Saturday, January 18, 2020

Err Booklet

ERR Booklet Task A – Short Answer Questions Ai – Imagine you are a newly appointed supervisor/manager within your service. You need to update your staff handbook to reflect current employment law. Identify three different sources of information you could use to enable you to do this. Direct. gov website Citizens advice Existing company handbook Aii – List three aspects of employment covered by law Work Conditions (safety, discrimination, accommodation, etc. ) Wages Hours ) List three main features of current employment legislation. Minimum wage Training Holiday entitlements Aiii – Briefly outline why employment law exists. Employment law exists to safeguard the interests of both employers and employees. We understand that this particular area of law is continually developing and it is of critical importance to keep abreast of evolving legislation. Bi – Describe the terms and conditions of your employment as set out in your contract of Employment or employment agreement )Job description – defining the role, responsibility level (eg Manager, Deputy Manager, Assistant etc). It might include limits on decision making/to whom one reports/is supervised by. 2) Entitlement – rate of pay, holiday entitlement, retirement and ill-health benefits, bonus/overtime rates, uniform and/expenses allowances, canteen facilities, etc. 3) Responsibilities: working hours, dress code, reporting illness/absence, annual assessments, complaints procedures, notice periods for leaving/dismissal, requirements to change working hours. )General: Depending on the type of job, there might be other conditions restricting the employee taking other part-time work, confidentiality clauses, using company equipment for private use (eg phones, computers, vehicles) general codes of behaviour and adherence to certain corporate practices, health & safety regulations, etc. The actual format of the contract will vary from company to company. Some will cover more general matters in a Staff Handbook which the employee is required to read and confirm he/she has done soBii – Describe the information which needs to be shown on your pay slip/statement: Employee’s name Tax code National Insurance Nett pay Payment of overtime, bonus’s or tips Date Company name Payment method Payment period Biii – Identify two changes to personal information which you must report to your employer. Address Bank detail Biv – Describe the procedure to follow if you wanted to raise a grievance at work. You may describe this in writing or produce a flow chart or diagram. 1) Firstly, write to your employer setting out all the details of your grievance. ) Meet with your employer. Your employer should then arrange a meeting to discuss your issue and look at possible resolutions. It is your legal right to take a companion to this meeting, such as a colleague, a trade union representative or trade union official. This companion may spea k on your behalf, but may not answer questions on your behalf. 3) Appeal your employer's decision. After the meeting has taken place, your employer should write to you in a timely fashion with a decision on how your rievance will be resolved. If you are unsatisfied with this decision, then you have the right to appeal. This appeal should again be made in writing, and your employer must arrange another meeting. Bv – Explain the agreed ways of working with your employer in relation to the following areas: Without a job description how would you apply for a job, both you and your employer need to know the perimeters that you will work to be able to determine: the responsibility; the type and class of work you will do and pay scales.Unions will always never agree to working conditions that are not safe or health and safety valued,, however, the employer has a right to expect that when you are working in a firm that your time is productive so implementing ways of working by the us e of ‘Time and Motion' studies is not regarded as being taboo. That is why it is essential that there is communication between employer and employee or the employee's representative, the Union.

Friday, January 10, 2020

Modern Technology: For Better or Worse Essay

When it comes to the topic of the impact of digital devices or modern technology on society, most of us will readily agree that technology has positive and negative effects on our social and personal life. Where this agreement usually ends, however, is on the question of does technology control us? Whereas some are convinced that we need to embrace the technology, others maintain that we are living too much in the virtual. While still others are concerned about how we lose sight of the reality because of technology’s capability to make it happen. Andrew Lam, a Vietnamese journalist and a short story writer makes a point in his article â€Å"I Tweet, Therefore I am† about how technology is drastically changing the way we look and react in our society. One of the examples he uses to clarify his point is about the professor who collapsed while preparing to give a lecture. Lam said, â€Å"Instead of helping him, many students in the audience took out their cell phones, sna pped photos, texted and tweeted† (Lam 1). The students wanted to be the first one to spread the news so that they could gain popularity or feel proud of themselves for having the power of recording the extraordinary event that just happened. As we try to be the first one to tell the news, we don’t realize that we are losing our empathy. The students sure did feel badly for their professor, but their first reaction was that they have to record it instead of giving a hand or calling an ambulance. I understand why the students reacted by taking pictures or videos of their professors, because I also had those times where I witnessed some unusual happenings and the first reaction I felt is that I have to take pictures of it and share it with my friends by posting the pictures/videos in social networks I am using. I also understand why Lam is concerned about this, but this is a reality that automatically happens as we immerse in the generation of technology. This is not good because we are letting the influence of technology forget one of the most important aspects of socializing, showing respect and care to someone. We are changing in order to fit in to the digital media and social world. Lam mentions, â€Å"Generations  have been raised on video games, spent the bulk of their lives in chat rooms and on YouTube, on cellphones and iPods. They have been conditioned to invest the bulk of their emotional life in the virtual space† (Lam 5). I agree that most of us, in this generation, isolate ourselves in our own place inside the technology. It makes us busy in not such a productive way because we can sit in a chair or lie in bed just focusing on our phones, computers or tablets and not realize that we’ve just wasted hours or worse, our whole day. I could stay in my bedroom facing my laptop, chatting my friends for three hours. When I am done with chatting, I close my laptop and start texting. When I don’t text I watch funny and interesting videos on my iPod. Therefore, I would say that my daily routine is occupied with technology and mobile devices, whether it is good or not, technology is a part of every single day of my life. As we get benefits in the use of technology, we also need to accept the consequence that comes with it. Lam also makes a strong point when he said his view about the social media and its effects in on our personal lives, â€Å"We do not fully exist without some sort of electronic imprint in the virtual world, a digital projection of ourselves† (Lam 25). I agree with that because as I see it, we are now in a generation where people use technology, our life revolves around it, and we introduce ourselves to others using technology. We are then starting to care less and less about our personal lives. We are now posting what we feel on a Facebook status, we tweet our thoughts in Twitter, we even write what we are doing and where we are in our personal blogs. Instead of just writing it in our journal or diary, we are now sharing it to the world which makes us feel part of the society but making us care less about what we share and lets us forget the real meaning of privacy. What I don’t agree with in Lam’s article is when he said that, â€Å"†¦they (we) may just be leaving something important and irretrievable behind† (Lam), because although there are certain negative impacts of technology. I would not say that we are losing empathy as we immerse ourselves into the digital devices because the technology and its advancement aids the society as a whole and the important things we want to share. Whether it is good or bad news, we get the freedom of sharing it, reaching more people faster. Most importantly is when we find some people who can relate to us makin g us feel more important and better, and that is because of the widespread influence of the technology. Another  essay that makes a point and shows concern about the impact of technology is entitled â€Å"How Computer Change the Way We Think† by Sherry Turkle, and Abby Rockefeller Mauze Professor of the Social Studies of Science and Technology at the Massachusetts Institute of Technology. Turkle’s concern is how digital devices change the ways we think, how we are all relying on the benefits of technology and as we rely on it. We are losing our true identity and ability to do deep thinking. Technology blinds us with what is most important, which is enjoying and making friendships and relationships through physical interaction. Tukle said, â€Å"For those who are lonely yet afraid of intimacy, information technology has made it possible to have the illusion of companionship without the demand of friendship† (Turkle 603). Instead of meeting real friends in the park or mall, we add â€Å"friends† on Facebook. Instead of talking to a person face to face, we can text or tweet them and they will text/tweet back to us. Technology helps our social life easier in a way that we are losing the ability to interact to a person physically. As a personal example, when my family and I are having a dinner in a restaurant and while waiting for our order to come, we hold our iPods and smartphones, texting or playing games and I notice the silence because we are so busy with our gadgets and mobile devices. After reading Turkle’s concerns, I realize how rude that is. We are in the restaurant to bond and talk, yet we are in our gadgets talking to other people who are not in the table by means of texting. We are playing games instead of chuckling with our sisters and brothers. We are slowly forgetting the importance of having a face to face interaction. We depend so much in the computer that we are now letting the computers do the work for us and it is making us do less deep thinking. Moreover on Turkle’s concerns, he said â€Å"It does not teach students to begin a discussion or construct a narrative. It encourages presentation, not conversation† (Turkle 603). Though the PowerPoint gives us better look of what we want to share, it also have negative effects especially to students. Because of the PowerPoint, the class has now lack of discussion, making the PowerPoint do all the talk. The â€Å"swooshing sounds, animated icons, and flashing test, a slide show† (Turkle 603), distracts the students from the real purpose of the presentation. Some focus too much to the functions of PowerPoint and end up thinking of how can we make it looks attractive to the eyes of the audience instead of how they can understand  the ideas behind main poi nts. When it comes to privacy, we are not fully aware of the negative and dangerous impacts of sharing our personal information to the public and to the government. We thought that as long as it’s the way to get access on particular websites, it is fine to share anything they ask for. Turkle says, â€Å"Unlike past generations of Americans, who grew up with the notion that the privacy of their mail was sacrosanct, our children are accustomed to electronic surveillance as part of their daily lives† (Turkle 602). When it comes to accessing web services, I also don’t hesitate giving my personal information such as my name, address, contact number and I am willing to type it down as it is the only way to get in to the web services that I need, especially for school and work. Also for social networks, it is required to put my name, a profile picture and some basic information such as birth date and relationship status. Technology is taking away our privacy. We are giving the world to access our life. The dangers of sharing information have been in the news nowadays. There are now people who hack accounts and try to change or mess with our profile. Although we are aware of the danger of sharing personal information on the computer, we are still doing it because we enjoy its benefits. Whatever negative impacts we get in technology and mobile devices, we have to face the reality that we are now in a generation where technology will grow and grow and the next generations to come will depend on it more than we depend on it now. The only thing we can do is not to let technology fully control our daily life by appreciating the outside world and the real people. Works Cited Lam, Andrew. â€Å"I Tweet, Therefore I Am†. Reading Culture: Contexts for Critical Reading and Writing. Ed. Diana George and John Trimbur. New Jersey: Pearson Education, Inc., 2012 Print. Turkle, Sherry. â€Å"How Computers Change The Way We Think†. The Writer’s Presence. Ed. Donald McQuade and Robert Atwan. 7th ed. Boston: Bedford/St.Martin’s, 2012. Print.

Thursday, January 2, 2020

Alcoholics Anonymous Meeting Essay - 1056 Words

Psych: Drug Addiction The meeting I attended was held in Millersville University at Lehr Hall at 9:30 Am. I attended the meeting alone and was initially very hesitant and uncomfortable with the idea. At the beginning not unexpected occurred really happened. It appeared to be a very informal meeting that everyone seemed to already be acquainted. All the members directed each other by name and I was welcomed by, what seemed to be, a regular attendee as well as a new member. I sat down and initiated conversation with the member next to me. She informed me that she goes to multiple meetings and this was her first time at the specific location. She asked me of my major and other information. A member of the group, who seemed to be the†¦show more content†¦This put the topic more towards forgiveness rather than anything else. The only topic discussed, as I recall, was forgiveness. Many members gave their accounts of moments in which they felt â€Å"sorry† and how they handled the situation. I w ill refrain from going into further detail about any of the members of the group to keep their anonymity. The meeting concluded with the â€Å"serenity prayer.† I was not familiar with this prayer so I just held the hands of those near me and bowed my head out of respect. Specific attendees of the meetings appeared more active and attentive than others. Some of them seemed as though they did not want to be there and looked miserable. About one or two of the members even fell asleep a couple of times. Maybe some members went because they had to or because they just wanted to help tell themselves that they are trying. This really interested me because it is important to take notice that some people go and progress due to being active and others are just forced. In the case of being forced it is very easy to go to the meeting and just not be attentive or active. During the meeting I felt very enlightened. The topic of forgiveness is very broad and is even relevant in my own life . The viewpoint on the topic was very different and interesting. They talked more about being forgiving of ourselves because we are the ones that cause ourselves to react negatively to life’s daily hassles and stressors. They also spoke on the controlShow MoreRelatedAlcoholics Anonymous Meeting, And A Nar Meeting1269 Words   |  6 PagesFor this assignment, I attended an Alcoholics Anonymous meeting, Ala-Anon meeting, Narcotics Anonymous meeting, and a Nar-Anon meeting. The Alcoholics Anonymous meeting was in Greensboro titled â€Å"Back to Reality†. It was located at a fellowship club. The Ala-Anon meeting was located at Centertary United Methodist Church in Greensboro. The Narcotics Anonymous meeting was located at Saint James Presbyterian Church and the Nar-Anon meeting was held at Saint Johns United Methodist Church which was inRead MoreAn Alcoholics Anonymous ( Aa ) Meeting Essay1753 Words   |  8 PagesI went to an Alcoholics Anonymous (AA) meeting on Novembe r 26, 2016 at noon in Simi Valley, CA. It was in the back entrance of a strip mall in a long, thin room with tables down the middle and chairs around the table and around the walls in the room. It is only located four minutes from my house, but I have never noticed it before. As I walked in there was a little kitchen with coffee and a pecan pie and there were goodies on the table. I them walked into the main room. A woman led the group forRead MoreAlcoholics Anonymous An Open Meeting1188 Words   |  5 PagesAlcoholics Anonymous an Open Meeting Dominique Steinburg describes mutual aid as a process through which people develop collaborative, supportive, and trustworthy relationships; identify and use existing strengths and/or to develop new ones; and work together toward individual and/or collective psychosocial goals. (Steinburg, 2010) Alcoholics Anonymous is mutual aid group that supports individuals in their recovery from alcohol dependence. Established in the mid 1930’s, Alcoholics Anonymous wasRead MoreAlcoholics Anonymous ( Aa ) Meeting1197 Words   |  5 PagesAlcoholics Anonymous I attended the Alcoholics Anonymous (AA) meeting held at the Westhampton United Methodists Church, 6100 Patterson Ave, 23226, which is 3.8 miles away from my home. The meeting started at 7:30pm and was structured as an open meeting that welcomed beginners. I utilized www.aarichmond.org website to search for AA meetings in the Richmond Area. There were about 30-40 meetings offered a day within a 15-mile radius of my home zip code. I selected the RVA YPG because I assumed Y inRead MoreAlcoholics Anonymous : A History, Its Implications And The Meeting1531 Words   |  7 PagesAlcoholics Anonymous: A History, its Implications and the Meeting Support groups, how well do support groups actually benefit individuals and how are these support groups incorporated so that the techniques can actually assist someone? In researching this particular topic of Alcoholic Anonymous the results indicated that there is a diversity of AA groups. Although they all have the same objective there are variations in methods and techniques which are implemented to be able to infiltrate theRead MoreA Reflection On Awakening Alcoholic Anonymous Meeting793 Words   |  4 Pagesand reaction to an Upon Awakening Alcoholic Anonymous meeting which was held at the Unity of Sedona Church, 65 Deer Trail in Sedona, Arizona on Thursday, October 29, 2015. This meeting was held at 7:30 AM in the morning. The meeting consisted of an eleven step grouping of middle aged men and women ranging from ages 30 to 65 years old. There were seven men and thirteen women whose purpose was to practice prayer through the eleventh step of the Big Book. The meeting started out with an introductionRead MoreAttending A Local Alcoholics Anonymous Meeting Essay1120 Words   |  5 PagesTaylor O’Sullivan SDS3481: 12 Step Meeting Paper November 16th, 2016 Attending a local Alcoholics Anonymous meeting was a humbling and informative experience. To be completely honest, I had no idea what to expect going into the meeting. Right before I walked in, I felt somewhat uncomfortable and embarrassed. I felt as if I was intruding on someone’s personal life with my presence, even though I knew I was welcomed since the meeting was listed as â€Å"open†. Alcohol abuse is a very sensitive topicRead MoreAlcoholics Anonymous Meeting Essay804 Words   |  4 Pageslike to be a part of an AA meeting. The only time I have had seen or heard someone mention meetings for alcoholics has been TV shows and movies, which would portray these meeting as a circle of strangers just deliberating stories of their life and how this disease has changed them forever. Therefore, I had no idea what to expect. I felt intimidated and had a sense of nervousness, so I decided I would not go alone and brought a friend. My expectation upon entering this meeting was to see beat up peopleRead MoreAlcoholics Anonymous Meeting Observations Of A Interview1249 Words   |  5 PagesAlcoholics Anonymous Meeting Observations Per my customary tradition of attending anything for the first time I arrived early to survey the environment as well as obtain a seat that would provide the most optimum observation vantage point. The alcoholics anonymous (AA) meeting I attended was held at the House of Disciples Life Recovery Center, a ministry of Wiseman Ministries. Interestingly enough, it used to be a funeral home. As I walked through the doors the first thing I noticed was a faintRead MoreAn Outsider s Perspective On An Alcoholics Anonymous Meeting Essay1683 Words   |  7 PagesAn Outsider’s Perspective on an Alcoholics Anonymous Meeting I was given this assignment to do as an observation on an Alcoholics Anonymous Meeting and had to write a paper on what I have observed. I did not know if I could do this without feeling self-indulgence toward the members. After speaking to a member, I could not believe the sensation of listening to that person’s short history of battling Alcoholism. I m glad to be there to learn their negative and positive outcomes in their lives. Group

Wednesday, December 25, 2019

Analysis of Satans Speech in in John Miltons Paradise Lost

Analysis of Satans Speech in Miltons Paradise Lost John Miltons Paradise Lost is a work of enduring charm and value because of its theological conceptions, its beautiful language, and its updating of the epic to the modern worlds values. Book II of this epic poem opens with Satans speech to his minions in hell, proposing war on Heaven itself. In these first 44 lines, Satan is clearly established as epic hero, but at the same time is theologically/morally denounced by the speaker. This section of the poem opens by establishing Satans position of power and prestige: High on a throne of royal state, which far Outshone the wealth of Ormus and of Ind, Or where the gorgeous East with†¦show more content†¦Satan proceeds to address his gathered host of followers who with him were thrown out of heaven. He addresses them as Powers and Dominions, deities of Heaven, (II. 11), appeasing their egos and appealing to their desire for power and control. He justifies this, despite their recent loss, for since no deep within her gulf can hold/Immortal vigor, though oppressed and falln/I give not Heavn for lost, (II. 12-14). Because of the strength and power of those doomed to hell for all eternity, they will be able to re-conquer Heaven despite what God did to them. He proceeds to say that, From this descent/Celestial Virtues rising, will appear/More glorious and more dread than from no fall, (II. 14-16) because the struggles of living in Hell will increase the power and glory of the gifts of each of the fallen. As a result of these assertions of the power and might of the denizens of hell, Satan asserts that they, trust the mselves to fear no second fate. (II. 17) Satan follows this speech appeasing the egos of his followers by commenting on his own prowess and virtues. Me though just right, and the fixed laws of Heavn Did first create your leader, next, free choice, With what besides, in counsel or in fight,Show MoreRelatedAnalysis Of John Milton s Paradise Lost 1852 Words   |  8 Pagesliterary merit. Do not merely summarize the plot. (2010 AP Literature and Composition) Disobedience and Exile an Analysis of Satan from Milton’s Paradise Lost John Milton’s epic poem, Paradise Lost, has been the subject of criticism and interpretation through many years; these interpretations concur in that Adam and Eve are the sufferers of the poem, and it is their blight to lose Paradise because of their disobedience; however, their exile is merely a plight brought by Satan, and it is he who suffersRead More A Comparison of God and Satan in Paradise Lost Essay1571 Words   |  7 PagesComparison of God and Satan in Paradise Lost      Ã‚   In this essay I shall be focusing on the characters of G-d and Satan from Paradise Lost by John Milton.   Within the essay I shall be attempting to elucidate on the themes of ambiguity of the two characters as well as the uncertainty of moral integrity of each, characterized by Johns Miltons use of sentence structure, private thoughts and symbolism.    Foremost I would like to look at the way the way in which Milton characterizes theRead MoreFall from Grace: Satan as a Spiritually Corrupt Hero in Miltons Paradise Lost2859 Words   |  12 PagesFall From Grace: Satan as a Spiritually Corrupt Hero in Miltons Paradise Lost Can Satan -- a being, so evil that even as an Ethereal being of Heaven, who was cast out of Gods grace - be a hero? John Miltons Satan in Paradise Lost is very much a romanticized character within the epic poem, and there has been much debate since the poems publishing in 1667 over Miltons sentiments and whether Satan is the protagonist or a hero. As an angel in God the Fathers Heaven, Satan rose up with a groupRead MoreJohn Milton Opens Paradise Lost Essay2170 Words   |  9 Pages As John Milton opens Paradise lost with a brief explanation of his intent, he makes a very ambitious statement of his goal, claiming that his book would be sufficient means by which â€Å"[He might] assert Eternal Providence, / And justify the ways of God to men† (Paradise Lost 1.25-26). So the reader should treat his epic poem as the attempted justification that it is, and ask themselves this: does this argument successfully justify God’s ways? A key—perhaps even the key—par t of Milton’s book, and thereforeRead More An Analysis of Satans Final Speech in Milton’s Paradise Lost1782 Words   |  8 PagesAn Analysis of Satans Final Speech in Milton’s Paradise Lost Satans final speech to Eve, 11. 679-732, Book IX, in Miltons Paradise Lost, is a persuasive masterpiece carefully structured to appeal to her ambitious tendencies and to expand her already existing doubts (which Satan has implanted) as to the perfect nature of God. Satan begins by worshipping the Tree of Knowledge of Good and Evil, as Eve will do after she has made her choice. Throughout the remainder of the speech, he attempts

Monday, December 16, 2019

The Confidential Secrets of James Thurber Catbird Seat Essay Topics Revealed

The Confidential Secrets of James Thurber Catbird Seat Essay Topics Revealed Teenage mothers are more inclined to deliver a baby with a very low birth. Secondary college understudies decide their companions for assorted reasons, and a few of their decisions could lead to constructive and unfavourable impacts. Teenage pregnancy is certainly one of such topics that is very. In the united kingdom, teenage pregnancy is widely deemed to be an issue and negative. The Southbury Training School was thought of as a model for care of this kind, with its decentralized residential strategy. The intention of this study was to figure out the relationship of self-esteem. Such a terrific and intimate experience. He's figured out another program. They also proactively look for favorable changes in government policy for their customers. For some individuals in this way in Connecticut, it's their parents, often aging and increasingly hopeless, that are made to take care of them. There's a community here, and it's well worth cultivating. He's talking about specific rules which should be followed. That arbitrary prohibition ought to be lifted. No, on account of the law which requires faith. The Inclusion movement claims that each and every person who has a disability can function locally. James Thurber Catbird Seat Essay Topics Features On the surface the dream is saying that I haven't any present method of transportation and it'll take me considerably more time to get to the next place I wish to go. After all, there's a reason our brains store memories. It is all up to him to acquire his menthrough the turmoil safely. An incredible listing of completely free essays is a fantastic bonus of this internet site. This expert-written article supplies a selection of impressive research undertaking. Because of the transient character of Internet sites, these links are updated regularly. In case the content is passable, then you may use the entire essay. James Thurber Catbird Seat Essay Topics - the Conspiracy While I didn't adore each bite of each and every dish, I did love the whole experience. The thing that struck me about the entire night was, regardless of the high amount of pretension of a number of the food and plateware choices, the entire thing was really chill. They paid and left without eating the remaining portion of the meal. The blood sausage on the opposite hand. The entire dining experience is incredible. Allow me to say, all chips ought to be dipped inside this stuff. I also really liked the different varieties of plates which were used, especially the pottery utilized for the saki tasting. The experience for a whole is wonderful. Essay writing is our key specialization. Rules alone haven't been adequate for quite a while. Reading example essays works precisely the same way! Historical context is critical. The author utilizes a creative writing style to try to catch his audience's attention throughout the full essay. I am able to testify to the experiences and the so-called accommodations the writer is writing about. From one's very first nursery rhyme book to someone's later fictional novel, it is rather simple to say that everybody has arrived across many characters among their years. The writer is disabled himself. New Questions About James Thurber Catbird Seat Essay Topics On the way from the arena, I realized this would be my very last time experiencing a hockey game for the very first time. You're treated like you're definitely the most important person in the room no matter the other 20 people sitting there. I hope your students are not that scared to finish this assignment. It books up fast, so attempt to earn your reservation a minimum of 30 days beforehand. It's a different type of experience which you wouldn't want daily. Every individual has opinions about how to enhance the Earth, though nobody wishes to practice kindness in their very own backyard. I would like to have a relationship with the men and women that are coming to my show. Getting the Best James Thurber Catbird Seat Essay Topics Johnny Bear and Mr. Martin also conduct something harmful to some other character. He replies that he has no idea what she is going on about. He believes she is threatening the existence of the firm. Furthermore, he is not merely the nerdy, precise man he is perceived as. The organic world has ever existed, whether or not you're paying attention. It supplies the kitchen an additional opportunity to shine. Anybody coming in will truly feel a feeling of community. I used ton't understand what I wished to do I just knew that I wished to attend a terrific college and figured I would figure it out there and I did.

Sunday, December 8, 2019

Cyber Forensic Or Computer Forensic †Myassignmenthelp.com

Question: Describe about Cyber forensic or computer forensic? Answer: 1.0 Introduction Cyber forensic or computer forensic or digital forensic is an practice where scientifically proven methods are applied for gathering, processing, interpreting and using digital information as evidences in laws and cyber- crimes. Also, there are cases when in other crime activities where digital information and evidences are involved, use cyber forensic. There are support from legislation to use digital data as evidences in different crime investigation processes. Currently, cyber forensic has become a term that encompasses information technology, laws and legislation etc. This is being researched heavily. There are some fine differences between digital forensic and cyber forensic. Some scholars consider, digital forensic as the wider area and cyber forensic being a part of that. Cyber forensic is more inclined to finding evidences from digital storage devices and computers. The objective and goal of cyber forensic is checking and reviewing digital media thoroughly and forensically to identify, preserve, recover, analyze and present the facts and results from the digital data. There are techniques like data recovery etc. these techniques can also be used as a part of legal audit trail. The subject of cyber forensic investigation to about following the same practice and guidelines for the digital evidences. Gradually, computer forensic is becoming a part of government and legislation in different countries. 2.0 Digital Evidence In cyber forensic, an important part is electronic or digital evidences. These are probative information that are being transmitted or stored in digital form. These evidences can be used in court trials. Before acceptance of digital evidence at court, those are needed to be verified, authenticated and the relevancy will be checked. Sometimes, copy of evidences is needed to prove such features. (Casey, 2004) During last few years, the number of digital evidences in different types of legal cases, have been increased. Following types of digital data can be used as digital evidences. Emails Logs of ETM transactions. Digital video, photographs, Word documents Histories of instant messaging Spreadsheets Accounting and financial information and statements generated from different information systems Histories of Internet browsing Contents from storage and computer memory, backups of data Tracking information from GPS or global positioning system, Logs from automatic door locks at hotel rooms etc. Audio files and recordings. In some countries, these evidences are considered to have equal importance as traditional evidences. However, the volumes of data from these digital evidences is a consideration. These information are hard to destroy, copy etc. and there are more scope to derive conclusion from these information as these are more expressive by nature. But storage of these evidences should be done in a suitable way. However, authenticity and admissibility of these evidences are sometime questionable as these can be modified and tampered. But still, these can also be countered with more detailed information. (Casey, 2004) 2.1 Admissibility An issue with digital evidences is admissibility. This is stemmed from the reason that, the evidence does not have authentication. Thus admissibility and authentication are closely related. In most of the jurisdiction systems, it needs to have a properly seized and investigated digital evidence. There are chances that while investigating for some warrant, it found evidences for some other crime. In that case the second one needs warrant for investigation. 2.2 Authentication Just like any other kind of evidences, digital evidences also needs to have proper foundation. The evidences needs to have certain degree of reliability. There are still some questionable areas in case of usage of digital evidences. For example, it is possible to alter digital media easily. Thus it needs to establish the reliability of the digital devices and there should be certain degree of accuracy while entering the data. (Casey, 2004) There is some software and information technology based solutions that have been designed for preserving the digital evidences in the original form, thus it authenticates the admissibility of the evidences. For example, there is a digital authentication technology called OnLock Digital Authentication. This is a SaaS or Software as a Service based solution for authenticating and preserving digital evidences in some non editable format. Use and development of such applications are maximizing the applicability and importance of digital evidences at legal trials. 2.3 Rule of the best evidence The formats of the digital evidences are not human readable. Thus is needs additional steps to make those human readable before use as evidences. For example, the findings from some analysis of some digital evidence may need to be printed before use. There are arguments, that the changes of the format does not confirm to the best evidence rule and such digital documents does not qualify as digital evidences. But the counter argument with legal support says that if the data of the evidence has been acquired from some computer or other digital devices, then the print out or changes to other human readable format will be considered as a valid digital evidence reflecting the accuracy of data similar to original data. 3.0 Key Principles of Cyber Forensics The key principles of cyber forensic are, Computer Based Investigation Data Examination Analysis of evidences 3.1 Computer Based Investigation Computer based investigation processes are becoming more and more popular not in the cyber- crimes, but also from other types of crimes like from terrorism to burglaries. As technology has become an integral part of our lives, thus these kinds of crimes are also using technologies. As a result computer based investigation is becoming more essential in crime investigations around the world. Computers and information technology now plays roles in commission of crimes, for obtaining evidences of the same, even it can become the target of crimes. For computer based investigations, it is needed to understand the roles and types of the digital evidences, processing of crime scenes, urgency of responding to such crimes and analysis of evidences. Recognizing, collecting and preserving of the electronic evidences from computer based evidences in different scenarios of crimes. The responders should have clear understanding of the fragileness of the electronic evidences from computer based evidences, the associated procedures and principles to the collection and preservation of the evidences. In case of computer based investigations, evidences are the data about the results from some investigation. These data can be stored or transmitted through some computer. For example, in several cases DNA or fingerprints are considered as evidences. But the raw format of a fingerprint or DNA will not make any sense to us. We need the information about those. There are software and systems that are used to provide those information from those evidences. By nature, computer based evidences are fragile as those can be damaged or altered easily. Thus handling and preserving of these evidences is very important. Otherwise the rendering can become unusable or the results of the analysis will be erroneous. Preserving integrity of the computer based evidences is also very important. (Albert J. Marcella Guillossou, 2012) 3.2 Data Examination Examination of the data from the digital evidences follows the principles of data examination from the traditional evidences. It needs varied types of media and cases to deal with different types of data examination methods. In all possible cases, the examinations of digital forensic are carried out on copied evidences not on the original evidences. Data examination is the process of extracting digital evidences from different types of media and analysis or interpretation of the same. Here extraction refers to the process of recovery of data then analysis of the recovered data, finally placing it in a coherent, logical and usable format. The concepts, tools and techniques used in this process, are intended to help an examiner to going through these steps smoothly. The data examiner(s) will structure the evidences first then will examine the data from those evidences. An examiner can use any set of tools and techniques for examination however, the chosen ones should be useful for the examination process. (Albert J. Marcella Guillossou, 2012) Data examination process has following steps to follow, 3.2.1 Preparation In this step the files and data of the evidences are separated and stored onto different files, directories and media. All the required set up in this context are prepared. 3.2.2 Extraction There are two types of extraction process to extract data from the evidences. In the extraction step, data is identified and recovered from the physical drives without regarding to the file system. File system is the logical structure and it is required in the logical data extraction phase. During that phase, again data is identified and recovered from different file systems, operating systems and applications. During physical data extraction phase, data is extracted from the physical drives without any consideration of the file system. The techniques used in this step are, file carving, keyword searching extracting and storing the unused space and partition table on the physical drive. File carving is the technique that can assist in data recovery and extraction from the unused data across the physical drive. The data may not be accounted by the file system and operating system. Keyword search technique also does similar job across the physical drive. An examination of the structure of partition of some physical disk will help to understand the file systems. It will be easier to determine the physical size of the entire storage media under consideration. During logical data extraction phase, it considers the file system of the storage media first. Then it includes different types of files and data from the files system into consideration. For example, there are file stack, deleted files, active files and unallocated space on the storage media. One by one, the extraction phase can extract file system information like structure of the directory, file names, file attributes, data and timestamps, file location, file size etc. Then data reduction helps in identifying and eliminating known files by comparing the authenticated and calculated hash values. File extraction process may include techniques based on file header, file name and extension, file content, file location on the media etc. There may be recovery of deleted files, extraction of encrypted or password protected data etc. 3.2.3 Analysis of extracted data Analysis of extracted data helps to discover the significance of data. There may be some pre-defined time frame for analysis in some cases. The techniques used in analysis, include data hiding, time frame analysis, ownership and possession, review, investigation leads, searching, analytical leads etc. Time frame analysis helps to understand the timings of the events occurring in the computer. It also may help in understand the use of the computer. There are two methods to follow, during time frame analysis, those are, Examining the metadata of file system for date and time stamps. It helps to link the relevancy of the time frames to the files. Review of the application and system logs. There also may be other types of logs, such as security logs, installation logs, error logs, connection logs etc. Data hiding analysis helped to uncover the concealed data into the media. It helps in detection and recovery of knowledge, intent, ownership etc. of hidden data. The techniques used in data hiding analysis includes, Correlation of the file extensions and headers for identifying the mismatches in those. A mismatch indicates that there is an attempt of hiding. Steganography HPA or host protected area supports the fact that there were some attempt to hide some data. Gaining access to such areas uncover these attempts. Accessing the compressed, password protected files. Ownership and possession analysis helps to understand information like who is the creator of the file, who has accessed the file etc. The data and timestamp of the file may help to understand the ownership of the file, files stored in some non-default location, file naming process etc. also helps in this context. Information about the passwords, hidden data etc. helps to understand attempts of hiding. (Carrier Spafford, 2003) 4.0 Cyber Forensics Examination/Investigation Process Cyber forensic investigation process follows the following sub processes or phases. 4.1 Preserving the Evidence According to local exchange principle, . . . when two objects come into contact, a mutual exchange of matter will take place between them". Thus the evidences will be preserved in a crime scene (Carrier Spafford, 2003). Investigating a crime scene in case of cyber forensic will include some computer itself as crime scene. From this computer, the clues and evidences about some crime are to be found. The investigator is also supposed to meet the obstacles here. In case of cyber-crime, the usual case is, there will be very few clues to start with the investigation. Also there are chance of transgression and without any obvious signs of clues or crime. (Stephenson, 2000) In a digital forensic investigation, the process should be very systematic, legal and formalized. The admissibility of the evidences is very much necessary. The integrity of the evidences and the investigation process should be there. During the system preservation phase, it includes following activities, Stabilization of the digital crime scene. Preventing data loss. That is minimizing the chances of data being damaged or overwritten. Isolating the system or the digital crime scene, from network Collection of volatile data. There are chances that these data will be lost after switching off the system. Identification of the suspicious processes running into the system. After collecting the evidences from the crime scene, these are to be transported to some safe and secure location. In future, further experiments with those evidences will take data from that location. One common approach is to physically transfer the seized crime scene or the computer to the safe and secure location. Or another approach is to transfer data to such location through some network. However, in any case, it should be ensured that the validity of the evidences are retained after getting transported and the integrity is not affected. ( Ciardhuin, 2004) After getting transported to some safe and secure location, these evidences and data are needed to be stored. As it has ben already said that, in most of the cases, examination are carried out on copied set of evidences. Also, there are chances that investigation will not start immediately on those data. Again there should be proper storage that retains the integrity of the evidences. ( Ciardhuin, 2004) There are chances, that cyber forensic evidences can be altered or damaged easily. As digital evidences are highly interconnected in nature, so, damage can easily propagate through and may affect all evidences. Thus, integrity of the evidences are supposed to preserved in the following ways, The structure of the evidences At bit level or physical level The application that are being used to open or view the evidences. During system preservation phase, the logged in users to the system are suspected and are highlighted. The log files from the system are copied before those are lost. If possible then the entire environment should be preserved. This is possible to create a complete backup image of the system. This is an advantage over physical world forensic. In general, the hard disks are used as main evidence but, if the network is involved with the crime scene, then the state of the network is also needed to be preserved. There are various system preservation techniques. Those are, Dead acquisition technique, that considers the processes are stopped when the system is switched off. Hence, duplicate copies are made. Also it may use write blockers so that the evidences are nor overwritten. Live acquisition technique that may kill the suspected processes, re-connect to the network, retain the network log from being dead by connecting the system to some switch or hub. It may use network filters for preventing the suspects from deleting the data from remote connections. The best practices to be followed in preserving the evidences are, Making copies of important data. Keeping the original copy in some safe and secure place. Doing all analysis on copied data sets. Use write blocking techniques. Minimize the number of creation of new files while live analysis is going on. Opening the files carefully during live analysis. It should not modify existing data. 4.2 Locating the Evidence In this phase, an investigator locates the evidences from the preserved crime scenes. There are various options for an investigator for carrying out the process. Following techniques can be followed in this process. Analysis of computer registry to carry out dead or live analysis. The data sets may be volatile or non-volatile. A live analysis will collect information from all these data sets. In the evidence searching phase, usually replica images of the digital crime scenes are considered. There may be repetition of the result in multiple instances. When evidence locating is carried out on live system then forensic images are taken. Field searching is the process of booting the computer into some trusted environment and searching for evidence into it. Network traffic analysis during the live analysis phase will analyze network traffic during the incident time frame. It may rule out some hosts and ports. If needed, the analysis may be extended to executable analysis, contact encryption, data recovery etc. In a nutshell, the process searches for an object with some characteristic in the collection of data. The process start from known locations like web browsers bookmarks, history files etc. In Linux environment, it may search for some rootkit, intrusion, new accounts etc. As the investigation will proceed, hypothesis will be developed. It is important to search for hypothesis for refuting it. 4.3 Selecting the Evidence Selection of evidence in the process of finding the piece of meaningful information from the evidences located. An investigator can use various analysis process to select the right evidence. For example there is file system analysis. Other types of analysis are, Application analysis Database analysis Memory analysis Volume analysis Network analysis Swap space analysis Physical storage media analysis File system analysis is an application level analysis process that examines a partition or data volume of a disk that is interpreted as a file system. The results may be list of directories, recovery of deleted file, display of content of the file system etc. There are different categories of data from file system. Some of the categories are file system category, content category, metadata category, file name category etc. 4.4 Analyzing the Evidence After selecting the evidences those are needed to be analyzed to understand the information from the analysis. There are several mathematical method, tools and techniques to analyze the digital evidences. From the initial larger information base, it is needed to reduce the information space to the most meaningful and optimized one. The information space includes the evidences like files etc. and the metadata information about those files. During the analysis phase, investigators process more amount of information than the evidences and image cases. While filtering the relevant data from this huge information base, care is very important to be taken. There will be iterative processes to filter out most important information, generation of additional data for the cases, and reducing the size of overall information base. The information- investigation curve takes shape depending on the following factors, Investigator The investigation tool selection and use. Quality and type of data generated during each iteration. Also there are additional variable factors like the forensic examiners, victims, offenders, secondary transfer, data rot, witness etc. Various analysis processes are, Inferential analysis Associational Analysis Social Network Analysis Network Analysis Etc. 4.5 Validating the Evidence Digital evidences are very fragile in nature. Thus it needs to be validated to ensure its integrity. But due to the difference of the digital evidences from the same of the traditional evidences, the laws and rules for validating digital elements will be a bit difference. The best practice followed while validation of computer are, To become in a safe side and without loss of generality, it is assumed that every computer is modified for destroying evidences. Delay the investigation of a suspected computer until the back of the entire system his taken. Become aware of the OS related issue of the victim computer. Typical storage areas, like database, office suite files etc. contains most of the evidences. Also there are chances of hiding evidences in some slack, removed files etc. In spite of the use of technology in the business processes, people generally do not trust computers. Also there are various security risks as, computers belongs to the interaction of physical and logical spaces. That is the information of the computer will be in digital format but the users are human beings. In laws, there is something called Daubert tests. This is a pre hearing test for the digital evidences of a case. It checks the integrity and admissibility of the digital evidences. In the validation phase, an evidence is needed to be tested for its validity. The assertions from the digital evidence are verified during this stage. It ensures that the evidence has not been altered or deleted by the user or system processes. The security measurements of some host computer are used for auditing and monitoring for the integrity of the information in that system. The whole process is iterative in nature. The examiner or investigator may need to revisit the crime scene, locate and select evidences then validate those. A series of prompt used in the candidate validation process. The questions in the validation process includes questions about the abilities to link the computer and the suspect, the events of the crime and the time frame of use of the computer etc. An incompetence scrutiny is carried out to validate the evidences during different points of time of the investigation process. The problem and prosecution cases become more complex with the increasing complexity of digital domain and challenges. The errors in any analysis method is a serious case to consider each time. There are different factors that influence the validation process of some digital evidence. The factors are, The collection tools may be missing while analysis critical digital evidence. The prosecution or the plaintiff may fail during reporting of the exculpatory data. There may be false or misleading evidences. It may fail to identify more relevant evidence. (Cohen, 2006), (Palmer, 2002) Hence, it needs some standardization and more scrutiny. Forensic readiness program also can help to some extent. (Rowlingson, 2004) 4.6 Presenting the Evidence Presentation of evidences in the human understandable format or documentation of the analysis and validation results is the final and important step. It helps to repeat the whole examination process even if the court challenge the evidences. Crime scene reconstruction is a part of presenting the evidences. Based on the law and policies for different setting, the presentation phase, presents all evidences, conclusions etc. derived from the investigation. There may be different classes of audience based on the type of cases. For example, general counsel is the audience for corporate cases. The corporate policies and privacy laws are the dictators of the presentation. In usual legal setting, the judge or jury is the audience. Thus, validation of the evidences is required. The outcome of the examination of the evidences determine the construction of hypothesis based on the evidences. Also, depending on the type of investigation, the degree of formality of the presentation is decided. The hypothesis is intended for the persons rather than the investigators. There are two types of testimony to be used in a trial. An investigator can choose the more suitable one. The testimonies are technical or scientific witness and expert witness. Chain of custody and the timelines for those events, helps to uncover the crime and reach to conclusion. Also there are chain of evidences methods. 5.0 Importance of Crime Reconstruction Hypotheses and Alternative Hypotheses The importance of crime reconstruction hypothesis and alternative hypothesis are given as, 5.1 Crime Reconstruction Hypotheses (CRH) CRH or Crime Reconstruction Hypotheses are the results from an observation of the actions. Then the postulate of the causes behind the result are considered. During this process a theory or hypothesis about the crime is formed. Then the theory or hypothesis is tested against all environmental evidences from the crime scene. There will be extensive testing process. If there is some contradiction between the theory and the evidences from the crime scene then the hypothesis or the theory is abandoned and a new one is adopted. The process continues until a suitable hypothesis is found that is coherent to the evidences. 5.2 Crime Reconstruction Alternative Hypotheses (CRAH) In case of CRH, the investigator may overlook new evidences and the hypothesis may be found as only one possibility and that may be misleading. To check the hypotheses against a wider range of evidences, Crime Reconstruction Alternative Hypotheses or CRAH can be used. It helps to uncover several alternative hypothesis and the result is more conclusive. It covers evidences from different aspects of the crime scene. 5.3 Importance of CRH and CRAH Crime scene reconstruction helps to understand the circumstances and the root of the crime. Thus it helps in better judgment. Also the process of crime reconstruction opens up new viewpoints towards the crime scene and covers different possibilities behind the crime. 6.0 Conclusion In this report, cyber forensic has been discussed in details. There are details about the concept of cyber forensic, the principles of cyber forensic, the details and phases of cyber forensic examination, the crime reconstruction process and its importance. 6.1 Self-reflection on Assignment 1 This assignment has helped to understand and study cyber forensic. The subject is vast and it was very difficult to put it down in this report. There are various aspects of cyber forensic. The field is very dynamic. Other than technology there are applications of statistics, mathematics, forensic science etc. The assignment has given an in depth idea about the topic. References Albert J. Marcella, J., Guillossou, F. (2012). Cyber Forensics. John Wiley Sons. Ashcroft, J. (2001). Electronic crime scene investigation: A guide for first responders. Washington: U.S. Department of Justice. Bejtlich, R. (2005) The Tao of network security: monitoring: beyond intrusion detection.Boston: Addison Wesley. Berk, R. A. (1983). An introduction to sample selection bias in sociological data. American Sociological Review, 48, 386 - 398. Burdach, M. (2006). Finding digital evidence In physical memory. Paper presented at the Black Hat Briefings, Arlington, Virginia. Carrier, B., Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence. Caloyannides, M. A. (2004). Privacy protection and computer forensics (2nd ed.). Boston: Artech House. Carrier, B. (2005). File System Forensic Analysis. Upper Saddle River, New Jersey: Addison-Wesley. Casey, E. (2004). Digital evidence and computer crime. London: Academic Press. Cohen, F. (2006). Challenges to digital forensic evidence. Retrieved February 8, 2015, from https://all.net/Talks/CyberCrimeSummit06.pdf Enfinger, F., Nelson, B., Phillips, A., and Steuart, C. (2006). Guide to computer forensics and investigations (2nd. ed.). Boston, Massachusetts: Course Technology. Jones, K. J., Bejtlich, R., and Rose, C. W. . (2006). Real digital forensics: Computer security and incident response. Upper Saddle River, New Jersey: Addison-Wesley. Kruse, W and Heiser, J. (2002). Computer forensics. Boston: Addison Wesley. Leiwo, J. (1999). Observations on information security crisis. Bangkok: King Mongkut's Institute of Technology. Mocas, S. (2004). Building theoretical underpinnings for digital forensics research. Digital Investigation, 1(1), 61 - 68. Ciardhuin, S. (2004). An extended model of cybercrime investigations. International Journal of Digital Evidence. Palmer, G. L. (2002). Forensic analysis in the digital world. International Journal of Digital Evidence, 1(1). Rowlingson, R. (2004). A ten step process for forensic readiness. International Journal of Digital Evidence, 2(3). Stephenson, P. (2000). Investigating computer-related crime. Boca Raton: CRC PRESS. Yadav, Seema. (2011). Analysis of Digital Forensic and Investigation. VSRD International Journal of CS IT Vol. 1 (3).

Sunday, December 1, 2019

Old Girls Twitter Essay Example

Old Girls Twitter Paper To Tweet, or Not to Tweet My sixty-two year old father asked me about â€Å"tweeting† several weeks ago. Naturally, I thought to myself, what the hell is my father doing asking me about twitter, he doesn’t even own a computer. I assumed that he had seen a newspaper article about it or heard it on the news. I stood correct. Twitter has become new media phenomenon and let’s be honest- who doesn’t have a Twitter account these days? In defense of Twitter by Caroline McCarthy and Do I Really Have To Join Twitter? By Farhad Manjoo were two articles that struck me as captivating. Personally, I’ve never found twitter all that appealing, and yet I still have an account. However, I am happy to report I’ve only â€Å"tweeted† twice in the past year. As soon as I created my account, I immediately regretted it. I wasn’t too fond of the idea that people were going to be â€Å"following† my tweets and they would be updated with unnecessary complaints or food choices of the day. Farhad Manjoo seems to share similar thoughts on the subject. Commited Twitterers argue that the 140-character-or-less tweet represents the next great mode of human communication†¦Wait a minute-you want me to keep a perpetual log of my boring life for all of the world to see? † I agree. Twitter allows complete strangers to stalk your ideas and involve themselves in learing about your personal life. We will write a custom essay sample on Old Girls Twitter specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Old Girls Twitter specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Old Girls Twitter specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Creepy? Just a little. Manjoo argues whether or not there is a point to Twitter, needless to say, not one valid point was made. Manjoo’s article made a second compelling point. It is an alien form of communication. Micro-blogging mixes up features of e-mail, IM, blogs, and social networks to create something not just novel but also confusing, an doing it well takes some time and patience. † I’ve seen my friends on their Twitter accounts, and they will sit in front of their computer for ten minutes or so, just to write a three sentence statement about their life, trying to make themselves sound a lot more intriguing to their â€Å"followers†. In their defense, I can recognize why they wouldn’t want to sound tedious or dull, but there are certainly better things they could be doing with that ten minutes of their time. When I read over the article In Defense of Twitter I couldn’t help but laugh because although my mind generally doesn’t accept the idea of Twitter, everything in the article seemed to make valid points, while they may seem contradictive to the previous article. â€Å"The beauty of Twitter is that, unlike a full-out blog, there’s no obligation to be philosophical, thought-provoking or grammatically sound. Because it doesn’t require that kind of extra effort, it’s great for people like me who want to jump on the social-media bandwagon but don’t have the time to set up something elaborate on WordPress. I can understand this to an extent. Some people enjoy blogging in general, and since there are â€Å"apps† for Twitter, you can do it straight from your phone. For people who lead a chaotic, busy schedule filled with kids, jobs and extracurricular activities, I can see why Twitter would be an escape or even fun for that matter. McCarthy do es argue however, that people reveal sensitive information that doesn’t need to be broadcasted to the whole social networking system. Childrens’ names and exact locations for example, should not be included in the 140 character long tweet. I totally agree with her points, in my opinion personal information and personal emotions for that matter should be kept outside of the blogging world. A couple months ago, I accidentally, (I guess it was more of me being nosey than being accidental) stumbled upon a Twitter page that wasn’t private, and I didn’t happen to like the user of the page all that much for personal matters. Within two minutes of reading this nine-teen year old girls Twitter, I found out that she smoked marijuana around her seven month old baby, she needed a babysitter to go to a party that night, and she had a six pack of Twisted Tea in her trunk. I’ve never actually met this girl, unfortunately I just know of her from mutual friends. Good first impression? I don’t think so. People also forget the fact that many employers are involved in social networking sites. If you’re going to be putting inappropriate tweets, you might want to think about adjusting the privacy settings- just a thought. Facebook, MySpace, Live Journal, Skype, AIM, and Twitter included are not for everyone. â€Å"I’m of the opinion that no piece of social-media software is for everyone, and Twitter is no exception. I have friends who are so frustrated by Twitter’s lack of functionality and frequent site outrages that they’ve given up on it altogether. † Certain people aren’t comfortable with sharing there thoughts with their close friends, let alone the whole realm of Twitter. I suppose it all depends on the individual, but let’s be honest; no one needs to know that your new conditioner smells like apples. All in all, I think twitter is pointless. However, I understand why people enjoy the concept. I think an unbelievable, unnecessary portion of society is wasting their time with pointless social blogging, but who am I to say it’s right or wrong. I enjoyed the two articles’ distinction, and reading other peoples opinions and reasoning’s is a good way to acquire a better understanding as to why society is so obsessed with the idea of micro-blogging. There’s tweeting now, what will come next?