Tuesday, December 31, 2019

SWOT ANALYSIS ON THE XBOX - 997 Words

Running head: SWOT ANALYSIS ON THE XBOX SWOT Analysis on the XBOX Grand Canyon University AMP 340 22 Nov 2009 SWOT Analysis on the XBOX A SWOT analysis is an examination of an organization’s Strengths and Weaknesses, as well as what are the Opportunities and Threats (Schermerhorn, 2010, p.212). To best do a SWOT, it is important to look at the history of the XBOX. When Bill Gates reveled plans for the Xbox at the Game developer’s conference in San Jose, Ca. in March of 2000 no one knew exactly what to make of it. Was he mad, brave or just plain deluded? With Sony bashing Nintendo into a distant second place and Sega struggling to stay in the console arms race, his plans seemed a little crazy. But†¦show more content†¦Strengths; Superior marketing from two years out building up to the consol release in Times Square, Public recruiting of top game developers, XBOX and XBOX 360 both released over a month prior to Christmas making for outstanding holiday sales, XBOX was designed and manufactured by a leader in technology Microsoft giving it an instant reputation, XBOX liv e functionality lets you play your game on online against other players from around the world, built in hard drive to down load games and as memory storage, aggressive price cutting, and a broad range of quality titles (PS3power, 2008). Weaknesses; Not as many game developers producing game titles for the XBOX, many of the game titles you can get for your PC which would operate better than a game console, and It’s hard to break brand fans like in Japan who stand by Sony (PS3power, 2008) Opportunities; continually expanding in all countries, the technology is expanding in such a way as to be able to use twitter and down load net flix, Strong online services that make it easier for players to connect, interact and do more online. Threats; Life of the consol is approximately 5 years due to constant playability, As soon as any technology is released designers are already thinking and developing the next big thing in the gaming industry, competitors taking a different route as in the Nintendo wii doesn’t support the graphics the XBOX does but it gets gamers off theShow MoreRelated Business Analysis of the Microsoft Xbox Product Essay1672 Words   |  7 PagesMicrosoft Xbox Executive Summary Microsoft Xbox is a company that makes games, gaming systems and accessories. The use of these systems has risen dramatically over the years and the people that use them are always looking for a new great game or accessory to go with it. Also, Microsoft Xbox has launched the new Xbox 360 Elite, the most elite gaming system available today. Back in November 2005, when Xbox 360 first hit the shelves, it was just the beginning. Although the console itself has notRead MoreSony : A Virtual Reality System870 Words   |  4 Pages a handheld device, PlayStation Plus, an online streaming services, and PlayStation VR, a virtual reality system. Their current and most successful console is PlayStation 4. PlayStation faces a lot of fierce competition. Their main competitors are Xbox and Nintendo Wii. However for the past few years PlayStation has had the edge. PlayStation has many strengths including the fact that they are the industry leader and they have a high quality product. Sony has sold over forty-million units and increasedRead MoreCase Study Netflex Essay633 Words   |  3 Pageslate fees, fluctuating monthly fees, predetermined rental periods, instead has a flat fee. Netflix, let customers view unlimited streaming of movies and TV shows for a monthly fee and has also developed platforms to deliver its titles to Nintendo Wii, Xbox 360, PlayStation 3, and TiVo. Netflix also supports decks from Panasonic, Insignia, and Seagate, and a number of Android and apple mobile devices including the iPad. Most definitely Netflix has a noteworthy aspect of strategy that would sustainRead MoreSwot Analysis : Microsoft Software1270 Words   |  6 Pages SWOT ASSIGNMENT Microsoft Microsoft is one the world s leading corporations in the field of software, services and solutions in information technology. The Microsoft software products include operating systems for intelligent devices, server applications for environmental information technology, information and productivity applications, business solution and software development tools. It is used by more than 90% of personal computers worldwide. Microsoft became a pioneer in the personalRead MoreNetflix : A Competitive Market Essay1265 Words   |  6 Pagesthe organization to create a SWOT analysis â€Å"which stands for a company s strengths, weaknesses, opportunities, and threats (Abraham, 2012). Netflix does have a competitive market such as Amazon.com and Hulu that are becoming more popular with their lower monthly pricing. They also have a more simplified catalogue of consumer favorite new titled movies and TV shows. In order for Netflix to stay competitive with a strong strategic plan, let’s take a look at the SWOT to identify what the best courseRead MoreMarketing Plan - Playstation 43832 Words   |  16 Pages...............................................3 Situation Analysis...............................................................................................................4 2.1 Internal Environment...................................................................................................4 General.................................................................................................................4 SWOT Analysis ...........................................................Read MoreMarketing Plan - Playstation 43825 Words   |  16 Pages...............................................3 Situation Analysis...............................................................................................................4 2.1 Internal Environment...................................................................................................4 Ge neral.................................................................................................................4 SWOT Analysis ...........................................................Read MoreMarketing in a Global Economy: Identifying Growth Opportunities for Australian Video Game Developers in South Korea3903 Words   |  16 PagesSelection †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2.1 Rationale for Choosing South Korea for Product Launch †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2.2 Plan for Entering South Korean Market †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3. Situation Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.... 3.1 Macro-Environmental (PEST) Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3.2 Micro Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3.3 SWOT Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3.4 Justification for Product Launch †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4. Market Segment(s) to be Targeted and Positioning Strategy †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5. Three-Year Demand ForecastRead MoreMarketing Plan3452 Words   |  14 PagesToni Hoang, Tim von Oldenburg -1- Marketing Plan – Sony PlayStation 4 Table of Contents Page 1. About the company 2. Internal analysis 2.1. General analysis 2.2. SWOT analysis 2.3. Predecessor analysis 3. External analysis 3.1. PEST analysis 3.2. Porter s 5 forces 3.3. Competitors 3.3.1. Nintendo 3.3.2. Microsoft 3.3.3. PC 3.4. Customer analysis 4. Marketing Mix 4.1. Product details 4.2. Price 4.3. Distribution 4.4. Promotion 4.4.1 Marketing slogans and logo 4.5. Marketing ObjectivesRead MoreVideo Game Industry Analysis Essay1698 Words   |  7 Pagesindustry, but online, mobile, pc software and broadband are some of the fastest growing segments. Industry Competitors by Segment Segment Microsoft Sony Nintendo Console XBox, XBox360 PS2, PS3 Wii Games Third party Third party In-house Handheld devices N/A PSP Game Boy, DS, DS Lite Mobile gaming N/A N/A N/A PC / Online gaming Xbox live N/A N/A Interactive TV N/A N/A N/A Industry’s dominant economic features Market size and growth rate – More than $35 billion was spent on video games consoles

Monday, December 23, 2019

What Makes A Good Ruler - 1411 Words

What constitutes a good ruler? Is it someone that listens ? Or, perhaps someone that gets everything right? Is a ruler someone that gets things wrong sometimes? Does he listen and learn from his mistakes? Is a ruler always born into his position, or is it stolen? According to Machiavelli, the best ruler is the fairest one. The way to the most successful rulership, as Machiavelli describes, is following the steps that are written in his book- The Prince. Personally, I believe that Machiavelli s book is a fair way to distinguish how current rulers should preside over their specific countries. As with anything, not every single part of the book will fit in with everyday life today, but the majority of it fits in with how most rulers-especially presidents run the country. First of all, what is a ruler? According to Merriam Webster’s Dictionary a ruler [is] a person exercising government or dominion. Machiavelli agrees with this definition, but goes into so much more depth in terms of what he expects a ruler to be. Throughout the book, there is a ‘tug of war’ of sorts between what a good ruler should be, and what a bad ruler shouldn’t be. The book also emphasises what a ruler can do to follow said steps to be a more successful ruler, and gives specific examples of empires that have succeeded following the steps as well. Now Machiavelli did not influence every empire of the time with his book. Rather, he took some definitive actions successful (and unsuccessful) leadersShow MoreRelatedWhat Makes A Good Ruler?1506 Words   |  7 PagesThroughout class one of the major themes has been what qualities make the best possible ruler. Two of my favorite philosophers, Plato and Machiavelli, although very different both attempt to giv e an answer of what makes a good ruler. Plato’s Philosopher King and Machiavelli’s Prince share their similarities and differences, but in the end Machiavelli paints a more realistic picture of a ruler which makes his prince more favorable. In order to understand why Machiavelli’s Prince may be more appealingRead MoreJustice Is One Of Four Cardinal Platonic Virtues Essay1298 Words   |  6 PagesJustice is one of four cardinal Platonic virtues. These virtues are said to be good by nature, and so they must be ideals that all individuals strive to demonstrate in their lives. In The Republic, Plato (through Socrates) attempts to find the definition of Justice through dialogue with his colleagues. One of his colleagues Thrasymachus proclaims that: â€Å"Justice is in the interest of the stronger.† (338c) In other words, rulers make laws from which only they reap the benefits of. Fortunately, this dark viewRead MoreThe Republic by Plato1645 Words   |  7 Pagesactual interest of the rulers. Second, by claiming that all craftsmen only consider the welfare of the recipients of expertise instead of their own interest, Socrates asserts that a ruler, having an expertise of ruling, also only cares about the intere st of the ruled, and thus morality is the advantage of the weaker. In this paper, I will show that Thrasymachus only gives an argument about descriptive morality, and Socrates, by using a completely different definition of a ruler, fails to challenge theRead More The prince Essay1526 Words   |  7 PagesNiccolo Machiavelli’s â€Å"The Prince† attempts to explain the necessary tactics and required knowledge a ruler must attain in order to gain and maintain a successful reign. The novel serves as an abstract manual, addressing the definition of a good/bad ruler by placing emphasis on the required military organization, the character a ruler must posses, and the success that could be attained if a ruler should follow the guide. The scope in which the book is written is that of a scholarly observant. MachiavelliRead MoreThe Republic By Plato And The Prince By Machiavelli1617 Words   |  7 PagesMachiavelli offer important views on political philosophies of rulers. Plat o writes of a perfect society where status as ruler is naturally selected through innate abilities. These abilities are used to sustain the society, better it, and preserve it. Machiavelli writes of a society where anyone can be a prince; which for our purposes is a synonym for ruler, if they follow his instructions. These instructions are to ensure a new ruler can take control of new lands and maintain order in them for theRead MoreAnalysis Of Hsun Tzu s Man s Nature Is Evil1720 Words   |  7 Pagesare made because of the environment. Each person believes leaders possess certain characteristics that make them good rulers. I believe leaders are made, they are taught what is wrong and right, and they are taught how to be a certain kind of leader in the context of their environment. I want to discuss what makes someone a good leader. Is a good leader efficient and adaptable or is a good leader born with predetermined qualities that dictate how they will rule over a kingdom or state? In Hsà ¼nRead MoreMacbeth, By William Shakespeare Essay1348 Words   |  6 PagesShakespeare, there is a constant theme of questioning what quantifies a good leader and what qualifies someone to lead. These questions, however, are more easily posed than answered because they change immensely depending upon the individual responding. Some follow the school of thought that a king should be selected based on divine inheritance while others focus more holistically on a king who possesses good qualities that would make them a worthy ruler. In Macbeth there are not many examples of decentRead MoreAccording To Thracymachus Justice Is In The Interest Of1687 Words   |  7 Pagesresponding to the question, â€Å"what is justice?† as put forth by Socrates. An important implication of this response is that justice lies in following the rules and regulations made by the ruler and therefore, doing what is in the interest of the ruler. The problem with this understanding of justice is that for Socrates, justice is a virtue that applies universally everywhere, while for Thracymachus justice would change from city to city depending on the type of ruler. For instance, if gambling isRead MoreComparing Plato s The Republic957 Words   |  4 PagesWhat mix of traits creates the perfect ruler? Some may say charisma, personability, or even good looks. Throughout history, a plethora of leaders with different views have been successful for many different kinds of societies. Depending on what the society needs, rulers change their ways as well as do what they can for the good of their people. In Plato’s The Republic, the character Socrates argues with his peers about what makes the perfect society, as well as the perfect leader. According to PlatoRead MoreEssay on Platonic Justice916 Words   |  4 Pagesand his peers. At the beginning of The Republic, Plato asks the fundamental question of what is justice? Looking to define the ideal state of justice, Plato reasons that he must first define justice in theory before he can use justice practically. Platonic Justice is defined as being a harmony between the tripartite soul in which reasons guide the spirit and appetite. Justice is said to be good in itself and good in its practical ends. It is educating desires, implementing the human faculty of reason

Sunday, December 15, 2019

International Business †Midterm Review Free Essays

string(159) " Reasons to Invest Abroad: – market seeking – efficiency/cost seeking – resource seeking – knowledge seeking Why Internationalize\? 1\." AFM 333 Midterm Review Module 1: – Fall of Berlin Wall 1989 – Two Trends altering global market: globalization of markets and technological advances – Globalization: interconnectedness of national economies, growing interdependence of buyers, producers and suppliers in different countries G6 economies: US, UK, Japan, Germany, France, Italy – Account for half of global consumption with only 1/10 of population – B6 economies: China, India, Russia, Brazil, Mexico, South Korea – China is the biggest market for phones, TVs, and cars in 2007 – China and India have more middle class households than all of the households in the United States – Growth in B6 more than 3x the growth in G6 economies 62 Multinationals in Fortune Global 500 20 of these multinationals are in China 12 from South Korea 6 from India 5 from Mexico and 5 from Russia B6 have three times the labour force of G6 countries 33 million university-educated young professionals in developing world compared to 14 million in the developed world 00 000 IT Engineers in India vs. 50 K in US In the decade to 2020, the working-age population of emerging economies is expected to increase by more than 500 million, compared with an increase of only 3. 7 million in developed economies. We will write a custom essay sample on International Business – Midterm Review or any similar topic only for you Order Now Drivers of Market Globalization – 1. Reduction of trade and investment barriers – 2. Market Liberalization: move to market based economies + adopt free trade in China + Soviet Union etc. – 3. Industrialization + Modernization + developing economies creating higher value adding products – 4. Integration of World Financial Markets: international banks, globalization of finance – 5. Advances in Technology: reduces cost and time, improves coordination and communication, facilitates development, helps share information/marketing, virtual space removes distance Dimensions of Market Globalization – integration/interdependence of global economies – increase regional economic integration bloc – growth of global investment – convergence of buyer lifestyles/preferences – globalization of production activities Social Concequences – loss of national soverignity offshoring/outsourcing jobs – effects on the poor, the natural environment and national culture Firm-level consequences – new business opportunities – new risks and rivalries – more demanding buyers (less bargaining power to supplier) – international value chains Phases of Globalization 1. 1830-1880: Introduction of railway and ocean transport (trains and ships) + phone and telegraph invented 2. 1900-1930: increased steel and electricity production + Western Europe most industrialized country so established first multinational subs through colonization (Nestle, Shell, BP) 3. 948-1970: Form general agreement on tariff and trade + high demand for consumer products and input goods to rebuild after the war 4. 1980- now: radical advances in IT, communication, manufacturing, consultation, and privatization. Caused by: †¢Commercialization of the personal computer. †¢Arrival of the Internet and the web browser. †¢Advances in communication and manufacturing technologies. †¢Collapse of the Soviet Union and ensuing market liberalization in central and Eastern Europe. †¢Substantial industrialization and modernization efforts of the East Asian economies including China. GDP growth rates highest in developing economies who emphasize global integration Information travels faster now than ever before (ships/carraiges, steamships/cars, motor vehicles/aircraft, internet (speed of light)). Firm Level Consequences of Globalization – international value chain – demanding buyers – increased rivalry and competition – increased opportunity for business – Management must change focus – Must partner and outsource better – look for productivity and operational efficiency gains – find and measure key global strategic assets of org. International Business trade and investment activities of firms across borders Globalization – economic integration and growing interdependency worldwide Theories of Trade – mercantilism – national prosperity = positive balance of trade (trade surplus) – absolute advantage principle – produce only products for which your country/region has an abso lute advantage – comparative advantage principle – both countries produce even if one has absolute advantage in all products, relative efficiency matters, specialize in what you produce best and trade for the rest you can use scarce resources more efficiently National Comparative Advantages – China low cost labour – India – IT workers in Bangalore – Ireland – service economy – Dubai – knowledge based economy Comparative Advantage = superior features with unique benefits in global market either naturally endowed or put in place through national policy – NATIONAL Competitive Advantage = distinctive competencies of a firm from cost, size, innovation that are difficult for competitors to replicate – FIRM Factor Proportions/Endowments Theory = produce and export products that use abundant factors of production and import goods that use scarce resources Limitations of Early Trade Theories – they don’t account for cost of international transportation – tariffs and import restrictions distort trade flows – economies of scale bring about additional efficiencies – low cost capital now available on global markets How do Nations Enhance Competitive Advantage – governments can proactively implement policies to subsidize and stimulate the economy outside of natural endowments – create national economic advantage through: innovation stimulus, target industries for development, provide incentives and low cost capital National Industrial Policy – economic development plan by public sector to nurture and support promising industries through: tax incentives, monetary/fiscal policy, rigorous educational systems, investment in national infrastructure, strong legal and regulatory systems – Example Ireland: fiscal, monetary and tax consolidation, partnership of gov with unions, emphasis on high value add industry like pharma, biotech and IT, membership in EU, investment in education – improved GDP, Unemployment and National Debt 3x by 2003 from 1987 Porter’s Diamond Model: Firm Strategy, Structure and Rivalry – strong competitors in country serves as national competitive advantage – clusters ? Factor Conditions – labour, natural resources, capital, technology, knowledge and entrepreneurship ? Demand Conditions – strengths and sophistication of consumer demand ? Related and Supporting Industries – availability of clusters and complementary fi rms in the value chain Industrial Clusters: – concentration of suppliers and supporting firms in the same regional area – ex. silicon valley, Switzerland pharma, fashion in italy/paris, IT in Bangalore – export platform for the nation Classical Theories – International Product Cycle Theory: introduction, growth and maturity of each product and its associated manufacturing – INTRO: inventor country enjoys a monopoly in manufacturing and exports – GROWTH: other countries enter the global market place with more standard manufacturing – MATURITY: original innovator becomes net importer of product – Now – hard for innovator to maintain a lead because there is a short product life cycle – New Trade Theory: economies of scale important for international performance in some industries. Ex. high fixed costs = high volume sales to breakeven Reasons to Invest Abroad: – market seeking – efficiency/cost seeking – resource seeking – knowledge seeking Why Internationalize? 1. You read "International Business – Midterm Review" in category "Essay examples" opp for growth through diversification of market 2. higher profit margins 3. new PS ideas and business methods 4. serve customers who have relocated abroad (increase/maintain market) 5. closer to supply sources, use global sourcing advantages, flexibility in sourcing products 6. access to lower cost/better value factors of production 7. evelop economies of scale in sourcing, production, marketing, economies of scale 8. confront international competitors 9. invest in relationship with a foreign partner Nature of International Business – value adding activities can be done internationally (source, manufacture, market) – cross border trade not limited to raw materials, include capital, tech, knowledge, products, services etc. – Internationalize through: Export, FDI, Licence, Franchise and JV FDI – longterm acquisition of productive assets like capital, tech, labour PE etc – large commitment used to manufacture products in low labour cost countries MNE – big company with lots of resources, subs and affiliates in many countries (US, Japan, Germany, France, Britain) SME – small to medium size enterprise, 500 or fewer employees Born Global Firm – young company that initiates business on the global market Risks in International Business: 1. Commercial Risk – weak partnerships, bad timing of entry, high competition, poor execution of strategy, operational problems 2. Currency Risk – tax, inflation, asset valuation, transfer pricing, currency exposure 3. Country Risk – protectionism/gov intervention, bureaucracy, lack of legal safeguards/poor leagal system, social/political unrest 4. Cross-Cultural Risk – cultural differences, negotiation, different decision making styles, different ethical practices MNE Avenues for Involvement: ? Import/Export ? Licencing/Franchising ? Joing Venture ? FDI – get progressively more risky, higher investment, higher potential benefit, higher commitment Intermediaries Include: – Distributor – extension of firm, takes goods under their name to sell – Manufacturer Rep – under contract of exporter to rep and sell merch – Retailer – bypass wholesaler/distributer and sell to retailer to sell to customers – IKEA, WALMART – Trading Company – based in home country, high volume, low margin resellers. – Export Management Company – US, export agent who secures contracts to export goods – usually specialize in industries and areas – Agent – works on commission Licensor – Focal firm grants the right to the foreign partner to use certain intellectual property in exchange for royalties – Franchisor – grant right to use a business system for fees and royalties – ICV – share cost and risk fo new venture with another company – JV – create a jointly owned new entitiy with foreign partners – Project B ased Venture – collaboration with a timeline without creating a new entity, common with RD intensive ventures Facilitator – provide services for cross border transactions: Bank, Lawyers, Freight, Consultants, ad agency, custom brokers, insurance companies, tax accountants, Turnkey Contractor: Provide engineering, design, and architectural services in the construction of airports, hospitals, oil refineries, and other types of infrastructure. †¢These projects are typically awarded on the basis of open bidding by the sponsor. †¢Examples- European Channel Tunnel, the Three Gorges Dam in China, Delhi Metro Rail Ltd. and the Hong Kong Airport. †¢Build-own-transfer venture- an increasingly popular type of turnkey contract in the developing economies where contractors acquire an ownership in the facility for a period of time until it is turned over to the client. MODULE 3 [pic] Advanced economies are post-industrial countries characterized by high per capita income, highly competitive industries, and well-developed commercial infrastructure. †¢Examples- world’s richest countries and include Australia, Canada, Japan, New Zealand, the United States, and Western European countries. Developing economies are low-income countries characterized by limited industrialization and stagnant economies. †¢Examples- low-income countries, with limited industrialization and stagnant economies- e. g. Bangladesh, Nicaragua and Zaire. Emerging market economies are a subset of former developing economies that have achieved substantial industrialization, modernization, improved living standards and remarkable economic growth. †¢Examples- some 27 countries in East and South Asia, Latin America, Middle East and Eastern Europe- including Brazil, Russia, India, China (so called BRIC countries). [pic] Advanced Economies – 2 – 4% growth rates – mature industrial development – moved from manufacturing to service based economies – typically democratic political systems and capital economic systems – host worlds biggest MNEs – Emerging Economies – 7 – 10% growth rates 40% of world GDP – 30% of exports – 20% of FDI – low cost labour and capital, knowledgeable workers, gov support – fastest growth rate – attractive: growing middle class, manufacturing bases, sourcing destinations – market potential: percapita income, s ize of middle class, GNI, use adjusted GDP for PPP – middle class has some economic independence and discretionary income Hong Kong, Isreal, Saudi Arabia The EMPI combines factors that provide firms with a realistic measure of export market potential: †¢Market Size: the country’s population, especially urban population †¢Market Growth Rate: the country’s real GDP growth rate Market Intensity: private consumption and GNI represent discretionary expenditures of citizens †¢Market Consumption Capacity: The percentage share of income held by the country’s middle class †¢Commercial Infrastructure: characteristics such as number of mobile phone subscribers, density of telephone lines, number of PCs, density of paved roads, and population per retail outlet †¢Economic Freedom: the degree of government intervention †¢Market Receptivity: the particular country’s inclination to trade with the exporter’s country as estimated by the volume of imports †¢Country Risk: the degree of political risk Challenges of doing business with Ems – political stability – hard to forecast in uncertain conditions – beauraucracy/lack of transparency – weak IP rights – availability of good partners – presence of family conglomerates †¢Regional economic integration, refers to the growing economic interdependence that results when countries within a geographic region form an alliance aimed at reducing barriers to trade and investment. †¢40% of world trade today is under some bloc preferential trade agreement. Premise- mutual advantages for cooperating nations within a common geography, history, culture, language, economics, and/or politics †¢Free trade that results from economic integration helps nations attain higher living standards by encouraging specialization, lower prices, greater choices, increased productivity, and more efficient use of resources. 1. Market access. Tariffs and most non-tariff barriers have been eliminated for trade in products and services, and rules of origin favor manufacturing that uses parts and other inputs produced in the EU. . Common market. The EU removed barriers to the cross-national movement of production factors—labor, capital, and technology. 3. Trade rules. The member countries have largely eliminated customs procedures and regulations, which streamlines transportation and logistics within Europe. 4. Standards harmonization. The EU is harmonizing technical standards, regulations, and enforcement procedures that relate to products, services, and commercial activities. 5. Common fiscal, monetary, taxation, and social welfare policies in the long run. The euro (common currency since 2002): †¢Simplified the process of cross-border trade and enhanced Europe’s international competitiveness. †¢Eliminated exchange rate risk in much of the bloc and forced member countries to improve their fiscal and monetary policies. †¢Unified consumers and businesses to think of Europe as a single market †¢Forced national governments to relinquish monetary power to the European Central Bank, in Luxembourg, which oversees EU monetary functions. †¢NAFTA passage (1994) was facilitated by the maquiladora program – U. S. firms locate manufacturing facilities just south of the U. S. order and access low-cost labor without having to pay significant tariffs. NAFTA has: †¢Eliminated tariffs and most nontariff barriers for products/services. †¢Initiated bidding for government contracts by member country firms †¢Established trade rules and uniform customs procedures. †¢Prohibited standards/technical regu lations to be used as trade barriers. †¢Instituted rules for investment and intellectual property rights. †¢Provided for dispute settlement for investment, unfair pricing, labor issues, and the environment. †¢Trade among the members has more than tripled and now exceeds $1 trillion per year. In the early 1980s, Mexico’s tariffs averaged 100% and gradually disappeared under NAFTA. †¢Member countries now trade more with each other than with former trading partners outside the NAFTA zone. †¢Both Canada and Mexico now have some 80% of their trade with, and 60% of their FDI stocks in the United States. †¢Mexican exports to the U. S. grew from $50 billion to over $160 billion per year. †¢Access to Canada and the U. S. helped launch numerous Mexican firms in industries such as electronics, automobiles, textiles, medical products, and services. †¢Annual U. S. nd Canadian investment in Mexico rose from $4 billion in 1993 to nearly $20 billion by 2006. †¢Mexico’s per capita income rose to about $11,000 in 2007, making Mexico the wealthiest country in Latin America. †¢By increasing Mexico’s attractiveness as a manufacturing location, firms like Gap Inc. and Liz Claiborne moved their factories from Asia to Mexico during the 1990s. †¢IBM shifted much of its production of computer parts from Singapore to Mexico. ASEAN – Brunei, Cambodia, Indonesia, Laos, Malaysia APEC – Asia Pacific Economic Coop – Australia, Canada, Chile, US, China, Japan, Mexico CER – Aussie and New Zealand – removed 80% of tarriffs Why Nations Expand? 1. Expand market size  §Regional integration greatly increases the scale of the marketplace for firms inside the economic bloc.  §Example- Belgium has a population of just 10 million; the EU gives Belgian firms easier access to a total market of roughly 490 million. 2. Achieve scale economies and enhanced productivity  §Expansion of market size within an economic bloc gives member country firms the opportunity to gain economies of scale in production and marketing.  §Internationalization inside the bloc helps firms learn to compete more effectively outside the bloc as well. Labor and other inputs are allocated more efficiently among the member countries- leading to lower prices for consumers. 3. Attract direct investment from outside the bloc  §Compared to investing in stand-alone countries, foreign firms prefer to invest in countries that are part of an economic bloc as they receive preferential treatment for exports to other member countries.  §Examp les- General Mills, Samsung, and Tata- have invested heavily in the EU to take advantage of Europe’s economic integration.  §By establishing operations in a single EU country, these firms gain free trade access to the entire EU market. 4. Acquire stronger defensive and political posture  §Provide member countries with a stronger defensive posture relative to other nations and world regions- this was one of the motives for the initial creation of the European Community (precursor to the EU). †¢The value chain can be thought of as the complete business system of the focal firm. It comprises all of the activities that the focal firm performs. †¢The focal firm may retain core activities such as production and marketing, and outsource distribution and customer service responsibilities to foreign-market based distributors, thus the global reconfiguration of the value chain. Dell makes a variety of products, each with its own value chain. The total supply chain for a notebook computer, including multiple tiers of suppliers, involves about 400 companies, primarily in Asia, but also in Europe and the Americas. †¢On a typical day, Dell processes orders for 150,000 computers, which are distributed to customers a round the world, with non-U. S. sales accounting for 40 percent. †¢Shipping is handled via air transport, e. g. from the Dell Malaysia factory to the U. S. Dell charters a China Airlines 747 hat flies to Nashville, Tennessee six days a week, with each jet carries 25,000 Dell notebooks that weigh a total of 110,000 kilograms, or 242,500 pounds. †¢One of the hallmarks of Dell’s value chain is collaboration. CEO Michael Dell and his team constantly work with their suppliers to make process improvements in Dell’s value chain. [pic] Automotive Industry †¢Manufacturing of the Chevrolet Malibu illustrates national and geographic diversity of suppliers that provide content for an automobile, a truly global value chain. †¢Suppliers are headquartered in Germany, Japan, France, Korea, and United Kingdom, and the U. S. , and the components they sell to General Motors are manufactured in typically low-cost countries and then shipped to the General Motors plant in Fairfax, Kansas. †¢The German automaker BMW employs 70,000 factory personnel at 23 sites in 13 countries to manufacture its vehicles. †¢Workers at the Munich plant build the BMW 3 Series and supply engines and key body components to other BMW factories abroad. †¢In the U. S. , BMW has a plant in South Carolina, which makes over 500 vehicles daily for the world market. †¢In Northeast China, BMW makes cars in a joint venture with Brilliance China Automotive Holdings Ltd. In India, BMW has a manufacturing presence to serve the needs of the rapidly growing South Asia market. †¢BMW must configure sourcing at the best locations worldwide, in order to minimize costs (e. g. , by producing in China), access skilled personnel (by producing in Germany), remain close to key markets (by producing in China, India and the U. S. ). †¢Global sourcing is the procurement of products or services from suppliers or company-owned subsidiaries located abroad for consumption in the home country or a third country. Technological advances, including instant Internet connectivity and broadband availability TECHNOLOGY †¢Declining communication and transportation costs †¢Widespread access to vast information including growing connectivity between suppliers and the customers that they serve; and SUPPLY CHAIN †¢Entrepreneurship and rapid economic transformation in emerging markets. GLOBALIZATION †¢Managers must decide between internalization and externalization — whether each value-adding activity should be conducted in-house or by an independent supplier. This is known as the ‘make or buy’ decision: â€Å"Should we make a product or conduct a particular value-chain activity ourselves, or should we source it from an outside contractor? † †¢Firms usually internalize those value-chain activities they consider a part of their core competence, or which involve the use of proprietary knowledge and trade secrets that they want to control. †¢Configuration of value-adding activity: The pattern or geographic arrangement of locations where the firm carries out value-chain activities. Instead of concentrating value-adding activities in the home country, many firms configure these activities across the world to save money, reduce delivery time, access factors of production, and extract maximal advantages relative to competitors. †¢This helps explain the migration of traditional industries from Europe, Japan, and the U. S. to emerging markets in Asia, Latin America, and Eastern Europe. [pic] †¢Outsourcing refers to the procurement of selected value-adding activities, including production of intermediate goods or finished products, from independent suppliers. This practice of externalizing a particular value-adding activity to outside contrac tors is known as outsourcing. †¢Firms outsource because they generally are not superior at performing all primary and support activities. Most value-adding activities — from manufacturing to marketing to after-sales service — are candidates for outsourcing. †¢Business Process Outsourcing (BPO). The outsourcing of business functions to independent suppliers such as accounting, payroll, and human resource functions, IT services, customer service, and technical support. BPO includes:  §Back-office activities, which includes internal, upstream business functions such as payroll and billing, and  §Front-office activities, which includes downstream, customer-related services such as marketing or technical support. †¢Offshoring is a natural extension of global sourcing. It refers to the relocation of a business process or entire manufacturing facility to a foreign country. †¢MNEs are particularly active in shifting production facilities or business pro cesses to foreign countries to enhance their competitive advantages. Offshoring is especially common in the service sector, including banking, software code writing, legal services, and customer-service activities. †¢E. g. , large legal hubs have emerged in India that provide services such as drafting contracts and patent applications, conducting research and negotiations, as well as performing paralegal work on behalf of Western clients. With lawyers in N. America and Europe costing $300 an hour or more, Indian firms can cut legal bills by 75 percent. Best Jobs for Offshoring: Large-scale manufacturing industries whose primary competitive advantage is efficiency and low cost; †¢Industries such as automobiles that have uniform customer needs and highly standardized processes in production and other value-chain activities; †¢Service industries that are highly labor intensive, e. g. , call centers and legal transcription; †¢Information-based industries whose functi ons and activities can be easily transmitted via the Internet, e. g. , accounting, billing, and payroll; and †¢Industries such as software preparation whose outputs are easy to codify and transmit over the Internet or by telephone, e. g. routine technical support and customer service activities. [pic] †¢Cost efficiency is the traditional rationale for sourcing abroad. The firm takes advantage of ‘labor arbitrage’ – the large wage gap between advanced economies and emerging markets. †¢One study found that firms expect to save an average of more than 40% off baseline costs as a result of offshoring. These savings tend to occur particularly in RD, product design activities, and back-office operations such as accounting and data processing. Benefits of Outsourcing: †¢Faster corporate growth. †¢Access to qualified personnel abroad. †¢Improved productivity and service. Business process redesign. †¢Increased speed to market. †¢Acc ess to new markets. †¢Technological flexibility. Improved agility by shedding unnecessary overhead. Disadvantages to Outsourcing: †¢Vulnerability to exchange rate fluctuations †¢Partner selection, qualification, and monitoring costs †¢Increased complexity of managing a worldwide network of production locations and partners †¢Complexity of managing global supply chain †¢Limited influence over the manufacturing processes of the supplier †¢Potential vulnerability to opportunistic behavior or actions in bad faith by suppliers †¢Constrained ability to safeguard intellectual assets Risks in Global Sourcing: 1. Less-than-expected cost savings. Conflicts and misunderstandings arise because of differences in the national and organizational cultures between the focal firm and foreign supplier. Such factors give rise to cost-savings that are less than originally anticipated. 2. Environmental factors. Numerous environmental challenges confront focal firms including: exchange rate fluctuations, labor strikes, adverse macro-economic events, high tariffs and other trade barriers, and high energy and transportation costs. 3. Weak legal environment. Many popular locations for global outsourcing have weak laws and enforcement regarding intellectual property, which can lead to erosion of key strategic assets. 4. Risk of creating competitors. As the focal firm shares its intellectual property and business-process knowledge with foreign suppliers, it also runs the risk of creating future rivals (e. g. , Schwinn). 5. Inadequate or low-skilled workers. Some foreign suppliers may be staffed by employees who lack appropriate knowledge about the tasks with which they are charged. Other suppliers suffer rapid turnover of skilled employees. 6. Over-reliance on suppliers. Unreliable suppliers may put earlier work aside when they gain a more important client. Suppliers occasionally encounter financial difficulties or are acquired by other firms with different priorities and procedures. Over-reliance can shift control of key activities too much in favor of the supplier. 7. Erosion of morale and commitment among home-country employees. Global sourcing can create a situation in which employees are caught in the middle between their employer and their employer’s clients. At the extreme, workers find themselves in a psychological limbo, unclear about who their employer really is. How to cite International Business – Midterm Review, Essay examples

Friday, December 6, 2019

Digital Forensic Case Study Complete Solution by Top Experts

Question - Write a case study on Digital Forensic methodology? Contents Executive Summary. Introduction. Global Finance Background and Concern. Digital Forensic Methodology. Scope of the Case. Digital Forensic Methodology Approach. Investigation Process. PHASE 1 - COLLECTING THE RESOURCES. Volatile Data Capture. Non- Volatile Data Capture. PHASE 2: EXAMINATION.. File System Examination. Windows Registry Examination. Network Forensic Examination. Database Forensic Examination. PHASE 3 - ANALYSIS. PHASE 4 - FINDINGS. PHASE 5 REPORT. CONCLUSON.. REFERENCES. Executive Summary Global Finance company stands to be one of the largest finance company, providing the investment, superannuation and retirement services in Australia. It has a wider range of clients right from individuals to the corporation and superannuation fund investors. Very soon the company has widened its services throughout the globe with information technology support and strives to overcome the security challenges of the company. Introduction Global Finance company experiences a suspect or compromise of the information in one managers computer, working in the Queensland branch. Information security officer is accountable to this challenge and enforced an investigation audit team to investigate the source of the compromise to overcome the challenge. Global Finance Background and Concern The Global Finance Company is in the following state as considered by the audit team. Global Finance is a huge international player company with more than 10,000 employees employed throughout the world, with sector interests. The concern with the security is the compromise of the managers computer, in one of its branches in Australia. Global Finance company has been spread worldwide with the support of information technology. Networking and application infrastructure in the branch offices are missing after 2000, so the there is flat network environment with no access restrictions. Servers and workstations in the head office and all the branch offices are based on Microsoft Windows. Implementation of the network segmentation and firewall is poor. Though instruction detection and logging detection are existing, these are not regularly used. Head office has the necessary information technology infrastructure and technology with potential investigative and forensic capabilities. Information security officer has initiated the investigation by enforcing an audit team for digital forensic investigation. Auditing team has got the responsibilities of digital forensic analysis, documentation and presentation of the same to the information security officer. Digital Forensic Methodology Digital forensic investigation methodology is recommended and employed by the information security officer, as the methodology can find and reveal the source of compromise of the managers computer, by detecting all the workstations and networking among them. Digital forensic investigation methodology involves the sub tasks of data recovery, in case if any of the potential data is lost and network forensic to find if there is any compromise caused through the network. Before the investigation started by the audit team, they need to follow the following principles. Data present in the media should not be modified and the data has to be presented as is to the information security officer. Each team member of the audit must be well acquainted with enough expertise to ensure that the data is handled safely, without loss. The team has to preserve all the relevant documented information done, during the investigation. The whole and sole accountable person in this investigation is the information security officer, so everything has to be communicated and submitted to the information security officer. Scope of the Case Digital forensic investigation done in the Global Finance company has the following scope. Identification of any malicious activities and investigation of 5ws or why, when, what, where and who Identifying the security lapse in the network Identification of all possible digital evidence within the network Finding and estimating the impact of the investigation, if the compromise happened Identification of the legal procedure, in case the misconduct is found illegal The extent of investigation and further security steps are taken by the information security officer, who is whole and sole accountable person Digital Forensic Methodology Approach There are many digital forensic methodology approaches followed according to the situation, so there is no one common approach that fits all the cases. In the case of the compromise of the branch of the Global Finance company, the approach recommended is FSFP or Four Step Forensics Process. The approach has the following processes. The arrow is the indication of preservation of the document evidence throughout the process. Investigation Process Digital forensic investigation is done in the following phases. PHASE 1 - COLLECTING THE RESOURCES Collection consists of identification, labeling and recording the data from all the sources possible, followed by the maintaining the integrity of the data. Data is primarily collected as both volatile and non volatile data. The same LAN connection is to be used to access the forensic workstation of the manager and other workstations. Server of managers computer is taken as the target in this case. Microsoft Windows software is run in this server. To hear from the server, cryptcatp tool is used. The team creates toolset optical drive and opened through a trusted console, comd.exe. The following statements are then executed. Cryptcat 6543 k key Use the following command, for the data capture from the forensic workstation. Cryptcat -1 p 6543 k key Other tools that can be used here are the graphical user interface tools, like Process Explorer, Tcpview and Rootkit Revealer. The other Windows based tools used to capture the data are, Ipconfig for collection of the subject system details HBGrays fastDump to acquire the local physical memory Doskey or history - for collection of command history HBGrays F-Response to acquire remote physical memory Netfile for identification of the drivers and services Netusers and qusers for identification of the logged in user information Other potential data is collected from the clipboard. Other potential data is network connection present, running processes and network data. Volatile Data Capture Volatile data capture involves the data collection from the RAM, registry and cache memory. Non- Volatile Data Capture Potential non volatile data collection involves the collection of the antivirus logs, database logs, windows event logs, IDS logs, domain controller logs, application logs, firewall logs and other online data. Collection of the non volatile data is also called as forensic imaging. The non volatile data collection involves data present in the hard disc and other removable discs, like flash drives, USB drives, CD, DVD, memory cards, remote hard drives and remote computers, in the form of MS Outlook, MS Word and Spreadsheet. Collection continues with the other computers, switches, network topology documentation, network diagrams, routers and servers. Live networking traffic can clue very significant and potential digital data for the investigation. Forensic imaging involves copy of the entire non volatile data from the mangers system and no further alterations are to be done. Various tools used for forensic imaging are FTK, EnCase and ProDiscover with write block. Forensic imaging is better than the hard disc cloning, as it copies the integrated data that includes the metadata, which is significant in the investigation. The audit team does both this offline data and other online data using the tools, ethereal and Wireshrk tools. All the collected data is well documented by the audit team. PHASE 2: EXAMINATION After the digital data collection is done, examination is conducted using forensic investigation tools. Investigation is done for the managers computer, as the following. File System Examination New Technology File System disc or NTFS disc file has MFT or Master File Table information. MFT has all the files and disc crucial information. MFT contains the metadata of the files, which are existing and deleted, noted by the operating system. The data in file is stored as c: echo text_mass file1.txt:file2.txt The following command is used to retrieve the above, c:more file1.txt:file2.txt virus is also another potential data malfunction and so has to be considered for investigation. Windows Registry Examination Windows registry logs can reveal modification of the file information according to the time, lastwrite registry details, precise data in a database for the user application along with the hardware device reference point. The Windows registry structure is HKEY_CLASSES_ROOT HKEY_USERS HKEY_CURRENT_USER HKEY_CURRENT_CONFIG HKEY_LOCAL_MACHINE The important keys and values are, User Activity: user performed actions and activities over the managers computer can be accessed through HKEY_CURRENT_USER Autostart : This registry is a set that is launched without initiation of the user. MRU or Most Recent Used List: to keep track of the current activities. Other important clues are USB Removable storage, UserAssit, Wireless SSIDs, etc. Network Forensic Examination Tracking of packet forensics or packet mining is tracked via the network to track the network traffic like mails, browsing history, queries, etc. Network forensic tools can be applied in one of the two ways, security related and the other is forensic data according to the enforcement of the law. The team uses many network forensic tools and techniques to discrete investigated data like registry information, process listing, service listing, system information, logged on users, registry users, network connections and binary memory dump to explore and investigate. Packet sniffers help identifying and mapping the fingerprinting, web services and email communication, etc. Database Forensic Examination Database data is tracked through the queries for data identification and then preserved to analyze. IP addresses are tracked for remote connections. Database transactions are tracked though Data Manipulation and Data Definition Languages, DML and DDL. Customized file configuration is used to execute Database Consistency Checker and Distributed Management Views towards intrusion explosion. PHASE 3 - ANALYSIS Detailed data analysis is done after considering each of the digital evidence data. The analysis includes the following actiivites. Unusual application requests Looking the unusual and hidden files along with unusually opened sockets Malicious activies Complete analysis for memory Unusual accounts Malware analysis Complete analysis of timeline Patching level system Updated levels Complete analysis of file systems Complete analysis of event correlation The crucial malware analysis includes various tasks within, like, examining the logs, prefetch examination, search of known malware using either dynamic or static analysis. PHASE 4 - FINDINGS After the analysis the findings are summarized as, Identification of the compromise of the managers computer Identification of persistent remote access or direct access by the attacker Installing OS patch if not done in the target computer Malware that is suspected PHASE 5 REPORT Investigation is done over the managers computer and all other computers and computing devices present in the branch office. Audit team creates a formal report and then submitted to the information security officer. Final Report Purpose The report has the purpose of submission of the formal investigated information, related to the sources of compromise occurred to the managers and all other computers. Author of the Report Information Security Officer Incident Summary All the source of the compromise that are found and suspected on managers computer. Digital Evidences All relevant log files and other potential digital evidences found in the investigation Analysis Analysis of the sources of the compromise Conclusion The managers computer is digitally investigated for the sources of compromise, along with the and other computers in the regional office Supporting Documents Volatile, non- volatile data, registry info, log info and the reports generated from the tools. CONCLUSON The suspected managers or targeted computer is completely digitally investigated using digital forensic technology, from the Queensland branch office and finally the formal report is being submitted to the information security officer. References Cyber Forensic Investigation Plan, International Journal of Advance Research (2008), UOAR.org, Volume 1, Issue 1, accessed on 9 January, 2015. 7safe, (2013) Good Practice Guide for Computer-Based Electronic Evidence. Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib (2008), Mapping Process of Digital Forensic Investigation Framework, JCSNS International Journal of Computer Science and Network Securit, Vol 8. ACPO (2013), Good Practice Guide for Computer-Based Electronic Evidence, V4.0 Aquilina, M.J., (2003), Malware Forensics, Investigating and Analyzing Malicious Code, Syngress, Kenneth J. Zahn (2013), Case Study: 2012 DC3 Digital Forensic Challenge Basic Malware Analysis Exercise, GIAC (FREM) Gold Certification Fowler, K., (2007), Forensic Analysis of a SQL Server 2005 Database Server. Khanuja, H.K., and Adane, D.S., (2011), Database Security Threats and Challenges in Database Forensic: A Survey, IPCSIT vol.20 (2011), Singapore: IACSIT Press. John Ashcroft (2001), Electronic Crime Scene Investigation, A guide for First Responders, NIJ Guide M Reith, C Carr, G Gunsch (2002). "An examination of digital forensic models". International Journal of Digital Evidence Kent, K., et.al., (2006). Guide to Integrating Forensic Techniques into Incident Response, National Institute of Standards and Technology (Ed.) (Vol. 800-86): U.S. Department of Commerce. Richard Brian Adams (2012), The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice Agarwal, A., Gupta, M., Gupta, S., Gupta, S. C. (2011). Systematic Digital Forensic Investigation Model, International Journal of Computer Science and Security, 5(1), 118-130. Shiner, D.L.D., and Cross, M., (2002), Scene of the Cybercrime, 2nd edn, Syncress: Burlington. Reino, A. (2012), Forensics of a Windows System, Roche. Armstrong, C. (2003), Mastering Computer Forensics. In C. Irvine H. Armstrong, Security Education and Critical Infrastructures Kluwer Academic Publishers.