romanticism that Mary could have possibly had. Bill’s almost business like handshake shows that he doesn’t foster the same ideas or cling to the same memories that Mary does. Bill treats Mary as a colleague, not someone he one shared such an intimate part of himself with. He buried his feelings for Mary the day she gave up on him and their relationship. He now only sees Mary as an acquaintance. The unknown people walking around symbolize how Bill and Mary really no longer know each other. Standing talking to Mary in the hustle and bustle of the New York City streets, (â€Å"A great many people went past them through the park. People they didn’t know† Hughes, n. d. , para 4). Throughout the years that past and the lives they have lived people have weaved in and out. They now both lived two separate lives; Bills life was full of happiness and Mary’s life full of regret. But standing there on the street that day they were strangers themselves. Many years passing just like the people passing by on the busy city street. Even though knowing each other, sharing stories and lives with each other once upon a time, having an intimacy knowing each other in and out. Distance, time and experience have made them different people almost foreign to each other in a way. They are no longer the people they once knew now they are strangers much like the people weaving in and out on the busy streets. The use of Bill’s wife’s name symbolizes his happiness with his marriage and his wife. Bill has made a life for himself and is a very happy man. He tells Mary of this life and of his family with such enthusiasm and pride that you can tell he is right where he wants to be. When talking with Mary at one point Bill mentions his wife by name, Mary on the other hand seems to forget her that she husband. Not once during her and Bill’s conversation does she mention him by name. (â€Å"Sure,† he replied. â€Å"You and your husband must have dinner with my family some night. Any night. Lucille and I’d love to have you. † Hughes, n. d. , para 7). Bill invites Mary and her husband to his house for dinner and calls his wife by name. Saying (â€Å"Lucille and I’d love to have you†. ) Bill added a hidden intimacy for his wife by calling her by name. Letting Mary know then and there he loved his wife, by stating her name brought a reality to the fantasy for Mary. Ending and crushing any hope Mary may had clung to. Bill was happy and enjoyed his life; never once regretting his decision’s. Whereas Mary will live with regret for the rest of her life. I truly enjoyed this short story; I think a majority of people can relate. For me it was the lost love or the one who got away. I think that everyone in some way has had this happen to them I know that I have. I can relate to Bill, I can understand how he loved someone so much and they could just move on so easily without so much as a single word. Having your trust broken and it taking years before you can trust someone again is a long and painful road. I think love and relationships are something a lot of people take for granted now a days. Fighting over petty things, putting material possessions over human worth seems to be the norm for most relationships now a days. Fighting with someone and instead of talking it over or working it out; people holding grudges or moving on without so much as a single word uttered. But for Bill it worked out he found love, true love. I think for me the story showed that sometimes it takes a couple of wrong ones until your find the right one. To not let one bad experience jade you for the rest of your life because at the end of it all there is always a silver lining.

Sunday, July 21, 2019

Business Plan of Dohuk City

Business Plan of Dohuk City Vaheen Hayder Othman Introduction and Background Dohuk governorate is known as mountain resort destination. It has ancient archaeological sites during all four seasons Dohuk has beautiful views which made it to be one of the best tourism sector of Kurdistan. The city is the point of joint between three parts of Kurdistan (Syria- Turkey- Iraq) therefore it has a strategic location (About Duhok Governorate, 2014). This governorate is considered as one of the most significant and important governorates especially in historical and geographical sides. According to (Shingaly, 2013) because of some points like (the rapid pace of urbanization, moving from other cities to Duhok and the increasing migration from rural to urban areas) economic and social problems of population are increased. It needs commercial projects within the city with a clear plan scheme. The random distribution for commercial uses was due to the lack of a clear plan. Several issues rose from changing the Duhok master plan of land use from residential use to commercial . This affected traffic congestions change of the urban pattern and townscape, less contract of shopping and malls. This essay will address strategic action plan plans for developing the economy of the city of Dohuk with adequate developmental programs for the city. Local economic development makes it easy for Counterpart staff and partners to engage in the process of local economic development planning. This will help stakeholder to find common issues and develop a strategy that will fit key market opportunities. Also to identify quick-win projects to generate jobs opportunities, increase local competitiveness and attract more stakeholders to buy-in (Economic Development Economic Development Government of Yukon, 2014).according to (Ministry of Planning, Kurdistan Region, 2014) There are several factors that has affect or prevents the economic development. The first factor is lack of information and transparency. Dohuk’s directorates and main offices must dedicate itself to serve people in a clear way. To achieve this, the ministries should follow data and regulations. It will help local business owners and international investors to make informed decisions that will make economy grow if they have international standards of transparency and accountability. The second issue is inefficient banking system. Any country or city that wants to be successful in business and gain economic development needs a modern banking system. The banking system must be connected to world class financial institutions and build trustful relation with investors and business men/women. The third factor is educational system, which is a very important factor that needs to be taken seriously. Educational system must meet the demands of market economy. It needs to produce the skills and abilities that could help develop economy. Some certain sectors should be given more attention; in addition of English and Arabic language there should be trainings within these sectors to gain more responsive to the market and local development needs. The last factor is not having a good infrastructure. KRG should upgrade basic infrastructure and invest in it as they are one of the important factors to help economic development. The purpose of this economic development plan is to give a better quality of life to the citizens of Dohuk city and attract more people to invest in new businesses. Creating more jobs and developing existing businesses. Mission statement: Dohuk city’s mission is to provide and strengthen the demands of economic market. As the population of the city grows it needs business creation and reducing the rate of unemployment by creating new jobs. Attract foreign companies to invest in the city’s development and retain the companies within the city. Also getting support from KRG to help develop the economy of the city is a major point. If the city can achieve businesses to invest in residential, commercial, industrial and institutional projects, the citizens will be able to enjoy a wide range of various outdoor activities. The mission is to make the city the most desirable place to live in in the region. The mission is to gain economic and social benefits (Tutor2u.net, 2014). Such as improving living standards it can cause capita income rise and reduce in poverty. The accelerator effect of growth on capital investment, rising demand and output encourages investment in capital – this helps to sustain GDP ( Tutor2u.net, 2014). Making the city richer also to have more resources available to spend on public and serving people including environmental benefits. Most important is the Benefits from growth driven by technological change (Tutor2u.net, 2014). Goal Statement: Dohuk city is encircled by mountains along the Tigris River. It has a growing tourist industry because of it beautiful weather and view though out the four seasons. The goal is to make Dohuk the main mountain resort destination. This will help economy development of the city, as well as financial and none financial support can be important point of this development. The other goals Dohuk city should achieve are, good quality of life for the citizen, better income, increasing the GDP, job creations, increasing investment. Economic Condition of Dohuk City and Recommendations for Economic Development: Urban: According to (Mop.krg.org, 2014) the urban population of the Kurdistan Region accounts for 79% of the total population. 41% referees to the three main cities Erbil, Dohuk Sulaymaniyah. But the idea here is that rural structure is suffering from low growth rates mainly in Dohuk and Sulaymaniyah. The population of Dohuk is around 280,40017 inhabitants. They occupies 67.2 square km. The city’s expansion to the west is fast and it is close to connect with the district of Sumel. Dohuk has the capacity to accommodate population growth beyond 2020 because of its vacant land. The plan is to develop the city until 2032. (Mop.krg.org, 2014) suggested these points for economic development of Dohuk city â€Å"†¢ A phasing plan for urban development based on realistic growth projections. †¢ An infrastructure assessment of the existing built up areas to identify gaps in service provision and potential infill capacities. †¢ Two priority investment projects: the urban upgrading of the informal Gejabara area and the urban rehabilitation of the Dohuk city center† Proposed Investment in Regional and Urban Development Planning 2013-2020 Tourism Sector: Tourism is considered as of the fastest and biggest growing industries in the world. It is an attractive option for emerging markets. Dohuk city is still in the process of developing in tourism sector. it needs to resolve the existing problems such as infrastructure and site restoration as well as protection. This can make tourism to be contributor to the economy of the city. It is important to facilitate access for people, for visitors and for trade including roads, airport, rail, waterways. these high quality transportation is considered as significant support for tourism development. Dohuk has many ancient and beautiful archeological sites and artifacts which attract many visitors, historical treasures are found in these governorate including (caves, ruins and other antique yet to be found). Let’s not forget that this city is surrounded with mountains and its variation of weather, wealthy of water makes it the land of agriculture and tourism. Factors that has negative impacts on Dohuk city’s tourism development: Unsuitable roads, electric power, solid waste disposal and telecommunications. Inappropriate facilities for tourists , including accommodations, food service, rest and relaxation settings, tourist information centers, and restrooms that meet tourists’ standards. Problems of land ownership Lack of tourism education including trainings, workshops and tour guides. Security issues, which might not let just anyone from other parts of Iraq to visit the city. Recommendations and plans to develop tourism industry, (Business, 2014) suggests these point to be focused on. Set up adventure tourism program, with skilled and certified peoples in this area, especially in adventure in mountains, rivers and camping. Transportation services, high quality of services for tourists destinations Travel agencies, as they are the first stop for everything involved with tourists they must be up to standers. Accommodations. These include hotels, motels, bed and breakfasts, hostels, rental houses, condos and any other place tourists may stay while travelling Guided tours and tour guides. A guided tour service or professional tour guide is a tourism business that specializes in providing informative and entertaining tours through an areas local attractions (Business, 2014). Hospitality. Marketing tourism business using social networking sites. Set up accounts/pages on free social networking sites, Advertise in print mediums this will help the market tourism of the city. It is also needed for the Dohuk city to have a proper business plan for any sector of tourism, Explains purpose of the business, name, location, personnel needs, tourism business management staff, market sector, competition, marketing plan and financial projections (Business, 2014). Agriculture: agriculture in Dohuk has been affected by poor government policies, conflict, international sanctions and not having technological and educational advances. There are different kind of tenures in this area. The first one is privet ownership, second is land leased by the governmentand the third one is herniated land. This makes the number of owner unmanageable. According to (Mop.krg.org, 2014) factors that have negative influence on agriculture are as following lack of good banking, financial services, and insurance industries unsuitable infrastructure Issues of land tenure Absence of food, safety, and health standards Lack agricultural education, training, and extension Lack of governmental transparency and administrative consistency Public Distribution System (food basket) Bloated bureaucracy Recommendation and Solutions: For land, infrastructure and resources, priority should be given to rational policy allowing for private ownership of agricultural lands. Resolving the issue of ownership fragmentation through legislation. Having a law for those lands should be legally restricted for agricultural use only and also to improve water development policy. Creating employable skills and improving infrastructure, should be undertaken. The city must give attention to improved education and training leading to longer-term private sector employment. Make regular visits or workshop for those who work in agriculture and develop their skills. Formal partnership should be forged between the university schools of agriculture and the Ministry of Agriculture to increase the knowledge and skills of extension personnel. Rural/Urban Migration to rebuild and develop the rural villages. Make their economic condition better. Providing them with necessary infrastructure such as hospitals and schools. Do what is necessary to facilitate return to the villages and farming. (Economics-exposed.com, 2014) suggests there are some stages where all countries should go through for growth. Traditional society, The Pre-conditions for take-off, The Take-off, The Drive to technological maturity and the Age of High Mass Consumption (Economics-exposed.com, 2014). Technology play important role in developing agriculture for those under developed countries to develop. Role of Unemployment and Job creation in economic development of Dohuk City: Rate of unemployment in Dohuk is high because creating business is a demand side theory for the growth of economy. Creating new business have advantages such as exporting goods and bringing money to the community, using available resources as an input in the production process, and community’s originality remains as its. Enterprise development is another beneficial factor for growth because it will provide jobs for citizens, layoff manufacturing workers, welfare to work requirements, and brings new technology to the market. It called second wave strategy of economic development. According (Koven Lyons, 2010) Job creation development tools are considered as following Financing assistance, this refers to the capital for making new business and there are several ways of growth capital such as, small business administration loan programs. Another financial assistance is venture and angel capital are two types of financial assistance venture capitalist is puts together funds of venture which is a large pool of capital that rich people invested, from pension funds, insurance companies, and other organization. Angel capitalist is smaller capital injection than venture capitalist, and it demand a smaller equity share of each business. Nonfinancial assistance to the enterprises. Such as, small business development center, business information center, women’s business center. Business creation which is a development strategy for the economy of a country is also criticized in terms of quality of life and environmental concerns, social cost and redistribution of wealth. For Dohuk city to lower the rate of unemployment, the city must attract new business and facilitate for international companies to open their branch in the city, Encouraging people to make innovation and new ideas, Supporting people with new ideas with financial and nonfinancial issues. This will give chance for more business and less employment as a result. The above sectors are few of many sectors in Dohuk city that helps to develop the economy of the city. By focusing on major points and major boundaries that prevents economic development, resolving these issues and applying the law and policies will make growth of the economy of the city. References Business, H. (2014). How to Develop a Tourism Business. wikiHow. Retrieved 5 May 2014, from http://www.wikihow.com/Develop-a-Tourism-Business Economics-exposed.com,. (2014). Role Of Agriculture In Economic Development | Economics Exposed. Retrieved 5 May 2014, from http://economics-exposed.com/role-of-agriculture-in-economic-development/ Mop.krg.org,. (2014). Ministry of Planning, Kurdistan Region. Retrieved 4 May 2014, from http://www.mop.krg.org/ Mop.krg.org,. (2014). Ministry of Planning, Kurdistan Region. Retrieved 5 May 2014, from http://www.mop.krg.org/index.jsp?sid=1id=275pid=109 Business, H. (2014). How to Develop a Tourism Business. wikiHow. Retrieved 5 May 2014, from http://www.wikihow.com/Develop-a-Tourism-Business Economics-exposed.com,. (2014). Role Of Agriculture In Economic Development | Economics Exposed. Retrieved 5 May 2014, from http://economics-exposed.com/role-of-agriculture-in-economic-development/ Mop.krg.org,. (2014). Ministry of Planning, Kurdistan Region. Retrieved 4 May 2014, from http://www.mop.krg.org/ Mop.krg.org,. (2014). Ministry of Planning, Kurdistan Region. Retrieved 5 May 2014, from http://www.mop.krg.org/index.jsp?sid=1id=275pid=109 Koven, S. Lyons, T. (2010) Economic Development: Strategies for state and local practices. ICMA press: Washington, D.C.

Antivirus Research And Development Techniques

Antivirus Research And Development Techniques Antivirus software is the most booming product which has constant developments to be most up to date defensive detecting product competing with all other antivirus software products available in the commercial market. This thesis covers few techniques used by the antivirus products, a general background information about viruses and antivirus products, some research made on antivirus overheads which shows what overheads are introduced to the computer on using an antivirus products, a research made on one of the most important and common technique used by the antivirus software products to detect viruses which is signature based detection, also covers how antivirus software is updated and how new virus signatures are updated to the virus database. There is some research also on selected algorithms used by the techniques, here in this thesis it is explained how each selected algorithm works to detect the code or a file as an infected file or uninfected. In the experimentation, the expe riment is done to detect a virus using three selected popularly known antivirus software products, where reports shown by the three products are compared and concluded. Chapter 1: Introduction A life without computers cannot be imagined in the present life style where it plays a very important role though it might be any field one chooses from the millions. Computer is vulnerable to attacks which are most dangerous and hard to handle with. Just like humans even computers are attacked by viruses. A virus can be in a form of worm, malware or Trojan horses anything that infects the computer. The common source of these viruses is World Wide Web where a malicious person can spread the malware very easily. Many researchers found many methods or procedures to stop the attacks of virus that came up with many techniques or software to remove the viruses which are called Anti-Virus software. A computer virus spreads into the computer through emails, floppy disks, internet and many other sources. The spreading mechanism is usually from one computer to another where it corrupts data or deletes the data from the computer. The viruses mostly spread through internet or through emails which may have some hidden illicit software where the user unknowingly downloads the material into the computer. A virus can attack or cause damage to boot sector, system files, data files, software and also on system bios. There are many newer viruses which attack on many other parts of the computer. Viruses can spread by booting the computer using the infected file, executing or installing the infected file, or by opening the infected data or file. The main hardware sources can be floppy disks, compact disks, USB or external hard drives or a connection with other computer on an unsafe medium. This rapid growth of viruses is challenging the antivirus software in different fields like prevention of viruses, preparation, detection, recovery and control of viruses. Nowadays there are so many antivirus software tools that remove viruses from the PC and helps protect from future attacks. Antivirus raises privacy and security issues of our computers we work on which is a major issue. However, after taking so many safety measures the growth of viruses is rapidly increasing which are most dangerous and wider. In this thesis, a history on viruses and evolution of antivirus software is shown where I will explain about how viruses came into existence and what type of viruses evolved and antivirus software discovery. This general criteria of this thesis is mainly targeted on three selected techniques and is mostly concentrated one technique out of the selected three techniques and scanning methods of antivirus products and also gives a basic scenario of how an antivirus product adopts a framework to update the virus database and also gives some information about how a general computer gets an information to update the product to make it ready to defend against the zero-day viruses. A brief comparison of viruses based on types where the definitions and related threats of viruses will be explained and the working effects of each type of viruses are explained. The working of antivirus software on different types of viruses is explained. Analysis of the current antivirus techniques, showing both advantages and disadvantages. In chapter 2 gives you the general outline of the thesis in which you can know a general history of the viruses, evolution of the antivirus software. A definition to the virus, types of viruses, the most common methods or techniques used. In chapter 3 Literature Review, shows the research and review of some selected papers or literature that I found interesting about w antivirus software. In this chapter, there is research in which some antivirus products, techniques and algorithms compared according to the developments in the recent times. Chapter 4 Experimentation part of the thesis where the comparison of different commercial antivirus products based on their efficiency to detect a virus is shown and also the results are based on false positives, false negatives and hit ratios shown by each antivirus product. Chapter 5 Conclusion concludes the thesis summarizing research and experimentation done on antivirus products. Appendix holds relevant information about the undefined key words or frameworks used in this thesis. Chapter 2 Overview This chapter gives general information about the viruses and antivirus giving some basic information about the virus history and when the antivirus software evolved. There different types of viruses and are classified according to the attacking features. This chapter will lead to better understanding of the techniques used by the antivirus products and also gives you basic knowledge about different antivirus products. 2.1 History of Viruses The computer virus is a program that copies itself to the computer without user permission and infects the system (Vinod et al. 2009). Virus basically means an infection which can be of many types of malware which include worms, trojan horses, rootkits, spyware and adware. The first work on computer programs was done by John Von Neumann in 1949 (wiki 2010). In his work he suggested that a computer program (the term virus was still not invented) can self-reproduce. The first virus was discovered in early 1990s which is Creeper virus. Creeper copies itself to other computers over a network and shows messages on the infected machine: IM THE CREEPER: CATCH ME IF YOU CAN. It was harmless but to catch the Creeper and stop it the Reaper was released. In 1974 Rabbit a program that spreads and multiples itself quickly and crashes the infected system after it reaches a certain limit or number of copies. In 1980s the virus named Elk Cloner has infected many PCs. The Apple II computer which was released in 1977 loads its operating system from the floppy disks, using these characteristics the Elk Cloner installed itself to the boot sector of the floppy disk and was loaded already before the operating system. Â ©Brain was the first stealth IBM-compatible virus. This stealth virus hides itself from being known and when detected it attempts to read the infected boot sector and displays the original, uninfected data. In 1987 the most dangerous virus got into news was Vienna virus which was first to infect the .COM files. Whenever the infected file was called it infects the other .COM files in the same directory. It was the first virus that was successfully neutralized by Bernd Fix and which leads to the idea of antivirus software. Then there were many viruses which were Cascade virus the first self-encrypting virus, Suriv Family virus which was a memory resident DOS file virus. Extremely dangerous virus was Datacrime virus which destructs FAT tables and cause loss of data. In 1990s there was Chameleon Virus, Concept virus and then CIH virus and in 2000s there were ILOVEYOU virus, My Doom Sasser. (Loebenberegr 2007) Vinod et al. 2009 defines computer virus as A program that infects other program by modifying them and their location such that a call to an infected program is a call to a possibly evolved, functional similar, copy of virus. To protect from the attacks, the antivirus software companies include many different methodologies for protecting against the virus attacks. 2.2 Virus Detectors The virus detector scans the file or a program to check whether file/program is malicious or benign. In this research there will be usage of some technical terms and detection methods which are defined below. The main goal for testing the file/program is to find for false positives, false negatives and hit ratio.(Vinod et. al. 2009) False Positive: This takes place when the scanner detects a non-infected file as a virus by error. They can be a waste of time and resources. False Negatives: This occurs when the scanners fail to detect the virus in an infected files. Hit Ratio: This happens when the virus scanner scans the virus. Detections are based on 3 types of malware which are: Basic In basic type the malware attacks the program at the entry point as shown in the figure 2.2.1. The control is transferred to virus payload as the entry point itself is infected. Infected Code Main Code Entry Infected by virus Figure 2.2.1 Attacking system by basic malware. (Vinod et al 2009) Polymorphic Polymorphic viruses are viruses which mutates by hiding the original code the virus consists of encrypted malware code along with decrypted unit. They create new mutants very time it is executed. The figure 2.2.2 shows how the main code or original code is encrypted by infected file to produce a decrypted virus code. Virus Code Decrypted Code Main Code Entry Encrypted by infected file Figure 2.2.2 Attacking system by polymorphic viruses. (Vinod et al 2009) Metamorphic Metamorphic viruses can reprogram themselves using some obfuscation techniques so that the new variants are not same as the original. It sees that the signatures of the subsets are not same as the main set. Form B Virus A Form A S1 S2 S3 Figure 2.2.3 Attacking system by metamorphic viruses. (Vinod et al 2009) The above figure 2.2.3 shows that the original virus and form of that virus have different signatures where s1, s2 s3 are different signatures. 2.3 Detection Methods 2.3.1 Signature based detection Here the scanners search for signatures which are sequence of bytes within the virus code and shows that the programs scanned are malicious. The signatures are developed easy if the network behavior is identified. Signature based detection is based on pattern matching. The pattern matching techniques evolved from times when the operating system was DOS. The viruses then were parasitic in nature and used to attack the host files and most common executable files. (Daniel, Sanok 2005) 2.3.2 Heuristic based detection Heuristics describe a method of scanning a virus by evaluating the patterns of behaviors. It takes the possibility of the file or program being a virus by testing the uniqueness and behavior matching them to the database of the antivirus heuristic which contains number of indicators. It is helpful to discover those viruses which does not have signatures or hides their signatures. It is also helpful to detect the metamorphic viruses (Daniel, Sanok 2005) 2.3.3 Obfuscation Technique This technique is used by the viruses to transform an original program into virus program using some transformation functions which makes the virus program irreversible, performs comparably with original program and has the functions of the original program. This technique is used mainly by metamorphic and polymorphic viruses. (Daniel, Sanok 2005) Antivirus Products There are many antivirus products available in the commercial market. Some of the most commonly used antivirus products are: McAfee G Data Symantec Avast Kaspersky Trend Micro AVG Bit Defender Norton ESET Nod32 Chapter 3: Literature Review 3.1 Antivirus workload characterization A research done by (Derek, Mischa, David 2005) shows an antivirus software package takes many ranges of techniques to check whether the file is infected or not. But from the observations of (Derek, Mischa, David 2005) to best difference between some antivirus software packages compare the overheads introduced by the respective antivirus software during on-access execution. When running antivirus software there is usage of two main models which are: on-demand. on-access. On-demand involves the scanning of the user specified files where as on-access can be a process that checks the system-level and the user-level operations and scans when an event occurs. The paper discusses the behavior of four different anti-virus software packages which run on a Intel Pentium IV being installed with Windows XP Professional. Considering three different test scenarios: A small executable file is copied from the CDROM to the hard disk. Executing a calc.exe And also executing wordpad.exe. All these executable files are running on the Windows XP Professional operating system. The antivirus packages used in this experiment were Cillin, F-Port, McAfee and Norton. The execution of the files are done using the before mentioned antivirus packages. Figure 3.1.1 shows the usage of these packages introduces some overheads during the execution which increases the time of execution. Fig 3.1.1 Performance degradation of antivirus packages (Derek, Mischa, David 2005) Then a test was made to know about the extra instructions executed when the file system operations is performed and also when loading and executing a binary. Taking the both scenarios a small binary of very less size is involved. It is found that the execution is dominated by some hot basic blocks in each antivirus package. A basic block is considered hot if it is visited more than fifty thousand times. To detect the behavior of antivirus software packages the (Derek, Mischa, David 2005) used the platform which was majorly targeted by the virus attacks and also must have the existence of some of the commercial antivirus software. A framework of simulator is introduced here called Virustech Simics this has architectural structure as shown in table 3.1.1. Virustech Simics is a simulator that includes a cycle-accurate micro-architectural model and used to get cycle-accurate performance numbers. Table 3.1.1 Virustech Simics architectural structures (Derek, Mischa, David 2005) Processor Model Processor Operating Frequency L1 Trace Cache L1 Data Cache L2 Cache Main Memory Intel Pentium 4 2.0A 2GHz 12K entry 8KB 512KB 256MB The goal behind the model is to confine the execution of antivirus software on a system. To achieve metrics the stream executed is passed to the simulator. To simulate the micro-processor, simics are configured. The host (simulator) executes the operating system loaded via simulated hard drive. On top of the operating system the researchers have installed and run the antivirus software and also the test scenarios are taken (see figure 3.1.2). After this the comparison is done between the baseline configuration execution (without the antivirus software installed) and the systems that are installed with four different antivirus packages. L2 Cache Copy/execute process Antivirus Process L1 Inst Cache L1 data Cache Operating System (Windows XP) Inst Stream Simulate micro-architecture Simulated Architecture HOST Fig 3.1.2 Multi Level architectural Micro Architectural simulation environment (Derek, Mischa, and David 2005) The table 3.1.2 shows the summary of five configurations. For each experiment an image file is created and loaded as a CDROM in the machine. The execution of the utility (contains special instructions) at the start and end of each collection was done in order to assist accurate profile collection. Table 3.1.2: Five environments evaluated: Base has no antivirus software running (Derek, Mischa, David 2005) Configuration Anti-Virus edition Version Base NAV PC-Cillin McAfee F-Port Norton Anti-Virus Professional 2004 Trend Micro Internet Security McAfee Virus scan professional F-Port Antivirus for windows 10.0.0.109 11.0.0.1253 8.0.20 3.14b The three different operations invoke anti-virus scanning. In first, a file from the CDROM to the hard drive was copied, and then the operating system accessories: calculator and wordpad are run accessing through a shortcut. After experimentation it is found that there is less than one percent difference in the work load parameters throughout the profile runs. Then on doing the antivirus characterization it is seen that there is a gradual increase in the cache activity which shows that the overheads released is smallest for F-Port and highest for Norton. The impact on memory while running the antivirus software shows that Norton and McAfee have larger footprints that the Base case, F-Port Cillin. 3.2 Development techniques a framework showing malware detection using combination of techniques There are several developments in techniques used by antivirus software. These techniques must be able to detect viruses which were not detected by previous techniques and this is what we say a development in technique. Antivirus software not only does detect a virus but also worms, Trojan horses, spyware and other malicious codes which constitute malware. Malware is a code or a program which intents to damage the computer with its malicious code. We can filter malware by use of specific antivirus software that installs detection techniques and algorithms. Several commercial antivirus programs uses a common technique called signature-based matching; this technique must be often updated to store new malware signatures in virus dictionary. As the technology advances plenty of malware writers aim to employ better hiding techniques, importantly rootkits became a security issue because of its higher hiding ability. There is a development of many new detection methods which are used to detect malware, machine learning technique and data mining technique. In this research Zolkipli, M.F.; Jantan, A.,2010 have proposed a new framework to detect malware for which there is a combination of two techniques signature based technique and machine learning technique. This framework has three main sections which are signature-based detection, genetic algorithm based detection signature generator. Zolkipli, M.F.; Jantan, A., 2010 defines malware as the software that performs actions intended by an attacker without consent of the owner when executed. Every malware has precise individuality, goal attack and transmission method. According to Zolkipli, M.F.; Jantan, A., 2010 virus is that malware, which when executed tries to replicate itself into other executable code within a host. What so ever, as technology advances creating malware became sophisticated and extensively improved since early days. Signature-based matching technique is most common approach to detect malware, this technique works by contrasting file content with the signature by using an approach called string scan that search for pre-defined bit patterns. There are some limitations which needs to be solved to this technique though it is popular and very reliable for host-based security tool. The problem with signature-based matching technique I it fails to detect zero-day virus attack or zero-day malware attack. Zero-day malware attack are also called new launch malware. To store and capture a new virus pattern for upcoming use, some number of computers needs to be infected. Figure 3.2.1 shows an automatic malware removal and system repair was developed by F.Hsu et al. 2006 which has three important parts such as monitor, a logger, and a recovery agent. The framework solves two problems: Determines the un-trusted program that breaks the system integrity. Removal of un-trusted program Untrusted Process Trusted Process Logger Recovery agent Monitor Operating System Figure 3.2.1: Framework for monitoring, logging recovery by F.Hsu et al. 2006 The framework is used to monitor and enter logs of the un-trusted program. This framework is capable of defending known and unknown malware, though it does not need any prior information of the un-trusted programs. And from the user side there is no need of modifying any current programs and need not observe that the program is running in the framework as the framework is invisible to both known and unknown malware. A sample of this framework was used on the windows environment and shows that all the malware changes can be detected compared to the commercial tools which use the signature based technique. Machine learning algorithm was tested and applied on the malware detection technique. In order to classify the signature-based technique limitations that particular technique was using an adaptive data compression. The two restrictions of signature-based technique according to Zolkipli, M.F.; Jantan, A., 2010 are: It is not compulsory that all malicious programs have bit patterns which are proof of their malicious nature and are also not recorded in virus dictionaries. Many forms of bit patterns are taken by obfuscated malware that will not work on signature-based technique. Genetic Algorithm (GA) takes the full advantage of system limitations that are used to detect zero day malware or the day malware was launched. The algorithm was used to develop a detection technique called IMAD that analyzes the new malware. To oppose the restrictions of signature-based detection technique this technique has been developed. Data mining is another technique which was applied on malware detection much before. The standard data mining algorithm classifies every block file content as normal or used to categorize potentially the malware. To defeat the limitations of signature-based antivirus programs an Intelligent Malware Detection System known as IMDS was developed. This system used Object Oriented Association which adapts OOA_Fast_FPGrowth algorithm. A complete experimentation on windows API file sequence was done which re called PE files. The huge gathering of PE files was taken from the King Soft Corporation antivirus laboratory which is used to compare many malware detection approaches. The results show that IMDS system shows the best results than Norton and McAfee. The proposed framework has two techniques combined which are signature-based technique and GA technique. It was designed to resolve two challenges of malware detections. How to detect newly launched malware (Zolkipli, M.F.; Jantan, A., 2010) How to generate signature from infected file (Zolkipli, M.F.; Jantan, A., 2010) Signature Generator S-Based Detection GA Detection Figure 3.2.2: Framework for malware detection technique (Zolkipli, M.F.; Jantan, A., 2010) The main components are s-based detection, s-based generator and GA detection(see figure 3.2.2). The s-based detection acts first in defending the malware, then GA detection is the second layer which is another defense layer that is used to detect newly launched malware. After creating the new signature from zero-day malware these signatures are used by signature based detection technique. Signature based detection is a fixed examining method used on every antivirus product. This is also called a static analysis method. This decides whether the code is malicious or not by using its malware characterization. This technique is sometimes also called scan strings. In general every malware has one or more patterns of signature which has unique characters. Antivirus software searches through data stream bytes, when a program is executed. Database of antivirus software has thousands of signatures it scans through each signature comparing it with the program code which is executed. For comparing purposes searching algorithm is used, the comparison is usually between program code content with the signature database. The Zolkipli, M.F.; Jantan, A., 2010 chooses this technique at the beginning of the framework because of its effective detection of well known viruses. This technique was used in this framework in order to develop the competence of computer operation. G.A detection technique is one of the most popular technique that is used to detect newly launched malware. This is used to learn approaches to resolve algebraic or statistical research problems. This is a machine learning technique which applies genetic programming that learns a evolving population. Chromosomes are used for data representation which is used in this algorithm, chromosomes are bit string values, new chromosomes are developed from a bit string combinations from existing chromosomes. Basing the nature of the problem the solution for the problem is given. Crossover and mutation are 2 types of basic operations in GA, to solve the issues concerned with polymorphic viruses and new types of malware this technique was introduced in this framework. By using this technique codes of malware using hidden technique can also be detected which only because of its learning and filtering aspects of virus behavior.( Zolkipli, M.F.; Jantan, A., 2010) S-based generator generate string patterns are used by signatures which are used to characterize and identify the viruses. Forensic experts started creating signatures once a new virus sample is found, based on the virus behavior these signatures are created. All the antivirus products creates their own signatures and accessing records they are encrypted in case there are more than one antivirus software installed on the computer. As soon as a signature is created the signature database is updated with it. Every computer user requires updating the antivirus product with the database in order to defense against the new viruses. Signature pattern is 16 bytes and to detect 16 bit virus 16 bytes is more than enough.( Zolkipli, M.F.; Jantan, A., 2010) This generator takes the behavior of virus which identified by the GA detection. The signature pattern of the virus is generated and is added to virus database as a new signature for the signature based detection. To replace the forensic experts task this framework was proposed. This creation of framework was lot useful in detecting the new virus signature, and to improve the efficiency and performance of the computer. 3.3 Improving speed of signature scanners using BMH algorithm. This paper discusses about the problem of detecting viruses using signature scanning method that relies on fast pattern matching algorithm So basically in this technique the pattern is a virus signature which is searched for anywhere in the file. This algorithm is an expensive task which affects the performance frequently. Many users may find it impatient if the pattern matching algorithm does not work fast and consumes lot of time. So to avoid this faster pattern matching algorithm is used to the scanner which is Boyer-Moore Horspool algorithm when compare d to Boyer-Moore algorithm and Turbo Boyer Moore algorithm proved to be the fastest pattern matching algorithm. In technical terms, a virus has three parts which are trigger, infection mechanism and payload. The main mechanism which is infection mechanism part actually looks for fatalities and frequently avoids multiple infections. After looking for fatalities it might overwrite the fatalities or can attach itself at the beginning of the file or at the end of the fle. Trigger is actually a event which specifies when the payload has to be executed. The payload is the foundation of malicious behavior which actually can be corruption of boot sector or manipulating files. To detect a virus and to disinfect the infected file are two most important tasks of algorithms used by antivirus software. So defense system code of the algorithm must have a part that is able to detect any type of virus code. There are four types of basic detection techniques. Integrity Checking Signature Scanning Activity Monitoring Heuristic Method. Integrity checking technique: This program gives checker codes that can be checksums, CRCs or hashes of files that are used to check viruses. Regularly the checksum are re-computed and is compared against the previous checksums. In case the two checksums does not match it is indicated that the file is infected since the file is modified. This technique detects the virus presence by detecting the change in files and also is capable to detect new or unknown viruses. But this technique has several drawbacks. Firstly, the primary checksum calculation has to be performed on a virus less clean system so the technique can never detect viruses if system is infected. Secondly there are lots of false positives if the system is modified during execution. (Sunitha Kanaujiya, et., al 2010) Signature scanning technique: This technique is used on large scale to detect virus. This reads data from a system and to that it applies pattern matching algorithm to list of existing virus patterns in case it matches with the existing patterns it is a virus. This scanning technique is effective but the pattern database needs frequent updating which is very easy. There are several advantages of this scanner one of it is the scanning speed for this technique can be increased, it can also be used to detect other types of malicious programs like Trojan horses, worms, logic bombs, etc. So mainly for the virus it is only signature of the virus which is needed and update it to the database. This technique is used on many viruses due to this reason. Activity monitoring technique: This technique is used to monitor the behavior of programs executed by some other programs these monitoring programs are known as behavior monitor and they stay in main memory. The behavior monitors alarms or do some action to prevent the program when it tries to do some unusual activities like interrupting tables, partition tables or boot sectors. The database maintains every virus behavior that is supposed to be. The main disadvantage is when the new virus uses another infecting method that is not in the database and in this scenario finding virus is helpless. Secondly viruses avoid defense by activating earlier in the boot sequence prior to the behavior monitors. And also viruses modify the monitors