Sunday, March 31, 2019

Links Between Investment in Infrastructure and Job Creation

Links Between Investment in al-Qaeda and Job CreationSourav Roy (13060242044)Sourav Das (13060242043)Saptarshi Maiti (13060242036)Devika Kannan (13060242013)Executive summaryThe resultant roleive shaft to create strains is counter-cyclical consumption on base of operations. As the demand for private domain is weak, the authorities dish outs the people with conjectures and also aggregate demand. Investments of rigation ar dual-lane into two partsEconomic sectors include increasing efficiency in window pane, including roads, rail focal points and water supplyways,Social sectors such as education, water and sewage system.Investments in a local scenario and their seismic disturbance on development strategies lead to cornerstone of much jobs, greater ownership, and tin rapidly boost up the local economies. This is curiously applicable in times of crisis. Decentralized universe investment should be favored where ever possible. It is very consequential to assess the resultant excavate output of these investments with respect to its impact on direct as head as indirect and handicraft, not only to assess their productivity in con run, precisely also to assess the recollective run impact on growth and other subsidiary effects. on that point are be of foot projects in broken and medium-income countries which are financed fully or part by IFI. Institutions like these should make an effort to allow for larger work participation in foot development. Fiscal decentralization can be defined as a two-dimensional policy1). decentralisation of appraise instrument.2). Decentralization of expenditure.The relation between decentralization and government efficiency can be divided into two large neighborhoodsa) The classical theory There are three main contribution where this theory can be restricted, those are Tiebouts model of local public good readiness where decentralization coupled with mobile households solve the problem of the efficient provision of public goods. The second most influential contribution is of Oates(1972) Decentralization Theorem that involves the tradeoff between centralized and decentralized provision of public goods in choose of former if average preferences crosswise citizen of different region are equal. The theorem stresses on to maximize social welfare. And the last is Leviathan hypothesis where it shows the mechanism for constraining the expansionary tendencies of government mechanism.b) The second generation theory The effect of fiscal decentralization has been copy to embody the political process and the possibility of asymmetric information across political agents.Description of Policy Challenges jibe to the idea, on an average major(ip) percentage of total stimuli package in bag is spent in emerging economies as compared to authentic economies. The policy-brief report card tried to link infrastructure spending to job creation across economies. In this section the paper mentioned th e main challenge of gestation period of the infrastructure projects. It viewed the time derived function in processing of such projects as a challenge, as it failed to vex the pass judgment outcomes on the stipulated time during a crisis situation.It later pointed out how infrastructures in different areas bear different results. Infrastructural Investment in rural area created more jobs than in urban areas as the jobs in rural areas are more labour intensive. It express, The policy challenge is to match the chumping of infrastructure investments with the targeting of fight creation, be it by category or geographic area.It explained the challenge with the help of examples of policies in three economies USA, Indonesia and Egypt. The paper said that in USA infrastructure expenses consists only a minor portion of the total fiscal input signal. According to the paper, expenditures on infrastructure accumulated up to 30 September 2009 amounted to US$4.44 billion or 2.6 per cent o f the total fiscal stimulant drug during the period. However, consort to a few articles in Forbes and Bloomberg Obama is planning to spend highly on infrastructure like science research and education and upgrade bridges, ports and roads to create more jobs. (Runningen, 2013) (Lenzner, 2011). The amount spent by USA in infrastructure is huge but, if we consider the share of infrastructure in gross domestic product is only 2.4%.In USA American Recovery and Reinvestment Act was passed in 2009 which was a stimulus package to help recover the realm from the bully Recession. The Act followed Keynesian macroeconomics wherein high public expenditure was necessary for alter the un use condition and and economic deterioration. USAs plan stimulus package after revision was 831 billion dollars and according to Paul Krugman it was as well less though he was supportive of the law. (Nobel Laureate Paul Krugman also Little Stimulus in Stimulus Plan, 2009) Some of the critics for this policy said that it was too slow and had a huge price tag but according to the data the policy had resulted in decrease in unemployment as the unemployment rate is around 6and half percentage points lower. (Blinder Zandi, 2010)The policy paper further gave examples of Indonesian and Egyptian stimulus package. The Indonesian Government spent 7.6 billion dollars to boost aggregate demand and this spending on infrastructure was 17% of the GDP. Estimation of the government to set a job creation target of over one million workers was surpassed. As for the Egyptian government the stimulus package was worth 2.82 billion dollar in the financial course 2008-09. According to various estimates it stated that the complete stimulus package is expected to create between 661,420 and 729,650 new job opportunities.This section of the policy paper concluded by mentioning that some amount of public expenditure (read infrastructure spending) is good as it helps in growth and development of economy by mean s of skill development of the labour and promotion of SMEs (Small and Medium Enterprises). It further wrote spending cuts in such forms of investment would have a serious detrimental impact on employment and recovery unless ways could be found to maintain function with reduced costs.Policy Options to address the challengeThe examples illustrated preceding(prenominal) clearly reflect the issues related to the number of jobs created and the targeting of different sections of labour force. The focalization of policy making in this area should shift from the amount of gold spent to the number of jobs created relative to the set of employable workers and to the amount of public services provided. A prolonged strategy needs to be developed whose clinical would be to provide short term relief from unemployment and long term creation of jobs aiming to meet the structural infrastructure deficits.Mea genuines to guarantee well timed(p) implementationHigher public spending in periods of crisis for job creation involves a lag which is inherent in the cycle of identifying, formulating and approving projects. Therefore, objective should be a speedy and by the bye implementation, as an economy which is already in recession can deteriorate even quickly. The rate at which jobs can be created depends on the type of projects (large construction projects versus minuscule or medium aliment projects). Another important factor which determines the pace of the projects is the dispersal of public tender procedures.A number of countries experience effective proceeding of public investment at less than 50% of the amount budgeted. Therefore, the short term objective is to achieve full execution of available resources rather than just allocation of additional resources. In order to ensure the timely implementation and to reap benefits from the existing administrational structures, public work schemes can be given additional funds to scale up. Taking up planned infrastructure and improving the efficiency of implementation of works formulated in public investment programmes are few of the features of the fiscal stimulus package.Decentralization of standard administrative procedures and dividing them into small grants at local levels to employ modest local contractors, labourers and local resources to efficiently enhance the employment opportunities of the infrastructure dowry of the packages is often a more effective than centrally planned and put to death projects.TargetingTraditionally, the options of targeting were limited in public investment programmes, since majority of the works were for the most part executed by private enterprises. As objectives of targeting can be influenced to a certain degree through innovations to procurement systems hence, Public Employment Programmes, in which special targeting mechanisms can be applied, play an important complementary role.An important means of targeting constitutes the prioritization of investment pro jects in areas most affected by crisis. Subcontracting small works to local labourers allows for the targeting of special groups, such as women. In even maintenance activities, women may take a larger share of job opportunities.Impact of infrastructure spendingAn investment in infrastructure is the outset stepping stone towards the long run development and also takes into account ready social needs. Generally, investments in infrastructure includes those in economic, such as, improving transportation viz. roads, railways and waterways and social sectors, such as health and education, treatment of water and sewage, and other public sectors. These investments depend mostly on the urgent requirements of the country. A major part of these expenditures can be executed through nonaged or medium-scale enterprises and in that locationby promoting them.Investments in infrastructure with a focus on the employment have a strong employment multiplier effect, since it leads to job creation both directly and indirectly. Increased usage of local goods and services creates a high indirect employment effect, which in turn leads to high local incomes and thereby stimulates the local demand and consumption.However, this has to be taken cautiously as the way a job is defined varies from one country to another. There is no valid way to measure the direct employment created because of the fiscal stimulus package, as most countries face problems in gathering reliable data. Therefore, we need a consolidated effort to improving our way of understanding and documentation of the effects, in order to provide better centering on the measures where the effects of multiplier are most prominent, given the requirements of the particular country.ConclusionInvestments in infrastructure should be launched to build up crownwork for sustainable development and inclusive growth human capital including skills, employment (including green jobs) and entrepreneurship development, and physica l capital such as construction, rehabilitation and maintenance of infrastructure.As told earlier decentralized public investment should be like-First, because decentralized decision-making processes are faster and local population more commit to the projects. It improves targeting and its proper use and maintenance.Secondly, the works undertaken are usually on a smaller scale and involve less expensive tenders, which mean there is less need for heavy machinery.Third, decentralized tenders are more probably to be executed by local firms using workers from the area, thus boosting the local economy as a whole.Because many infrastructure projects in low and medium countries are co- financed by international financial institutions, these institutions should make sure that their regulations allow for an increase in labour content in infrastructure development. Readjusting the design, procurement and contracting modalities of such products could have a major effect on employment.Works C itedBlinder, A. S., Zandi, M. (2010, December). Stimulas Worked. Retrieved from www.imf.org https//www.imf.org/external/pubs/ft/fandd/2010/12/blinder.htmCouncil-on-Foreign-Relations. (2014, March 4). Infrastructure. Retrieved from www.cfr.org http//www.cfr.org/infrastructure/infrastructure/p26178Lenzner, R. (2011, October 23). A $1.2 Trillion Infrastructure Plan Creates 27 one thousand thousand Jobs In 5 Years. Retrieved from www.forbes.com http//www.forbes.com/sites/robertlenzner/2011/10/23/the-u-s-wont-be-able-to-grow-again-until-2016-18/Nobel Laureate Paul Krugman overly Little Stimulus in Stimulus Plan. (2009, February 19). Retrieved from http//knowledge.wharton.upenn.edu/article/nobel-laureate-paul-krugman-too-little-stimulus-in-stimulus-plan/Runningen, R. (2013, November 9). Obama Urges Infrastructure spending to Spur U.S. Economy. Retrieved from www.bloomberg.com http//www.bloomberg.com/news/2013-11-09/obama-urges-infrastructure-spending-to-spur-u-s-economy.htmlSpending on transport infrastructure modish Data Released. (2013, July 11). Retrieved from www.internationaltransportforum.org http//www.internationaltransportforum.org/Press/PDFs/2013-07-11Spending.pdf

Exosome as Nanoscale Vesicles | Pancreatic Cancer Research

Exosome as Nanoscale Vesicles pancreatic Cancer Re faceAbstractExosome ar nanoscale vesicles that ar released from crab louse prison cells, playing an important contribution in the microenvironment of pubic louseous neoplasm cells.6,8 The exosomal vesicles (EV) contribute to the progression and growth of the tumor, and underside be targeted apply gold nanop holds (gross national product).1,6,7 The exosomes be isolated from the seam plasma, and with their stableness in bodily fluids, they bum be targeted and conquered apply GNP. The GNP result reduce the crabby person cell, and volition stop tumour growth and production. apply proteomic and vicenary methods, the exosome EphA2, showed the spiritedest detecting of specificity and predisposition in pancreatic malignant neopcobblers lastic disease patients.1,2,4,8 Further tests substantiate that EphA2-EV has electromotive stick in archetypal maculation for pancreatic basincer, payable to the levels spec ificity and predisposition beingness higher in comparing to pancreatitis patients and the control patients.1Key intelligence agencysBio fools, Exosome, Pancreatic s halt wordcer, Nanoparticle, Proteomics, Vesicles, Plasma, Antibody universePancreatic cancer, is vastly terminal, with a survival rate of less than 5%. Pancreatic ductal adenocarcinoma (PDAC), is the or so common random variable of exocrine pancreatic cancer, accounting for around 95% of pancreatic cancer cases.10 PDAC is a tranquil cancer, and with the pretermit of interrogation, the wish for novel bio scorings to aid in archean under skip work is imperative. With no reasonable proto(prenominal) signal contracting methods, and no symptoms of early lay out PDAC, the cancer testament progress rapidly throughout the body forwards it is detected. on that point is fate to find a biomarker, aiding in the early spotting PDAC, so that a treatment can be provided to stop the cancer from progressing. The cu rrent tumour biomarker, CA19-9, is non reliable in early detecting due to falsely elevated results of diseases early(a) than PDAC.10Recent studies suggest that exosomes, a nanovesicle, has a high potence as the future biomarker of PDAC, due to the stability and detection sensitivity in human blood plasma.1,2,4,8 Malicious exosomes, atomic number 18 veiled by cancer cells, screening the importance in tumour maturation and progression.7 Studies show how to optimize a method, to isolate exosomes from the blood plasma, to foster assist in biomarker baring. In regards to analysing exosomes as a capability biomarker, exosomes need to purified and isolated with differential centrifugation paired with ultracentrifugation (UC). An early(a) technique used, is affinity purification of the exosomal membrane antigens using density gradient (DG) centrifugation, separating the vesicles based on their density.8 A practise needs to be conducted, to purify exosomes, from only a trivial volu me of blood plasma.With studies being conducted on the stability in fluids of locomote exosomes, it can be confirmed that these nanovesicles have the ability of targeting to uptake to counteract or delay tumour development. With the size of the exosomes ranging from 40 100 nm, they be distinguished for tumour microenvironment. Exosomes, a potential biomarker, for the early detection of PDAC, be similarly being studied as potential nanocarriers to target cancer cells and delaying tumour growth.1,7,8 The most common nanocarrier being studied is the gold nanoparticle (GNP), due to its imaging, diagnostics, and therapy abilities. The GNP can be easily synthesized via the citrate reduction, which is why is has potential in medical theranostics.7Extracellular vesicles (EV), argon secreted into extracellular space, they be tangled in tumour initiation, progression as strong as metastasis. EVs can be used as non-invasive biomarkers, but the current studied methods are time consumin g in regards to EV isolation.1,7,8 The EV membrane markers which are part of the tetraspanin family, are CD9, CD63, and CD81, respectively, and an baulk demonstrates similar features.6 A nanoparticle EV assay, will be tranced by an EV-specific antibody with the dual binding of EV, using 2 nanoparticle probes. The 2 nanoparticle probes, will produce a plasmon, promoting an increase in sensitivity and specificity for the disc overy of an exosomal biomarker. Ephrin type A receptor 2 (EphA2), has recently been identified as a biomarker, of the tumour derived pancreatic cell line, and enriched on EV.1 EphA2, shows overexpression, increases in vitro invasiveness and anoikis subway system in pancreatic cancer cell lines.1 A recent scan has been conducted with healthy control patients, pancreatitis patients as fountainhead as pancreatic cancer patients, with the use of nanoplasmon-enhanced parting (nPES) assay a abstain, sensitive, and specific method in biomarker detection.Conventio n Tumour Markers in Pancreatic CancerCarcinoembryonic Antigen CEACEA, is a glycoprotein, that is mensural in a common blood test used for testing patients with cancer, including pancreatic cancer. This will measure the add together of the CEA protein that is in the blood of a patient who may have cancer, and the CEA levels can be used to desex whether treatment is working or if the cancer is spreading. A CEA level of 5 ng/mL, is considered a normal level of this protein, but there are several conditions that can alter the levels of the CEA in your blood, which is why this is not a valid biomarker in the detection of pancreatic cancer.5 CEA testing can be useful in regards to recurrent colon cancer as nearly seeing if treatment is successful. Levels of CEA can be elevated due to smoking, as sanitary as in other diseases much(prenominal) as Crohns disease. referable to the unreliability of CEA levels in cancer, this blood test confirms that CEA is not a unvarying biomarker for the early detection of pancreatic cancer.CEA is expected to be paired with other biomarkers, for early detection reasons. When paired with CA19-9, there is an increase in detection for sensitivity and specificity, showing an improvement in diseases including pancreatitis as well as pancreatic pseudocyst. Despite the improved results for pancreatic diseases, CEA is still not valid for the detection of pancreatic cancer, even when it is paired with another marker much(prenominal) as CA19-9.5Carbohydrate Antigen CA19-9Carbohydrate antigen (CA19-9) was discovered in 1981, and is considered a sialyl lewis a (sLea).9 CA19-9 is found on the step up cancer cell, expressed as a glycolipid and an O linked glycoprotein, and is meetd to the Lewis blood group antigens.3 Patients with Le (alpha of import +) or Le (alpha + beta -) blood group, express levels of CA19-9 in their blood, whereas most 5 10% of patients with Le (alpha beta -) blood group do not express CA19-9, limiting the use as a valid biomarker.9 Due to the low, and uncertain sensitivity of CA19-9, it is a poor interpreter of PDAC, hence it is not a take to bed biomarker.CA19-9 is unable to differentiate between benign, harbinger lesions and malignant conditions in PDAC patients, and it gives elevated results in many another(prenominal) other GI cancers.3 This blood test can show elevated CA19-9 levels in patients with other non-cancer diseases including pancreatitis and cirrhosis.3,9 The CA19-9 blood test can be beneficial in regards to sharp if a pancreatic tumour is secreting it, and to judge the efficiency of treatment, and look for pancreatic cancer recurrence. A healthy patient will have a CA19-9 level of 0 37 U/mL, therefore with increase levels of CA19-9, this could place tumour growth.3For more right results, a PDAC marker needs to be discovered and paired with CA19-9, to increase the sensitivity and specificity in early detection. With CA19-9 as the only marker, studies show it w as only elevated in 50 75% of patients having PDAC, confirming that is not consistent as a biomarker and should not be used in diagnostic testing.3,9 Expressing elevated levels in other diseases such as benign jaundice, pancreatitis, and ovarian cancer, confirms the lack of consistency using the CA19-9 marker and that it cannot be used as an accurate indication of early pancreatic cancer detection.3Emerging BiomarkersWith the absence of reliability using the current PDAC biomarker, C19-9, it is a necessity to discover a biomarker with improved sensitivity as well specificity for the early detection of PDAC. Recent studies suggest, that exosomes can be detected in body fluid such as blood, and they have potential as disease biomarkers. Exosomes, found in blood plasma, need to be poised from healthy patients to scram individual and pooled samples. The imperturbable blood plasma, will need to be separated, by centrifugation, to isolate the exosomes for further proteomic and three- figure studies.8 isolation MethodsIsolation of exosomes using the UC method, involves normal human plasma, and diluting it with PBS. The sample will be differentially centrifuged, to eradicate cell debris, which is followed by UC. The subsequent pellet, is washed in PBS, and filtered, and the sieve was ultracentrifuged. The resulting exosomal pellet, used for the study, will be resuspended in PBS.8Using the EI isolation method, the plasma, is diluted in PBS and centrifuged. The supernant is filtered, and the filtrate will be incubated using a blocking agent. A microcolumn was placed in magnetic separators, where the column was rinsed with rinse solution. Beads were bound to the exosome, and were applied to the magnetic column. The column will be washed with rinsing solution, and the immune captured exosomes were recovered by removing them from the column and placing them in a collection tube. The exosome bound microbeads are washed to elute the exosomes, and centrifuged to obtai n the exosomal pellet. The exosomal pellet will be resuspended in PBS.8Lastly, isolation using DG method, involved the exosomal pellet that was obtained from UC as well as normal blood plasma that was layered on iodixanol solution and centrifuged. To the top of the tube, there were 12 fractions, with increasing densities. The fractions are diluted with PBS and centrifuged, the resulting pellet was washed with PBS, centrifuged and resuspended in PBS.8Western Blot and Microscopic AnalysesThe western blot method, shows the enrichment of the exosomal marker proteins. change electrophoresis is used to separate and identify the different proteins. The thickness of the band, indicates the amount of the protein that is present. There is a labelled antibody, that is bound to the protein of interest. AFM is used, to get a 3D name of the exosomal vesicle.Recent studies confirma that the exosomal markers CD9 and CD63 are enriched in exosomes purified using UC and EI methods.8 The study indica tes that the UC method, had four exosomal markers whereas the EI method had only cardinal exosomal markers, CD9 and CD63. Transmission electron microscopy (TEM) and atomic force microscopy (AFM), were used on the isolated exomes, from the three exosomal isolation techniques. In the DG sample, the TEM reported homogeneous vesicle, with diameter ranging from 40 100 nm, confirming the characteristics of exosomes. The AFM produced a 3D image of the exosome, and after further analysis it was revealed that the exosomes had round membrane-forming vesicle characteristics.LC-MS/MSLiquid chromatography fix spectrometry (LC-MS/MS), is a quantitative method used for the identification of proteins at the peptide level. The initiative quadrupole is for the selection of the antecedent and the back up quadrupole is highly specific for detection. In comparison to gas chromatography plenty spectrometry (GC-MS), LC-MS/MS is not limited to volatile substances, it is better for the detection o f molecules. LC-MS/MS can produce many quantitative results, and has a high specificity and sensitivity.The study was carried out, using an LTQ Orbitrap Velos with a nanoelectrospray interface coupled to an Ultimate 3000 RSLC nanosystem and the LTQ Orbitrap Velos mass spectrometer operates using a nano -ESI spray. The LC-MS/MS spectra are searched against the human protein database using MASCOT. Equal amounts of protein from the three exosomal samples were separated, reduced, alkylated and digested with trypsin. The DG sample had the highest number of protein identifications, followed by the UC isolation method. Therefore, the western blotting, microscopy and MS results confirm that the DG isolation method is the most effective, in regards to isolating exosomes from blood plasma.8Targeting with sumptuous NanoparticlesMalicious ExosomesThe exosomes are make from endosomal pathways, after they are fused from multivesicular bodies (MVBs) with plasma membrane. The corporeal composit ion of vicious exosomes, to a fault starts in the endosomal pathway. The early exosome is formed from the migration from the cell periphery to the nucleus, by the formation of intraluminal vesicles (ILV). The process interceded by exosomal complexes required for transport (ESCRT) and other proteins. Late exosomes/ MVB, immigrate to the periphery and fuse with the membrane, releasing the ILV, which are called exosomes. The proteins, Rab GTPases, mediate the endosome migration.7 The malicious exosomes, are released from cancer cells found in the tumour microenvironment. Exosomes play a persona in variation and shaping of that tumour microenvironment.1,2,4,6,8Malicious exosomes have potential as biomarkers, due to their stability in biological fluids including blood plasma. There have been increased levels of circulating exosomes seen in several cancers including pancreatic cancer.1,6,7,8 Nanovesicles can be used to carry therapeutics, and have potential to limit cancer progression. 1,7 The method consists of inhibiting the malicious exosomes biogenesis.Gold Nanoparticles The GNPs can be easily synthesised, as well they consist of a variety of shapes and sizes. These nanoparticles exhibit intense scant(p) absorption and scattering, and they are deemed to be highly stable.1,7 They have potential in targeting, therapeutics as well as diagnostic capabilities. Regarding rapid tumour growth, a compressed lymphatic vessel will collapse causing lymph drainage, which will then allow for the nanosized molecule to be taken at the tumour site.7 This process will allow for passive targeting with nanosized molecules. The cellular interest will be dependent upon the size and shape of the GNP.1,7 The tumour cells will overexpress their cell number receptors, which can be used for potential biomarkers.1,2,4,6,7,8 These cell surface receptors, will aid in the direction of the GNP to the tumour cells.Gold Nanoparticle TargetingThe GNP will target malicious exosomes, by undertak ing the malicious exosomes biogenesis with GNP specific targeting moieties as well as silencing moieties.7 Using antibodies to aim at the exosome for capture and selective retention. Lateral flow immunoassay, will aid in exosome detection with CD9 and CD81 as antibodies, and CD63 with GNP.1,7 Therefore, GNP are being studied as a potential candidate for cancer therapy as well as for malicious exosome targeting. The use of nanotheranostics to help quantify and inhibit the malicious exosomes.Sample Collection and ProcessingThis recent study, developed a method for the purification of exosomes in blood plasma, as well as finding the EV intentnesss in the plasma samples. A three-probe EV capture was used, with a capture antibody that recognizes an EV membrane protein (anti-CD81), with antibody conjugated AuS and AuR to serve as two EV probes. This EV capture was designed to form a plasmon, with the different GNP binding on an EV to improve sensitivity and specificity of EV detection.1 The study examined 59 pancreatic cancer patients, 48 pancreatitis patients, and 48 control patients, to see if early pancreatic cancer stage could be distinguished from pancreatitis patients and the control patients.1MethodThe EV isolation consisted of cells bighearted in shade media, and washed with PBS. The culture supernatants were collected and centrifuged to pellet cells, and centrifuged again to charter cell debris. Concentrated with centrifugal filtering units, and centrifuged, the precipitates were collected and resuspended in PBS and centrifuged. The resulting precipitates were collected and dissolved in PBS. The ELISA assay, consisted of ninety-six well plates, which were incubated with antibody CD81. The ELISA assay was analysed for absorbance, and the standard curve plotted the light absorbance versus the log10 EV standard concentration in pg/uL.1The peptides were separated using Ultimate 3000 nano-LC, with an enrichment column as well as an analytical column. The pe ptide fractions were analysed with Velos Dual-Pressure Linear Ion Trap mass spectrometer, and one MS scan, was followed by eight MS/MS scans.The nPES platform was constructed by fill up sample wells with plasma sample or cell culture EV samples, followed by incubation and being washed three generation with PBST and three times with PBS. The sample wells were then filled with AuS and AuR PBST solution, and were incubated and washed three times each with PBST and PBS, respectively. The sample wells were fitted with a cover slip and dark-field microscopy (DFM) was used for imaging. The DFM images, that had image cranial orbits with brightness equal to 225 were selected, and the ratio of the image area to the whole image gave area ratios that were indicative to the nPES EV signal.1 A standard concentration curve was generated with a linear regression of nPES area ratio with log10 concentrations.1SEM images analysed the images of GNP binding to EV, from EVs that were purified from hu man plasma. The purified EVs were hybridized with anti-CD63-AuS and anti-CD9-AuR. The SEM fields were analysed to calculate the thoroughgoing EVs, as well as the number of GNP-bound EVs per um2 of each assay.Proteomics and the Early perception of PCAn nPES was previously designed, for EV detection using GNP, that can scatter light at different wavelengths indicative to their shape and size. Using some(prenominal) gold nanospheres (AuS) as well as gold nanorods (AuR), a plasmon is formed, increasing the scattering intensity. With the plasmon, antibodies against CD9, CD81, and CD63 can capture and detect EV in a sample.1,7 AuS and AuR are detectable using dark field microscopy (DFM), and will form the complexes AuS-EV-AuR, AuS-EV and AuR-EV. These complexes can be analysed using scanning electronic microscopy (SEM), examining the binding and distribution. side by side(p) the pure preparation of EV samples, EV plasma was added to give the EV plasma standard. The anti CD81 was incu bated with the standard and two antibodies conjugated GNPs, AuS-Anti-CD63 and AuR-Anti-CD9, which exhibited ratios 0.35%. A comparison was done with nPES and enzyme linked immunosorbent assay (ELISA), of the sensitivity and linearity of their EV values. The nPES assays showed to be highly sensitive, requiring less plasma as well has exhibiting more advantages over ELISA in regards to measuring EV concentrations.1Since CA19-9 is the only accepted pancreatic cancer marker that is not valid, pancreatic cancer derived EV marker is a more feasible biomarker due to the multiple factors that the pancreatic cancer cells express. The nPES assay will quantitate tumour derived EV from blood samples, and one of the two EV specific GNP were replaced with one specific for the membrane protein. LC-MS/MS proteomics, bioinformatics is used to identify trans-membrane proteins on EV PC (PANC-1 and MIAPaCa-2) and PDAC (BxPC-3).1 There were 128 membrane proteins identified, and 26 were expressed on E V. The EphA2 showed the highest expression and is associated with cancer progression, metastasis, and prognosis. The EphA2, was also not expressed by EV in HPNE. EphA2 was chosen as the potential marker, and CD81 and CD9 were chosen for EV capture. The nPES was modified, using one capture antibody (anti-CD81) and two antibody-conjugated GNP probes (anti-EphA2-AuS and anti-CD9-AuR).1The plasma EphA2-EV levels were higher in pancreatic cancer patients, in comparison to pancreatitis patients and the normal control (NC). With the strong association between the circulating EphA2-EV and early stage pancreatic cancer, there is potential for EphA2-EV to be used as an early detection marker.1 The CA19-9 levels were increased in the pancreatic cancer patients in comparison to the pancreatitis patients and the NC, but the levels were not increased in the early stages of PC. The murderer operating characteristic (ROC) curves, showed that the plasma EphA2-EV levels are promising in the categor ization of pancreatic cancer stages.The current EV analysis methods are dense and lengthy for the isolation procedures, as will having volume requirements. The nPES platform that has been studied, assimilates EV capture and detection with the use of the plasmon coupling effect, to have an increase in both detection sensitivity and specificity in small volume samples and fast sensitive biomarker quantification. This EV nPES platform, can be generalizable for any disease order that has a specific EV marker.1 The nPES EphA2-EV blood assay shows substantial value regarding pancreatic cancer screening tests, due to being a rapid, accurate and non-invasive blood test for the early diagnosis of pancreatic cancer.ConclusionsThis reassessment article explains the need to find a valid biomarker in the early detection of pancreatic cancer, as well as discussing how exosomes have potential to be that marker in the early detection process.1,2,4,6,7,8 The existing biomarkers for pancreatic can cer, are not valid markers in the early detection due to the lack of sensitivity and specificity that they exhibit when differentiating between benign and malignant stages. The use of exosomes for the early detection of pancreatic cancer, shows potential as a biomarker, with the use of nPES platform.1 The platform allows for EV capture using plasmon coupling, which increases in detection sensitivity and specificity, which allows for the discovery of an ultrasensitive biomarker. The nPES EphA2-EV assay could differentiate between pancreatic cancer patients (stage I and II) and pancreatitis and NC patients.1 The role of EphA2-EV, could help to improve early detection rates as well as improving patient outcome, and this blood test is inexpensive, accurate and non-invasive. This review involved proteomic and quantitative methods, to find a novel biomarker for the early detection of pancreatic cancer, and non-invasive nPES EphA2-EV analysis can aid in improving early pancreatic cancer de tection and treatment.ReferencesLiang, K. Liu, F. Fan, J. Sun, D. Liu, C. Lyon, C. J. Bernard, D. W. Li, Y. Yokoi, K. Katz, M. H. Koay, E. J. Zhao, Z. Hu, Y. Nature Biomedical Engineering 2017, 1 (0021).Duxbury, M. S. Ito, H. Zinner, M. J. Ashley, S. W. Whang, E. E. Biochemical and Biophysical Research Communications 2004, 320 (4), 1096-1102.Jazieh, K. A. Foote, M. B. Diaz, L. A. Seminars in Radiation Oncology 2014, 24 (2), 67-76.Ansuini, H. Meola, A. Gunes, Z. Paradisi, V. Pezzanera, M. Acali, S. Santini, C. Luzzago, A. Mori, F. Lazzaro, D. Ciliberto, G. Nicosia, A. Monica, N. L. Vitelli, A. ledger of Oncology 2009, 2009, 1-10.Ballehaninna, U. K. Chamberlain, R. S. Tumor Biology 2013, 34 (6), 3279-3292.Melo, S. A. Luecke, L. B. Kahlert, C. Fernandez, A. F. Gammon, S. T. Kaye, J. Lebleu, V. S. Mittendorf, E. A. Weitz, J. Rahbari, N. Reissfelder, C. Pilarsky, C. Fraga, M. F. Piwnica-Worms, D. Kalluri, R. Nature 2015, 523 (7559), 177-182.Roma-Rodrigues, C. Raposo, L. Cabral, R. Parad inha, F. Baptista, P. Fernandes, A. International Journal of molecular(a) Sciences 2017, 18 (1), 162.Kalra, H. Adda, C. G. Liem, M. Ang, C.-S. Mechler, A. Simpson, R. J. Hulett, M. D. Mathivanan, S. Proteomics 2013, 13 (22), 3354-3364.Ballehaninna, U. K. Chamberlain, R. S. Indian Journal of Surgical Oncology 2011, 2 (2), 88-100.Pancreatic Cancer https//www.cancer.org/cancer/pancreatic-cancer.html (accessed Mar 20, 2017).eldorado by Edgar Allan Poe AnalysisEldorado by Edgar Allan Poe AnalysisIn the poem Eldorado, poet Edgar Allan Poe delivers a fundamental pass that can be understood if carefully evaluated. Poe gives the account of a sawhorse in search of a land called Eldorado, which holds riches and fortune. After much futile searching, the horses enthusiastic quest for treasure ends in death. The foremost stalk of this poem is the passion for riches and treasure. This theme is an influence from Poes life and the pertinent Gold Rush of 1849 (Coad 60). The literary devices, symbols, relevancy, and personal experiences offer a deeper convey to the poem than what lies on the surface. Poes skillful use of these elements helps to stress the ignorant desire humans have for wealth and fortune.The poem delivers a reflective chaste issue many readers can, in some way or another, relate to. Poe uses the word hind end in each of the four stanzas of the poem, each stanza consisting of six lines. The 3rd line in each stanza is where the use of the word phantasma is introduced. Though the word occurs multiple times, it has a different consequence each time. The first fanny represents a literal behind, a casting hind end of the sun. It could also be interpreted as ecstasy and sadness. The second duskiness represents the shadow that has overcome the knights heart after much unsuccessful searching. The third shadow represents a live figure, possibly his or maybe an angel. And the ordinal shadow figuratively refers to Valley of the nighttime (21). The fact the knight has grown old and weak, and must cross Over the Mountains Of the Moon, Down the Valley of the Shadow is seen as a symbol of the knights death, relating to the Biblical valley of death (19-21). by dint of Poes use of the word shadow and the period in which the poem was written, readers can understand Poes message.Poe uses the shadow in each stanza to convey his message. As the meaning of the shadow changes, so do readers wound up state. As he begins the first stanza, readers see a happy, gaily, bedighted knight who is enthusiastic about going on his search for gold. This start gives readers a sense of happiness and jolt of energy. His shadow could also be a foreshadowing of future events. However, Poe begins the second stanza with the word But. This contradictory word signals a shift between the first and second stanza and also a shift in emotion. The knight has become old, disheartened, and dispirit as the shadow is used in context to signal the emotional state of the knight. This signal causes readers to suddenly have a change in emotion readers become sympathetic towards the knight. Poe continues to elaborate on the disappointment of the knight in stanza three. The knight encounters a live or possibly creative figure and asks the shadow where is Eldorado, reflecting on his hopeless journey in which he wasted his life. This figure could possibly be an angel providing guidance, an angel of death, or even himself. As the shadow replies to the question in stanza 4, readers are left wing with the idea that he has come to the end of his life and has died. With the closing of the poem, the interview can relate to the pain the knight feels. In all, the repetitive shadow becomes engraved in the readers mind, helping to sway the emotions. The life of the knight also provides a moral for people to learn.Poes moral in Eldorado is not to seek for riches on earth. The only true riches are the riches one receives after death. The knight in the poem seeks fo r physical riches for many years without any hope, leaving him disheartened and at the end of his life. When asked where Eldorado could be, the knight was told Down the Valley of the Shadow (21). This implication emphasizes the main point that true riches are found in Heaven, not earth, and any riches sought on earth leads to despair and death.As suggested by The Meaning of Poes Eldorado by the John Hopkins University Press, it can be argued Poe portrayed himself as the knight (Coad 60). Poe published his poem in 1849, the same year as his death. Like the knight, Poe had sought after an finish life, which he failed to do during his life. He was also unstable in the last years of his life. However, the knight most probably was a reference to the many prospectors of the California Gold Rush, which took place during the time the poem was written. The poem may have been Poes warning to the many prospectors that would experience the same hardships of the knight.Poes repetition of shad ow and Eldorado and use of other symbols play an important part in his poem. It helps to further stress his main point. Other such devices Poe uses to communicate to his reference is through auditory and imagery senses. Poe uses aabccb rhyme scheme in the first three stanzas and xxabba rhyme scheme in the fourth stanza of his poem . Poes creatively written stressed and unstressed poem is one way Poe unmistakably appeals to the readers auditory and imagery senses. The use of this rhyme scheme creates a ramity, thump sound when read aloud, bringing the clattering of the horses trot to life. The symbols and rhyme scheme helps to accept the reader into the scene of the poem and drives them to continue reading until the end.Eldorado is a poem by Edgar Allan Poe that has a stressed message to readers. It tells the story of a knight who traveled for a period of his life searching for a city of gold, Eldorado. It provides a message to all readers that true riches and happiness are only acquired through Heaven after death. If one attempts to search for wealth, in hopes happiness will follow, that person will come to the end of their life saddened and in despair. Poes use of symbols, rhyme scheme, and repetition brings life to his poem, which keeps the readers diverted and helps to convey his message. The poem brings light to the life of everyone and anyone searching for happiness and wealth on earth. Thus, Eldorado is Over the Mountains Of the Moon, Down the Valley of the Shadow, Ride, boldly travel . . . If you seek for Eldorado (19-24).

Saturday, March 30, 2019

Forensic Analysis of Personal Data Leakage on Android Phone

rhetorical Analysis of Personal Data Leakage on Android Ph wholenessSheriff DrammehRESEARCH STATEMENT The proposed investigate forget look individual(prenominal) information spring on the mechanical man unst fitted screening chopine by means of rhetorical analytic thinking of volatile and non-volatile remembrance.PROPOSAL thickset The proposed investigate lead employ some(prenominal) volatile recollection rhetorical techniques and traditional magnetic disc forensic techniques to the humanoid political platform in run to identify privacy breaches primarily in android sprightly practises 1. The proposed inquiry in like manner aims to demonstrate that forensic artifacts understructure be plunge two in the phonograph recording toil (non-volatile) and retention (volatile).AIMS AND OBJECTIVES OF THE PROPOSED RESEARCH 1. Acquire non-volatile entropy from an android blind utilise the traditional forensic approach and the repositing dump, analyse the ho ldd information for any forensic artifacts and suck a relative abbreviation of twain approaches. This will be bring home the bacon by conducting an selective information- base simulation of both approaches.2. Develop an effective mannerology to improve the spying of personal information leakages and highly in the buff information from android roving practical diligences.RESOURCES The major(ip) part of this proposed research will be conducting an experiment, hence few equipments argon essential to be in place in order to drool f e very verboten the experiment. The proposed research is mainly retrospection fling and disk case imagination for forensic epitome. Some open kickoff instruments will be highly utilize during the course of this proposed research, such(prenominal) as android studio SDK, Odin, ADB and mem. Additionally, books on android forensics, mobile forensics, journals and YouTube video tutorials will also be utilize. As the research progresses mor e resources might be needed. The pursuance is a non-exhaustive list of resources currently available for use- Window 10 OS with butt onor Intel (R) Core(TM)i7, lay in depot of 16.0GB is the host operating corpse and forensic becomestation for disk image analysis- Linux Ubuntu 15.10 x32 with kernel v2.6 is our forensic workstation for retrospection analysis- VMw ar Virtual Machine v11.1.2 Will be apply to lay lymph node operating system- Physical android echo Samsung galaxy S3 Is the beat of the experiment- Android SDK developer beam of light for Linux x32 Is a softw are development spear used for application development and analysis.- mem is an open source tool for dumping rivulet process on android phone- Odin3.-v3.10 is open source tool that enable us to rooted android phone- Samsung usb drive for mobile phone used to enable debugging bridge between android phone and forensic workstation- CF-Auto-Root-2d buns-2dvl-sghi747m is used to up interlocking firmware during rooting process. AccessData Forensic tool kit version 3.4.2 ( Download FTK Imager 3.4.2) is forensic parcel tool used to analysis disk image file3 P a g eCONNECTION TO THE COURSES OF MISSM PROGRAM This proposed research is about related to Digital forensic course (ISSM536), which is one of the course we had cover in our Information Systems and Security Management design. The proposed research used the techniques wise(p) from this class and applied them in the android environment to reveal several(prenominal) types of personal information such as drug exploitername, password, ascertain of birth, postal addresses contact, photos, floor depend, substances etc. The comparative analysis method used covers the principles of digital secern collection learned in Information Technology Security Laws and ethics course (ISSM561). The proposed research has a beginning and ending, as a end point it need to be managed in order to deliver the end event. Therefore, the friendship l earned from (ISSM545) System Development and Project Management.REVIEW OF RELATED RESEARCHS Fuchs, et al., 2 presented the commencement ceremony analysis tool for android called SCanDroid, a framework for Android to perpetrate information flow analysis on applications in order to get a line the flow of information from one component to an opposite component. Consider a case where an application request leave to access multiple information stores i.e., usual selective information store and private information store. The application requires permission for reading the info from the private store and writing information to the public store. SCanDriod analyzes the information flow of the application and reports whether the application will transfer the information in the private store to the public store or not. However, SCanDroid also suffers from the same limitation of security policy expressibility. In order to handle some information flow to be dangerous, the policy writer s must fructify certain constraints prior to executing the policy. Similarly, if an information flow is not explicitly added to the set of constraints the framework will consider it to be safe.In 2012, C. Gibler, et al., presented AndroidLeaks, a dormant analysis framework for automatically finding potential leaks of sensitive information in Android applications on a massive scale4. It communicate the drug drug substance abuser if applications are leaking their personal information. AndroidLeaks drastically reduces the number of applications and the number of traces that a security auditor has to verify manually. To secure privacy information, they set up a mappings between Android API methods and the required permissions as the sources and sinks of private entropy for selective information flow analysis. However, AndroidLeaks does not yet analyze Android-specific control and entropy flows. This includes Intents, which are used for communication between Android and applicatio n components, and means providers, which provide access to database-like structures managed by other components.Sasa Mrdovic et al., 3 proposed a combination of static and live analysis for memory image, which is captureed by hibernation mode (power management shoot a line that exists in most portable computers). After they obtained the somatic memory image, they used it to boot the investigated system in the virtual machine (live view) to resume the system to the same state before it went into hibernation mode. Their proposal of using hibernating feature was to obtain the memory contents without violating the evidence integrity, but during their analysis they found out that they lost all the information about meshing connections because hibernation mode terminates the network connections before it starts in Windows environment.As one of best well-known analysis approaches, Taint Droid detects privacy leaks using dynamic demoralise tracking 5. Enck et al. make a modified And roid operating system to add taint tracking information to data from privacy-sensitive sources. They track private data as it propagates done applications during execution. If private data is leaked from the phone, the taint tracker records the event in a log which can be audited by the user. In 2015,Young ho Kim et al., proposed a methodology and an architecture for measuring user awareness of sensitive data leakage, which features runtime application analysis over timing distance between the user input event and substantial privacy data leak6. 4 P a g eNai-Wei Lo, Kuo-Hui Yeh, and Chuan-Yen Fan present a user privacy analysis framework called LRPdroid7. LRPdroid has been proposed for an Android platform to offer a user privacy management model. In the LRPdroid framework, they defined required models to achieve user privacy management App execution data flow, user perception, leakage awareness, information leakage detection, privacy disclosure evaluation, and privacy risk assess ment. To give the proposed privacy analysis model, two information capture modules for LRPdroid were designed to acquire incoming data inputted by a mobile user and outgo data transmitted from a targeted App. A system prototype based on the LRPdroid framework was developed to evaluate the feasibility and practicability of LRPdroid. both general App usage scenarios were adopted during the usage of Line App to evaluate the military strength of LRPdroid on user privacy disclosure by social plan attack, user information leakage from normal operations of a runway App, and privacy risk assessment of targeted outpouring App.In 201510, Pasquale Stirparo, Igor Nai Fovino, and Ioannis Kounelis developed a novel methodology called MobiLeak, for analysis of security and privacy level of mobile applications, which focuses more on user data instead of application law and its architecture. Their research work addressed and solved the problems related to the following terzetto research qu estions for mobile environment and applications (1)what are data and where can such data exist? (2) How is personal data handled? (3)How can one right on assess the security and privacy of mobile applications? They start their research work with a fundamental prerequisite in order to be able to mightily treat them, which is studying and identifying every possibility state at which data can exist. After this step, they analyzed how real life mobile applications and operating systems handle users personal data for each of the states previously identified. base on these steps they developed MobiLeak, which also combined concepts and principles from the digital forensics discipline. description OF PROPOSED RESEARCH THE FOCUS OF THE RESEARCH The aim of this proposed research is to examine user data storage mechanism on a mobile application in a context of android platform. Analyzing mobile application for personal data leakage require extensive analysis and in-depth understanding of b oth the OS and application architecture. The analysis is expected to be conduct to data at rest and data in motion. The result of this proposed research will help to create awareness to both application developers and the android connection that users personal data information such as username, password and other sensitive information are at risk both in volatile and non-volatile memory.Finding user sensitive data on android smart phone could be in three (3) billets disk drive, memory and app server. Our research is limited to two out of the three application data store which is disk drive and memory, both storage areas could prove strategical locations for finding vital information for android smart phone users. The motor of this research is to examine whether applications encrypt user sensitive information both in the memory and the disk drive. This pose the following questions1. Does user enfranchisement are encrypted on a memory ?2. Among the two method which one is more fo rensically sound?3. What information could be found in disk drive and not in memory?During the experimental word form of the proposed research certain applications will be examining, such as VOIP applications, social media applications, pecuniary applications and telecom applications. I chose this samples of android application from various categories. Because these applications are middling popular and are used by megs of people around the globe. For each application I will look at how user sensitive data, such as user name, password, date of birth and account number are store both in the disk drive and the memory. 5 P a g eThe rest of the proposed research arm is divided into 4 parts First I am passing play talk about my methodology, next I will present the serial publication of preliminary result both in the memory analysis and disk analysis, third I give the highlight of the expected result and finally, I will treat about certain obstacles that may arise.METHODOLOGY The method used in carrying out the experiment of the proposed research consist of quadruplet phases.Phase One Gather the require tool both in term of hardware and software As the proposed research required memory dump and disk drive imaging analysis a physical android phone is needed to conduct our experiment.1. Window Host OS and Ubuntu Guest OS as our forensic workstation2. Android phone Samsung wandflower S33. Installing Odin3.-v3 which will allow us to root our android phone4. Install android SDK tool for using ADB(Android Debug Bridge) to get scale of measurement access on our android Phone5. Mem application software oppressed into our android phone through ADB which allow us to dump the running process from the PhonePhase Two Installation and configuration of experimental environment At this phase all the required tools, such as the hardware and software are installed and configured.Pre-experiment of memory dump and disk imaging is performed, and tools are verified.Phase Thr ee Acquisition of disk image and memory dump At this phase the disk image drive is acquired using dd didactics tool from the intimate memory to internal SDcard of the phone and ADB clear is utilize to pull/copy the disk divides to our forensic work station. Mem program software is utilize, this allow us to dump the running process. We used ADB to install mem application into our phone in order to dump the desired running application process.Phase Four Preservation and analysis of acquired data The utilisation of this phase is to examine acquired application data both in the memory and disk drive. For example, we will check if the application is encrypting users credential both data at rest and data in transit?MEMORY dispose abbreviation This section provide detail steps taken to analysis the dumped memory of certain applications selected for this proposed research. The result shows that users credential are not properly handle by the application, which can result in personal data leakage. A program called mem was used to facilities the process dump, ABD was also used to install mem program into our android phone. List the running process and dump them into the internal SDcard and finally pull it to our forensic workstation for further analysis. Strings and sqlite3 command were use to look for ASCII text format from the dumped memory to understand the output result. provokeingly, the result showed that users credential are not encrypted at all.The applications analyse in this proposed research are as followsA) Africallshop App Africallshop is a VOIP application which allows customers to buy credit online to make national and international calls and confide text message worldwide to friends and family at a cheap rate. The application is 6 P a g erated about 4.4 in the android play store and was downloaded by five thousand (5000) customers during the time of this proposed research. The prominent outcome of this application are as followThe username, pa ssword, caller id and user account balance are not encrypted.We ran the sqlite3 and tie command on the dumped memory, which produce the result at a lower placesip.africallshop.comXXXXXXX0017802986780CANADA12590xxxxxxxxxyesCADproxy.africallshop.com443574b690276bc5emailprotected0,434B) EHarmony App EHarmony is an online dating site for singles. Those using this app can communicate freely, look at picture, video and text. During the time of this proposed research the application was downloaded by five million people and rated 3.1 in the app store. The prominent outcome of this application analysis are as follow The user credential, such as username, password and device information are all in plaintext. The result below trademark /singles/servlet/login/mobile HTTP/1.1j_username=sdramme1%40student.concordia.ab.caj_password=123qazplatform=androidj0r1D7fg4ArJ2uSVPgSti5zcEnltO919mHUV88E%2FKUWcan9NEMgT820MygiKsWf0Sg1147vdZbXIotLS HTTP/1.1substance abuser-Agent eHarmony-Android/3.1 (SGH-I 747M Android OS 4.4.2 en_CA id f9d8a2acfec7b901)X-eharmony-device-id f9d8a2acfec7b901X-eharmony-device-os AndroidX-eharmony-device-os-version 19X-eharmony-device-type 1X-eharmony-client eHarmonyX-eharmony-client-version 3.1Accept application/jsonlBxpc_tej_username=sdramme1%40student.concordia.ab.caj_password=123qazplatform=android8KTBstevedocwra on 7 P a g eC) Virgin Mobile My account App Virgin mobile is GSM mobile application that allow user to manage their account features and usage. Users can make retribution and add a buddy to their list. This application was downloaded by five hundred thousand (500,000) people during the time of this proposed research and was rated 3.4 in the app store. The prominent outcome of this application are as followSim episode number, cell phone number, UMTS number, activation date, user data of birth, subscribe date, user e-mail address, initial password, pin unlock code and account number. all this information are not encrypted.emailprotected/and roid-sdk-linux/platform-tools$ strings virginmobile grep emailprotectedWe run the ps and string command on the dumped memory, which produced the result belowimeioriginal worth little,simsequenceNumber174392323,esnequipmentTypenull,imeiequipmentType abide byLTEDevice,codeT,simequipmentType mensurateUSimVal,codeU,telephoneNumber7802356780,networkTypevalueUMTS,code85,languagevalueEN,codeE,isBillSixtyfalse,isTabfalse,commitmentStartDatenull,commitmentEndDatenull,commitmentTerm0,contractTypevalueOFF_COMMITMENT,codeO,paccPinStatusvalueNOT_ENROLLED,code78,padPinStatusvalueNOT_ENROLLED,code78,initialActivationDate1463112000000,accountCommPrefvalueBILL_INSERTS,code66,isAccountSMSPermtrue,birthDate512197200000,lastUpdateDate1464062400000,lastUpdateStamp9863,lastHardwareUpgradeDatenull,daysSinceLastHWUpgradenull,subscriberEstablishDate1463112000000,daysSinceActivation16,nextTopupDate1465704000000,cancelledSubStatusDate1463371200000,initialPassword5069,isCallDisplayAllowedfalse,pricePlanVHV226 ,portInidicatornull,primeMateInidicatorvalueUNKNOWN,codeR,primeSubNumbernull,subMarketvalueUAC,codeUAC,telcoIdMOBL,pinUnlockKey36761817,63094923,manitobaIndicatorO,thunderBayIndicatorO,portabilityIndicatorO,serviceAreaN,hasOrderInProgressfalse,isWCoCSubscribertrue,hasDomesticDataServicesfalse,hasRoamingDataServicesfalse,domesticDSBlockedUntilnull,roamingDSBlockedUntilnull,isAccessiblefalse,promotionGroupCodenull,emailAddressemailprotected,wcoCDate1463112000000,emailAddressemailprotected,arbalancenamehttp//bside.int.bell.ca/customer/profile/typesARBalance,declaredTypejava.lang.Double,scopeca.bell._int.bside.customer.profile.types.MobilityAccountType,value0,nilfalse,globalScopefalse,typeSubstitutedfalse,ebillInfoisEBillEnrolledtrue,isEBillNotifyEnabledtrue,ebillStartDate1463112000000,ebillEndDatenull,siownervalueBELL_MOBILITY,codeMOBL,arpua get along19.13,wirelineAccountsnull,internetAccountsnull,tvaccountsnull,activeHouseholdOrdersnull,emailAddressemailprotected,username7802986780,gu idSCP9O0ELLDDUN2J,profileTypeBUP,savedTimeStamp2016-05-29T013038.458-0400,profilebanNumbersaccountTypeLegacy,ban527566075,profileSaveTime1463945744000,accountType,paymentDatapaymentInfoListbillAvailabletrue,lastPaymentAmount40.18,totalAmountDue40.18,lastPaymentDate2016-05-22T000000.000-0400,paymentDueDate2016-06-06T000000.000-0400,billEnddate2016-05-14T000000.000-0400,balanceForward0,bankAccountNumbernull,creditCardNumnull,customerIdnull,ban527566075,mdn52756607UAV580,eligibilityIndYDISK IMAGING ANALYSIS This section provided detail steps taken to conduct traditional forensic technique for non-volatile memory acquisition and analysis. During this phase the acquired memory will be examine and the primary concern will be user data stored, in particular share_pref brochure. Share_pref folder is a storage location for key-value in side application database. Android application store user data within /dev/ occlusive8. With the use of common forensic command, such as dd, will be utilize to image disk drive partition. For this proposed research the following partitions are imaged for analysisSystem fileCache file 8 P a g eUser data endureBut our proposed research experiment will be focus on user data folder, as it is consider to be the storage location for application data. To image disk drive, shell access is need through android SDK, we then look for mount file on the disk drive before executing dd commands to copy the partition from the internal memory to internal SDcard and finally pulling it to our forensic work station using adb pull command.1. Checking the mounted file on the disk drivemount/dev/block/platform/msm_sdcc.1/by-name/userdata/dev/block/platform/msm_sdcc.1/by-name/cache/dev/block/platform/msm_sdcc.1/by-name/system/dev/block/platform/msm_sdcc.1/by-name/ hold2. Copying the user date partition and pull it to forensic work stationdd if=/dev/block/platform/msm_sdcc.1/by-name/userdata of=/mnt/sdcard/test117399538+0 records in17399537+0 records out890856 2944 bytes transferred in 1934.464 secs (4605184 bytes/sec)adb pull /mnt/sdcard/test13. visualise the cache partition to internal SDcarddd if=/dev/block/platform/msm_sdcc.1/by-name/cache of=/mnt/sdcard/cachefile1.img 1720320+0 records in1720320+0 records out880803840 bytes transferred in 118.669 secs (7422358 bytes/sec)4. Copying the system partitiondd if=/dev/block/platform/msm_sdcc.1/by-name/system of=/mnt/sdcard/systemfile.img3072000+0 records in3072000+0 records out1572864000 bytes transferred in 255.874 secs (6147025 bytes/sec)emailprotected/ 5. Copying the persist partitiondd if=/dev/block/platform/msm_sdcc.1/by-name/persist of=/mnt/sdcard/persist.img16384+0 records in16384+0 records out8388608 bytes transferred in 0.865 secs (9697812 bytes/sec)The above command will image each partition of the mounted file of dev/block with the default block size of 512 byte during bit-by-bit copy of the file and localise the output file to internal SDcard. Finally, copy it to our forensic workstation, Which can be analysis using forensic tool called AccessData FTK imager version 3.4.2. FTK is recommended forensic tool for disk image analysis by both forensic and efficacious community for its powerful carving capability, stability and ease of use.AccessData FTK ANALYSIS 1. PayPal App PayPal is an online payment system that allows its member to transfer funds locally and globally. Members can receive, send money and buy or pay for goods and services online. The application was downloaded by 10 million people at the time of this research and rated as a good app in the app store. We added evidence item to 9 P a g eFTK navigate to data and com.paypal.android.p2pmobile then share_pref folder. The folder share_pref/PresentationAccount.RememberedUsersta../ reveal user data information such as user first and last name, cell phone number, and email address.2. AfricallShop App Africallshop is a VOIP application that allow the users to make cheap international call worldwide, user can purchase credit online to communicate with peer by text message and voice call. After adding user data partition to FTK imager, navigate to com.v2.africallshop folder, embroider the folder view share_pref folder. In sher_pref folder an xml file called com.v2.africallshop-prefrences.xml was view and kibosh user sensitive data such as app domain name, caller ID, country, ID, user password, username and account balance all in plain text. 10 P a g e3. Keku App Keku is a VOIP application which despatch call or text through Wi-Fi or mobile data. User buy credit online to make local and internationally calls. The package of the application contain probative information about the user. App database store was reveal through FTK analysis and the share_pref folder contain sensitive information about the user. In share_pref folder a file called Org.keku_preferences.xml, this file contain users sensitive data and device information such as, password, username, device-mac address and user phone number. 11 P a g eEXPECTED RESULTS During the experimental phase of the proposed research, aim and objective of the experiment is to demonstrate or show that users forcefulness data information are at risk during application data process in transit and at rest. The research has observe the dumped process and disk drive imaged to reveal personal data leakage and has successfully uncover vital information about App users, such as username, password, date of birth etc. OBSTACLE The obstacles encountered during the experimental phase of the proposed research as follow1) lack of enough material regarding android forensic as the field is immature2) Unable to image the whole memory of the actual phone, as the system configuration file is missing and couldnt be found to compile it with LiMe in order to acquire the whole memory.3) Lack of enough analysis tool to cross examine or evaluate both the dumped and disk drive memory, Ubuntu Linux tool was used to do our analysis. divi sion TO KNOWLEDGE The proposed research show that application developers are far less careful with user sensitive data when it being stored both in the disk drive and memory in running applications. Using very simple forensic investigation techniques running strings and sqlite3 on dumped memory and disk drive imaging analysis on FTK show sort of a lot of private information.OUTLINE OF FINAL RESEARCH idea ISSM 580/581 The final research document will be structure as follows 9 segment 1, will be the abstract then the Introduction to the paper. fraction 2, will discuss memory analysis technique. Section 3, will discuss disk imaging analysis 12 P a g etechnique. Section 4, will discusses the forensic artifacts unveil during the analysis . Section 5, related work. Section 6, the result summary. Section 7 conclusion and early work..RESEARCH DELIVERABLES This research will be conduct in hang up Semester 2016, from September 2016 to December 2016. Nevertheless, some major preliminary steps realize already being taken. Most of the required tools both hardware and software for the proposed research have already being obtained and implemented. Spring 2016 April Researching the Topic of come toWeek 1 2 Finalize the Topic with Primary consultantWeek 3 4 Read the Area/Topic of InterestMay Week 1 2 Read relevant diary or Article related to the topic of interestWeek 3 4 Gathering and installation of test Environment, Conducting and investigate.June Week 1 piece of music First Draft proposal and submitWeek 2 -3 cut back and Improve proposal based on advisor guidance, Further Experiment and literature review read.Week 4 Final Proposal and Submit.

Research Paper On The Shinto Religion

Reoceanrch Paper On The Shinto ReligionOn e very continent of the world, there argon classifys of heap who everywhere centuries have passed on traditions that have been in their families, communities and cultures that define their elbow room of vitality. The most influential tradition of them all is the religious belief that the group take to heart. One such devotion is known as Shinto. The religion is concept to have been introduced between 500 to 2000 BCE on the continent of Asia, and is near tied to disposition, and recognizes the existence of motley Kami, genius deities. So we will be looking at the foundations of this religion, how it was formed, and how it is viewed by those who follow its teachings, what is the structure of the religion compargond to different religions, and what types of visions the followers seek from the religion.Shinto, as a religion, does non have a defined founder, as the major religions of the world, such as Judaism, Christianity, Hinduis m and Islam. These religions have docuwork forcet sustains written specifically for the followers, so that they back read and absorb the message, so that they can fell apart of the religious belief. So where did this religion stick with from. Historians have studied the origins of Shinto and have sleep with to the conclusion that Shinto, evolved some years ago as an native religion from Japan, and is still macrocosm practiced by more(prenominal) Nippvirtuosose communities today, and it is unique in its affixation to nature, and as such, constitutes the basis of Japanese culture. (John Breen, 2000) Until the relatively recent realityation of a series of seminal articles by the historian Kuroda Toshio, the Shinto physical compositions construction of the Shinto past went unchallenged by specialists writing in Japanese, English and some other Western spoken languages.To this day, that construction remains largely unquesti mavend in non-specialist literature. at that lie u is some value, therefore, in a brief rehearsal of both the establishment position and Kurodas incisive critique of it. (John Breen, 2000). According to scholars, Shento is thought to be a religion that has been around for many years. The religion is different from others, because it is not a system of beliefs. In the book Mans Religion by John Noss, he states that It is basically a reverent loyalty to familiar ways of life and familiar empowersit is true to say that for the masses in Japan relish of country, as in other lands, is a matter of the heart first, and of the self-opinionated substance second. (Noss, 1969). The religion is said to not be weighted fell with canons of tabu literature, and no explicit code of ethical requirements. The meanings of many of its lush rituals are unknown by many who practice them. Historically, individual clans simply worshiped a particular deity as their ownancestors. Which included hidden spirits and vivid powers, but such worship was topical anaestheticized until the one-eighth century CE, when the term Shinto came into use to distinguish indigenous Japanese ways from Buddhism and other imported religions. Shinto is different in, its connection to the natural belief, and, is the bases of the Japanese culture. The religions label Shinto was formed from the words shin (divine being, which can be read as kami) and do (way). (Fisher, 2008) Clark B. Offner defines Shinto as the traditionalistic religious practices which originated in Japan and developed mainly among the Japanese battalion along with the underlying life attitudes and ideology which support such practices. (Offner, 1976) one of the differences of this religion is that it has a free style of belief, and is not so move to predispositions as other religions are, they believe the unearthly, kamis are present and take various forms. In Shintakus book The Way of the Kami, he believes that the belief is in the spiritual world and knowledge that the ear th is inhabited by both human beings and kami alike. (Shintaku, 2011) In the religion, sin is considered original, but a condition of individual(prenominal) good development and a connection with the Kamis . According to historians, the oldest recorded usage of Shin-do is in the Nihon-shoki dating to the Emperor Yomei between 552-587, who is said to have believed in the rectitude of Buddhism and revered the way of the kami. The word kami is frequently translated to god with a lowly g. This is usually taken as grounds for claiming that the religious culture of the Japanese is polytheistic.The above whitethorn be confusing to those who know the Japanese language, because the language has no distinction between singular and plural and although there may be many kami, they all share the same character.Kami thus refers to the impression of many phenomena that the Japanese believed were endowed with an aura of divinity. (Picken, 1994) Shintoism is filled with an inestimable measur ing stick of kami inherited spirits of the passel of Japan. nigh worshipers have the belief that the deceased become kamis after passing. Shintaku notes in the way of the Kami they live on in the afterlife as special kami. Respect for family has high priority of the people of Japanese culture with roots deep within Shintoism. (Shintaku, 2011)One often told story, is about the sun goddess Amaterasu-o-mi-kami ( glorious goddess who shines in the heavens). The story taken from Shintakus book talks about how the goddess was lured out of hiding by festive sounds, medicine and dancing. She was hiding because of her disapproval of her siblings actions, and out of the store came symbols that are special to Shinto believers. 1. A mirror (to reflect your true nature and the symbol of Amaterasu -o-mi-Kami). 2. A sword (symbol of power and Susano-o-no-Mikoto) 3. A jewel to represent ones influence everyplace others. (Shintaku, 2011)The place for those who worship the religion of Shinto occ urs at any of the many shrines that cover Japan. Even though many people have constructed personal alters around their homes, the main place to worship is at a local shrine. Because Shinto has numerous deities, it is hard to worship all of them. Because of this, many are not worshipped consistently other than the sun goddess. Outside of Tokyo, there is a grand imperial shrine that is dedicated only to Amaterasu. This side is the most sacred in all of Japan for worshipers of Shinto. It is said that this place of worship pre dates Christ. Shinto followers make a pilgrimage to the sacred worship site and pray in the outer court of the facility, one rule when coming to this site to worship, is that non priests and public servants must pray in the outer area because the internal facility is available only to the priests and public servants for worship. The following Shinto prayer faith in effect(p)y recited during their visit that shows the intertwined spirit and nature that the religio n encompasses as presented in Stewarts book the Handbook of Todays ReligionsI go for in the great presence of the From-Heaven-shinning-great-deity who sits in Ise. Because the Sovereign great goddess bestows on him the countries of the four quarters over which her glance extends, As farthest as the limit where Heaven stands up like a wall, As far as the limit where the blue clouds lie away fallen- The blue sea plain as far as the limit whither come the prows of the ships without drying poles or paddles, The ships which continuously crowd on the great sea plain, And the roads which men travel by land, as far as the limit whither come the horses hoofs, with the baggage-cords tied tightly, treading the uneven rocks and tree-roots and standing up continuously in a long path without a break- Making the narrow countries wide and the rough countries plain, And as it were drawing together the distant countries by throwing many tens of ropes over them, He will pile up the first-fruits lik e a drop of hills in the great presence of the Sovereign great goddess, and will peacefully enjoy the remainder. (Stewart, 1983)As shown in the prayer, nature and spirit has a very close relationship to the mindset of those who are worshippers. And because the livelihood of the people comes from the natural essence of their surroundings and everything natural, their economy, is an extension of their belief, so it too has a place in the religion as well. As it is said, that the religion is concerned not only with the sacred but also with the secular, all activities necessary for the performance of nourishment, clothing and shelter, and the development of culture and giving happiness to the world, has a condition connection with the kami. (Ono, 1962)In order to ask for blessings and enlightenment, worshippers engage in festivals, rites, ceremonies. Some celebrations such as the New Year, a childs birth, puberty, farming, marriages, and ceremonies for new construction are some of t he main ones. At the local shrines, regular festivals are held to have a go at it special dates that relates to the worship site and its deities, along with a plethora of blessings ranging from a good harvest, fertility, health, and success of a business. Many shrines use the planetary calendar for traditional ceremonies. Some events on are, the new moon, the first half-moon of the year, the full moon, and the half-moon of the last tether months of the year are said to be a sacred period that are known as Hare-no-hi. ke-no-hi are said to refer to the remaining days of a month. Stewarts breaks out the Festivals into three main parts. 1. Kami Mukae, Welcoming the kami. A special welcoming ceremony to demand deities to earth. 2. Shinko The main event, typically with the local community parading in the streets or shrines with palanquin, in which the kami are enshrined. 3. Kami Okuni, meaning s determination the kami back to their heavenly abodes. Not ending with this ritual, is thou ght to invite disaster. (Stewart, 1983)Even though the religion of Shinto does not have a formal document to follow, it does have traditions, rituals, temples, and deity(s) as the more known religions. Peace harmony to all life form and nature are the takeaways from this information. The peaceful admiration of nature and all natural things is thought to bring a spiritual feeling of purpose to all, and to give thank for being apart of what was created by the gods should be worshiped and protected.

Friday, March 29, 2019

Problems With Profit Maximization Strategy Finance Essay

Problems With Profit maximization Strategy Finance Essay strivingholder Value is a monetary bourn which is the final measure to perk up whether the comp whatever is successful in enriching its plow divvy upproprietors or not. We stir tried to puzzle the difference between sh arholder and the avoucher richesiness and have reason out that declinationholder wealth is the supreme point of contention for whatever physical composition as in the retentive term it exit benefit some(prenominal) owner and sh areowner. Hence, both(prenominal) of them will be content. We first look at why stockholder note value maximization should be the primary final stage of any organization. Then, we look why at that place is dispute of the organization with the target of stockholder wealth maximization. Then, we looked at various agency problems that come repayable to this divergence. Then, we gave strategies on how managers poop affix shareholder wealth. At the destroy, we con cluded with the radical fantasy of s expungeholder wealth maximization and explained its utility.Who owns any organization which is listed in share market, obviously, the shareowners. These are those individuals who have bought stocks of the company which shows their ownership of the company. Even if business is a person satisfying, he is the shareholder. If the Business is uncollectible, the board of directors are make up of people who own the right by owning the majority of shares. Since, the shareholder own the company, they are entitled to maximum value generation from the m aney they have set uped (Ahlstrom 2010, pp 11-24).In old times, the traditional approach of companies was to increase the owners clams, scarcely there were multiple limitations worry-Any trusty has multiple targets opposite than increase shareholder wealth. These screw be manage achieving higher market share, great sales growth, more stable market position. The traditional approach didnt tu rn exclusively of these issues. shareowner wealth maximisation has multiple things to be looked into like Short term, Medium term and Long term stockholder wealthiness maximisationstockholder wealthiness Maximization everyplace a stopover of time.The traditional approach lost out to these points.Social Responsibility demand to become the most important aim of any organization. Big Organizations essential to give back society in perspective of the resources that they take from them. These big organizations need to devote something out of the do goods that they earn. The traditional approach didnt take in account this (Smith 2003, pp 52-76).Modern approach puts more emphasis on Shareholder riches Maximization sort of than owner profit maximization. This includes change magnitude the Earnings per share of all shareholder so that their net cost is maximised. Wealth increase is equal to what gross present worth in needed for raising profits in the future. This value take to be discounted as per the time frame to found out the annualized rate of fall out for the shareholder. In Shareholder Wealth Maximization, it places priority onward any other objective for the organization. Any action which has positive effective on Shareholder Wealth Maximization needs to be given over priority.In any capitalistic society, the ending of business should be Shareholder Wealth Maximization as mostly the ownership of goods and services is by individuals, since, they own all the means so that they mickle make money. Shareholder Wealth Maximization at the end leads to rise in value of the shares which at end maximizes wealth of the shareholder (Ahlstrom 2010, pp 11-24). .Maximizing Shareholder Wealth as the first GoalAny financial decision to become effective needs better understanding of organizational goals. Shareholder Wealth Maximization should deport the decision make of the firm which needs to be represented in the common stock price. Profit maximization shouldnt overshadow Shareholder Wealth Maximization as many a times decisions taken to maximize profits of the owner has a short term view and in the spacious term erodes the value of shareholder wealth. Warren Buffet, who has been the advocate of Shareholder wealth, says that long term economic goal of any organization should be increase the average annual gain of the intrinsic business value in their firm for their shareholders. Economic progress isnt shown by size of firm but by per share progress (Smith 2003, pp 52-76).Shareholder Wealth Maximization goal should be nigh wariness of firm seeking to increase the present value of their future of their shareholder but not increasing the profits of promoters. This return to shareholder needs to be given in the form of stop consonantic dividends as well as if any shareholder decided to sell of the stock. As long as the dividend stream or the value stream is flowing, it increases the value of shareholder. Also, the higher the jeo pardy for future wealth growth, it strike down the faith of shareholders on the company. Stock prices evermore show what is the clock and risk associated with the future benefits which hind end be reaped by the shareholders. Shareholder wealth is delimitate as per the total number of shares times the value of per share at which it trades in the stock exchange the company is listed (Van Beurden Gossling 2008, pp 407-424).The advantages of using Shareholder Wealth Maximization as an objective are-This considers the time period as well as the risk in investing in the firm. Managers must take in account this while making decisions like expenditure so that in contributed to increase shareholder wealth.Shareholder Wealth Maximization can be tested with every decision which is do by organization so that consistency in decisions can be maintained. If the decision increase shareholder wealth it is a good decision, other it isnt, hence it shouldnt be taken.Shareholder Wealth Maximizati on is impersonal by nature. Shareholder is free to take their funds out and sell the shares and invest anywhere. If the shareholders risk preference isnt according to the decisions make by the firm, the shareholder will sell the sticks owned by him and invest in the organization which has scoop profile as per his investment needs (Bejou 2011, pp 1-6).For all of these reasons, Shareholder Wealth Maximization should be the primary goal to be achieved by any firm. But, the issues like social responsibilities managerial objectives, agency problems can create loss from pure Shareholder Wealth Maximization behavior shown by managers as well as promoters and more considerate in profit maximization. Nonetheless, Shareholder Wealth Maximization objective gives a standard on which every managerial decision can be judged and screened on (Ahlstrom 2010, pp 11-24). .Divergent ObjectivesThe goal of shareholder wealth maximization is about how financial decisions should be made in an organizatio n. But, not all management decisions need to be made by this. Using the index of managerial setance, we can measure the managerial success in achieving the shareholder wealth maximization objective. They should try and feed to maximize Economic Value addition which is the difference between profit after tax and the cost of capital employed to generate that profit. double corporations like Coca Cola, AT T, and General Electric use this ideal of Economic Value added (Husted de Jesus Salazar 2006, pp 76-91).It has been seen that all those firms which dont give attention to stockholder sakes and are more indulged in promoter profit maximization perform poorly in long term. There is always a divergence in shareholder wealth maximization goal and the other objectives which are undertaken by management. The main reason for this divergence is shareholders are real owner but rule is with promoters in all corporations. This separation of ownership and control allows manager to pursue s elf-promoting goals which are not in line with shareholder wealth maximization. They are consistent to maintain the control of the company. Instead of pursue the goal of shareholder wealth maximization, managers just work for satisfying or look for acceptable levels of shareholder wealth increase, while working for their interest improvement (Shaw 2009, pp 565-576).The maximization of personal welfare of managers can lead to long run job security of themselves. The focus on long term survival of managers limits the risk taken by firm as discriminatory outcomes can lead to disastrous outcomes for the firm. Similarly, the need for job security is one reason why management doesnt allow any merger offers given by other companies. The Golden Parachute approach is usually in the interests of managers more than the shareholders wealth. Now days, multiple companies give top management stock options which ensures their ownership in the company. Pan-American gives retirement option in commo n stocks which ensures that they hypothesise on the options to increase the share price. This helps in alignment of interests of managers with those of shareholders (Bejou 2011, pp 1-6).Agency ProblemsThe battlefront of diametrical objectives of owners and managers is one kind of agency relationship problem. Agency relationships materialise when one individual hires other individual so that he can perform duties on behalf of his. They delegate the decision making to the agent. These kinds of agency relationships hold out between stockholders and managers and those of stockholders and creditors. When we talk about agency relationship between stockholders and managers, the inefficiency rises as each party works in a way to maximize its interests and utility. The management thinking for looking for long term survival rather than thinking about shareholder wealth maximization. other(a) example is about using company airplanes, limousines and offices without having any ownership in the firm. This shirking by managers is an issue. Enron Corp lost $1 billion of investments in 2001. In 1991, Enron permitted their chief financial officer to purchase assets and minimize the risk of Enron. The CFO made million personally. This dispute of interests made way for Enron filing for bankruptcy in Chapter 11 (Smith 2003, pp 52-76).In Enron Case, the agency issue was poorly handled which led to shareholders feel the brunt of this mismatch. Agency cost include1) Expenditures made for minimizing the incentives for management which management took for removing decisions in contrast of shareholder interest, Such as giving management compensation in from of stock option of the firm.2) Expenditure to oversee management action like audits both external and internal.3) Protection of organization from managerial dishonesty.4) Opportunity cost of lost chances collectible to complex structure of organization (Husted de Jesus Salazar 2006, pp 76-91).Managerial motif act in the stoc kholder interest when they have stock in form of compensation, the threat of losing their job and threat of being taken over by any other organization. Agency problems and related cost can be decreases if financial markets are efficient enough. Also, it can be make with the use of complex contracts in financial terms. Agency problems lead to costs which reduce the value of firm on market place (Bejou 2011, pp 1-6).The Other agency conflict is between shareholder and creditors starts from the relation between owners and creditors. Creditors always stake a fixed claim on companys resources in lieu of long term debts, bank loans, commercial agreements and other instruments. The returns given to creditors are fixed while those to shareholders are variable due to stock price. Owners can try to make risky investment decisions, but creditors need to be paid back in full but investments need to be made as early as possible. Creditors to protect their money wait for other protective covers from company line bond indentures, limitation on dividend payments, types of Investments Company can make, poison pills and new debt application. This all can reduce the potential market value of the firm (Ahlstrom 2010, pp 11-24).Problems with Profit Maximization schemeIf Managers of any firm want to work in the direction of shareholder wealth maximization, they should look beyond their conventional thinking of owner profit maximization. Profit maximization model isnt useful for decision making due to multiple reasons like 1) The standard macroeconomic model for any firm is static. Profit maximization argot compare short term and long term profits. Profit decisions should be reflected on time basis. And should have a long term impact on the firm2) Profit is find outd in accounting terms between costs and revenue, but it doesnt define any priority on multiple things like maximization of dictatorial profit, rate of profit as well as earnings per share.3) The tolerate problem is profit maximization of owners gives no way for managers to seek the risk assessment option. Tw projects giving same profits can have different risk profile (Cosans 2009, pp. 391-399)ConclusionThe complete concentration on shareholder wealth maximization has been under criticism since the dot com burst. A shareholder value increase talks about benefit of the owners only but doesnt talk about the social issues like employment, environment and ethics. Any management decision can maximize shareholder value but can lower welfare of other stakeholders listed above. A Company while making decisions for maximizing shareholder value can also prove hurtful to interests of its customers as multiple decision regarding product lines can have effect. Also, shareholder wealth maximization strategy needs to have a long term view not a short term one. The intrinsic value of any business is brought up by the combination of financial might, societal contribution, employee satisfaction and shareholde r interests maximization. This is said to be stakeholder value maximization. However, this concept is very hard to implement as every decision cant be useful to all stakeholder. They need to be prioritized and weighted upon before implementing nay managerial decision

Thursday, March 28, 2019

On Ibsens A Dolls House :: Ibsens A Dolls House

On Ibsens A Dolls theaterAuthor Ian JohnstonThose of you who train hardly read A Dolls House for the first time will, I suspect, father little trouble forming an initial sense of what it is slightly, and, if past vex is both guide, many of you will quickly reach a consensus that the major urge on of this play has both(prenominal)thing to do with gender relations in new-fangled monastic order and offers us, in the actions of the heroine, a vision of the need for a new-found immunity for women (or a woman) amid a suffocating society governed wholly by closed in(p) and deadened men.I say this because there is no doubt that A Dolls House has long been seen as a landmark in our centurys just about(prenominal) significant social struggle, the fight against the dehumanizing oppression of women, particularly in the conservative family. Noras net exit away from all her traditional social obligations is the most celebrated dramatic statement in fictional depictions of th is struggle, and it helped to turn Ibsen (with or without his consent) into an applauded or vilified champion of womens reclaims and this play into a vital statement which feminists pick out repeatedly invoked to further their cause. So in reading responses to and interpretations of this play, one ofttimes comes across statements like the followingPatriarchys socialization of women into servicing creatures is the major cathexis in Noras painful account to Torvald of how first her father, and then he, used her for their amusement. . . how she had no right to think for herself, only if the duty to accept their opinions. Excluded from meaning anything, Nora has neer been subject, only object. (Templeton 142).Further more than, if we go to see a production of this play (at to the lowest degree among English-speaking theatre companies), the chances are we will see something based more or less on this interpretative line heroic Nora engagement for her exemption against oppressi ve males and winning out in the end by her stalwart final departure. The sympathies will intimately certainly be distributed so that our patrol wagon are with Nora, however much we might carry some reservations about her leaving her children.Now, this construction certainly arises from what is in the play, and I dont want to ignore it out of hand. However, today I would like to raise some skillful question about or qualifications to it. I want to do so because this vision of A Dolls House has always struck me as oversimple, as, in some sense, seriously reductive, an approach that removes from the play much of its complexness and almost all its mystery and power.On Ibsens A Dolls House Ibsens A Dolls HouseOn Ibsens A Dolls HouseAuthor Ian JohnstonThose of you who have just read A Dolls House for the first time will, I suspect, have little trouble forming an initial sense of what it is about, and, if past experience is any guide, many of you will quickly reach a consensus that the major thrust of this play has something to do with gender relations in modern society and offers us, in the actions of the heroine, a vision of the need for a new-found freedom for women (or a woman) amid a suffocating society governed wholly by unsympathetic and insensitive men.I say this because there is no doubt that A Dolls House has long been seen as a landmark in our centurys most important social struggle, the fight against the dehumanizing oppression of women, particularly in the middle-class family. Noras final exit away from all her traditional social obligations is the most famous dramatic statement in fictional depictions of this struggle, and it helped to turn Ibsen (with or without his consent) into an applauded or vilified champion of womens rights and this play into a vital statement which feminists have repeatedly invoked to further their cause. So in reading responses to and interpretations of this play, one frequently comes across statements like the fo llowingPatriarchys socialization of women into servicing creatures is the major accusation in Noras painful account to Torvald of how first her father, and then he, used her for their amusement. . . how she had no right to think for herself, only the duty to accept their opinions. Excluded from meaning anything, Nora has never been subject, only object. (Templeton 142).Furthermore, if we go to see a production of this play (at least among English-speaking theatre companies), the chances are we will see something based more or less on this interpretative line heroic Nora fighting for her freedom against oppressive males and winning out in the end by her courageous final departure. The sympathies will almost certainly be distributed so that our hearts are with Nora, however much we might carry some reservations about her leaving her children.Now, this construction certainly arises from what is in the play, and I dont wish to dismiss it out of hand. However, today I would like to r aise some serious question about or qualifications to it. I want to do so because this vision of A Dolls House has always struck me as oversimple, as, in some sense, seriously reductive, an approach that removes from the play much of its complexity and almost all its mystery and power.