Saturday, November 30, 2019

Sources of Digital Forensic Data

Abstract Sources of data for digital forensics include storage media, file systems, and network equipment, among others. The data sources differ according to cases. Investigators can focus on account audits, live data systems, and intrusion detection systems to understand usage and trace intruders, until identification occurs.Advertising We will write a custom research paper sample on Sources of Digital Forensic Data specifically for you for only $16.05 $11/page Learn More Internet service provider (ISP) records, virtual machines, and network drives are also sources of data for digital forensics. This paper discusses the primary sources of digital forensic data for handling network intrusions and malware installations, as well as instances of insider file deletion. It discusses the merits and demerits of each source, and then decides the best way for investigators to conduct investigations and deliver court-admissible evidence. Introduction Digital foren sics deals with the identification, extraction, analysis, and presentation of digital evidence present in digital devices. Appropriate tools and techniques must be used to succeed in digital forensics operations. Forensic investigations begin with data collection. They then examine the collected data, analyze it, and report it to the relevant offices. In the first step, the investigator deals with the media that hosts the data. In the second step, examination happens to the data itself, which yields information that becomes usable for the analysis part. Finally, the investigators come up with a report that serves as evidence. The above template on digital forensics is used in this paper to evaluate four primary sources of data that would be useful for digital forensics in network intrusion, malware installation, and insider file deletion. The paper discusses the basic elements of each type of compromise, before considering its four primary sources of data that an investigator would find appropriate for presenting evidence.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Network Intrusion Network intrusion happens when unauthorized persons can communicate over a network and receive feedback in the form of data that is usable. The unwanted communication can lead to loss of sensitive information from organizations or individuals. Intruders can steal, delete, or alter formation to affect its integrity. They can issue instructions for hardware or software to operate abnormally. At the same time, network intruders may only view information and then use it as part of their strategy to attack an individual or an organization in other ways, such as blackmail. Sources of data for network intrusion, according to priority The primary sources of data for network intrusion forensics investigation are the intrusion detection system, account auditing, live system data, and ISP records. Intrusion detection systems In the first case, network administrators reconfigure intrusion detection systems specifically to monitor network vulnerabilities. The area of focus depends on prior exposures of the network to intruders. With the dedicated monitoring, it is possible to collect adequate information about an intrusion without crippling other functionalities of the network. Thus, the attacker will be unaware of the tracking system and will intrude into the primary system to carry out a given digital crime. The intrusion detection system can be automatic. Here, it will respond to any abnormality in network traffic by alerting administrators and increasing surveillance of a potential attack. Such a system relies on signature matching. It actively searches the network connection and activities of users or devices on the network to identify abnormalities and provide an alert whenever an incident matches the rules of an attack.Advertising We will write a custo m research paper sample on Sources of Digital Forensic Data specifically for you for only $16.05 $11/page Learn More Skilled attackers can fool the system with fake signatures to cause a false alarm and distract the network surveillance officers. The only way to cope with intruders using the method is by ensuring that it has the latest software and hardware updates. Account audits Account auditing comes in handy when administrators want to detect an intrusion after it has happened. The post-detection capabilities make the method preferable for presentation of network intrusion evidence. It works through the delivery of information that allows investigators to preserve evidence, reconstruct the crime, and trail an intruder. At the same time, account auditing ensures that there is a match between intruders’ profiles and then register unauthorized usage attempts on the network. All networks should have asset control mechanisms that combine technical and administrative controls. They ensure that access is monitored through identification and authentication of users. Given that the security of the network depends on different nodes, focus on auditing should also be on all the nodes to maintain integrity. Network resources must require users to use strong authentication to deter opportunistic intruders and to make evidence of an actual intrusion to stand out. Live system data Live system data provides logs that investigators use to create a map of an intruder’s activities on their network. They may then use the time-stamped map to corroborate other evidence about an intrusion. For example, a sniffer log can offer records of backdoor intrusions and attempts to force passwords to access administrator privileges in a number of computers connected to the network.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network. Investigators use specialized tools that automate the process to achieve their objective. However, when logging of access and monitoring of users on computers does not accompany accurate identification of sources of the logs, then evidence captured as live system’s data may end up being invalid in court because it cannot attribute a given action to a person purported to have intruded on the network with accuracy. Records from ISP When investigators exhaust the data sources within the organization, such as the three identified above, they can move on to seek assistance from service providers. Many ISPs monitor network usage to enforce fair usage policies and to increase compliance with security protocols. Therefore, ISPs can avail names, emails, mailing addresses, and specific usage records, su ch as the identification of devices that connect to their networks. An important challenge that investigators may face when seeking to collect data from ISPs is the need for a subpoena. At the same time, the information captured by ISPs may be in a format that is only used by the organization. This would introduce new interpretation barriers when the information is presented as evidence in court. Moreover, some details may be lost during interpretation. Malware Installation Malware can emerge from a number of sources and cause damage to computer systems. Detection relies on the identification of the point of installation to the computer system before the malware makes changes (Aquilina Malin, 2010). With different types of malware, investigators need to be aware of the installation options that hackers and other intruders can use to fix malware and prevent detection by the computer system or its user. The use of anti-virus programs can help to detect potential intrusion and remove malware from an infected system. The anti-malware program will vary according to the capabilities of taking out rootkits, spyware, worms, and viruses, which are all categories of malware. For malware installation, evidence can come from live system data, intrusion detection systems, virtual machines, and infected, corrupt files (Aquilina Malin, 2010). Sources of data for malware installation according to priority Live system data The live system data is helpful when an investigator wants to tell when malware was installed on a computer. The investigator will look at all the traffic that is coming into and leaving the computer and then deduce whether it is normal or abnormal, according to previous user statistics under the same circumstances (Brand, Valli, Woodward, 2010). Investigators may use the various vulnerability access tools to detect abnormal network traffic. Standard tools include Nmap, which is a network mapping tool that helps one discover connections that a computer is making to a network (Aquilina Malin, 2010). For detailed reviews, commercial software comes handy because it is specially made to provide reports on the status of network routing tables, system drivers, and running processes on a computer. One challenge facing live system data usage is the fact that malware evolves in its design and installation methods. Therefore, investigators must be keen on following clues presented by the data, even if they do not make sense at the initial look. Intrusion detection system A second source of data is an intrusion detection system installed on computers. A good example is an anti-malware program or a firewall that monitors computer activities of users and programs. It keeps logs and shares them with databases filled with information about possible intrusion pathways. When an action or request violates the system’s policy, the user or the system administrator flags it for further review. At the same time, the administrator could make expli cit instructions for the intrusion detection system to follow when dealing with actual malware installation incidences. The data captured by the system, which can include the identity of malware and origin, is then presented as evidence. It can help to exonerate computer users from accusations of malice (Maras, 2014). Virtual machines Virtual machines serve as forensic data sources when there is a need to show that a computer has been compromised, or to trap a malware and study its behavior. Virtual machines operate like ordinary computers, but they have limitations on file access and can be installed or uninstalled with ease, without affecting current computer usage capabilities. When investigators are interested in behavioral malware analysis, they opt for virtual machine setups that may utilize different platforms and offer customized environments without requiring the investigator to acquire actual computers (Nelson, Phillips, Steuart, 2010). During the observation process, inv estigators can use ordinary forms of collecting evidence on computers such as logging and taking screenshots that will aid in further interpretation of outcomes and help to explain malware actions when presenting evidence. Although virtual machines are handy at collecting data, they may show signs to malware programs such that the malware stops behaving as it would in an actual computer environment. This limitation prevents investigators from finding out the real extent of exploits that malware installations pose. Compromised or infected files Another source of data for reporting malware installation is the compromised files that exist on the computer. Infected files do not behave like normal files, and they may consist of data that is corrupted. Investigators will use the patterns of data corruption to identify a given malware type. However, the method is not very reliable because most data collected this way is volatile and can change when transferred to other systems. Presenting evidence in such cases may require investigators to provide the entire computer system to maintain the integrity of proof, rather than copying data and move it to other systems using portable drives (Nelson, Phillips, Steuart, 2010). Insider File Deletion Some network or database intrusions are due to insiders and detection is usually hard because insiders are already aware of the various security measures implemented by an organization to fight unauthorized access (Schwartz, 2011). Sources of data for insider file deletion according to priority Live system data The first and most appropriate way to get evidence for insider file deletion is by using live system data. There is evidence left behind when there is an intrusion into a computer system, in what experts equate to broken windows in physical break-ins. The broken window principle applies to file systems, where investigators evaluate file-access patterns on the victim’s computers. It is a fact that computer users will use a given set of files frequently and leave others untouched. Therefore, detectors can just analyze usage patterns and check for anomalies. For example, when insiders are deleting files, they are likely to remove a whole set of files to ensure that their target data is destroyed. Meanwhile, user authorized deletion will mostly only cover a particular range of files or a single file at a time. Investigators use probability and statistics to reconstruct timelines of computer usage to understand people’s actual behavior. Thus, an examiner will look at the directories and the subdirectories and note their time-date stamps of access to form a continuous outlook of a user authorized and unauthorized access. The evidence presented by the timeline analysis can then serve to identify unwanted deletion, because it only relies on logs, such MAC timestamps that record recent file modification and not particular device identities (Grier, 2011). Hard drives Another source of information is hard drives, where investigators are interested in non-volatile system data. The first step is to come up with an exact copy of a hard drive picked from a computer or networks that had the insider file deletion. Without making a copy of the hard disk, the investigator may end up interfering with the only source of evidence and make it invalid. At the same time, the collection of information from hard drives will only be possible when the information in question is non-volatile. Third-party applications are capable of reconstructing master file tables on the hard disk to make it possible to recover deleted files. The option is only available when the old file is not overwritten entirely by a new file. However, it is easy to infringe the technology; a smart computer user may use sophisticated software to delete files and its evidence by overwriting data immediately after the initial deletion. Network drives In addition to the computer hard drives, investigators may use network driv es as additional sources of evidence. Network drives allow users to access the same files simultaneously and share the same files. Some network drives may contain copies of files that are located on all the computers connected to a network. In such situations, the investigator will verify the integrity of a folder on a user’s computer by checking whether it corresponds to the folder stored on the network drive. In other cases, network drives have unique information logs that are stored as non-volatile data for every computer connected to the network. This can be another source of digital evidence. Most importantly, investigators can use file recovery tools to reconstruct the pathways and find deleted files. However, the same shortcomings highlighted when discussing hard drives will be present when analyzing network drives. In many cases, the hardware is the same; it is only the deployment architecture that differs between the two. Additionally, the same principles applied to the network or computer hard drives would apply to any storage media installed in systems or used as a periphery device. First, the media has to be cloned to avoid tampering with evidence, which would make it unusable (Al-Hajri Williams, 2007). Audit records Audit records offer a fourth source of data for insider file deletion. The records are created by operating systems installed in computers. An administrator with enough privileges sets up the audit component in the operating system and then safeguards it against manipulation by non-authorized users. Together with audits, it is possible to monitor user physical activities on computers, such as keystroke and video surveillance. The collected information will show the identity of the user and the particular activity that was going on at the time of data deletion. Unfortunately, the use of auditing and physical monitoring is only effective when the subjects are subordinate staffs. Managers in organizations may have privileges that allow them to shut down the audit and surveillance systems when they want to delete files. However, even in such cases, the loss of evidence in this way will offer investigators new evidence to show that administrators were involved in data deletion. One of the shortcomings in physical monitoring is that it may be a violation of personal privacy, thereby causing the evidence collected to be useless in court (Capshaw, 2011). Conclusion The integrity of the data collected by investigators relies on the procedure used to extract data from the sources identified in this paper. Investigators should evaluate the likely value of data and then use the evaluation to determine the right procedure for collection. Another important consideration is the volatility of the data, which relates to whether data would be lost when a live system powers down. In such cases, the priority would be to acquire the volatile data before it disappears and then move on to handle non-volatile data. In many insta nces, digital forensics requires multiple evidence sources to incriminate a person. The use of multiple data sources and procedures helps the investigator to reach the goal of getting tangible evidence. However, different sources, such as accounting audit, live system data, intrusion detection systems, and computer storage media pose varied hardships for the investigator when collecting data. Dealing with an ISP may involve a legal process that takes time and effort, yet getting logs from a computer or network router would be easier. While collecting data from various sources, investigators must be aware of the ability of intruders or insider wrong doers to cover their tracks. For example, intruders using malware installations may program the malware to interfere with logging parameters on an infected computer, thereby compromising data that investigators would collect from the infected computer. Therefore, it is important for forensic investigators to verify the integrity of the da ta they collect. References Al-Hajri, H., Williams, P. (2007). The effectiveness of investigative tools for secure digital (SD) memory card forensics. 5th Australian Digital Forensics Conference. Perth: Edith Cowan University – Research Online. Aquilina, J. M., Malin, C. H. (2010). Malware forensic field guide for windows systems, digital forensics field guides. New York, NY: Syngress. Brand, M., Valli, C., Woodward, A. (2010). Malware forensics: Discovery of the intent of deception. Proceedings of 8th Australian digital forensics conference, (pp. 1-5). Perth. Capshaw, J. (2011, April 1). Computer forensics: Why your erased data is at risk. Web. Grier, J. (2011). Detecting data theft using stochastic forensics. Digital Investigation, 8, s71-s77. Maras, M.-H. (2014). Computer forensics cyber criminals, laws and evidence. Burlington, MA: Jons Barlett. Nelson, B., Phillips, A., Steuart, C. (2010). Computer forensics and investigations (3rd ed.). Boston, MA: Cengage Learning . Schwartz, M. J. (2011, December 13). How digital forensics detects insider theft. Web. This research paper on Sources of Digital Forensic Data was written and submitted by user Jaxon E. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Free Essays on Child Punishment

No Punishment for Children Sins Parents can only beheld for certain limitations of their children’s behavior, â€Å"Punishment for the sins of the Children, John Leo stated that both stigmatize parents with their assumption that a child’s misbehavior results from failure of parental super visions†(440). I feel that parents should not be responsible for the sins of there children. Parents don’t know what there children do when there out of there sight. John Leo states that â€Å"hundreds of exasperated communities, large and small, are holding parents responsible for curfew violations, graffiti damage and crimes by their children†(440). I can remember one time when I acted out in school and my teacher responded saying your mother would be ashamed to see how you’re acting. My mother wasn’t present so how could she be ashamed of my behavior at the time. Children have two personalities where they can become like Dr Jekyll and Mr. Hyde. John Leo states that, â€Å"In devastated urban areas, however, the practical and ethical problems are very different. It can look as though poor mothers are being punished for sins of children they can’t control†(440-441). I have a cousin who was arrested for selling drugs at the age of 14 the authorities were trying to hold his mother responsible, by saying that she knew her son was selling drugs and they sought to find a type of punishment for her. I feel that she shouldn’t receive punishment for what she claim she didn’t know because as I said earlier children can play double roles and the parent/parents wouldn’t even know it. Therefore parents can only be responsible for certain limitations of their child/ children behavior. In the story, Leo said that Patricia Holdaway was the first parent charged under the curfew law of Roanoke Va. This I felt was unjust a lot of parents... Free Essays on Child Punishment Free Essays on Child Punishment No Punishment for Children Sins Parents can only beheld for certain limitations of their children’s behavior, â€Å"Punishment for the sins of the Children, John Leo stated that both stigmatize parents with their assumption that a child’s misbehavior results from failure of parental super visions†(440). I feel that parents should not be responsible for the sins of there children. Parents don’t know what there children do when there out of there sight. John Leo states that â€Å"hundreds of exasperated communities, large and small, are holding parents responsible for curfew violations, graffiti damage and crimes by their children†(440). I can remember one time when I acted out in school and my teacher responded saying your mother would be ashamed to see how you’re acting. My mother wasn’t present so how could she be ashamed of my behavior at the time. Children have two personalities where they can become like Dr Jekyll and Mr. Hyde. John Leo states that, â€Å"In devastated urban areas, however, the practical and ethical problems are very different. It can look as though poor mothers are being punished for sins of children they can’t control†(440-441). I have a cousin who was arrested for selling drugs at the age of 14 the authorities were trying to hold his mother responsible, by saying that she knew her son was selling drugs and they sought to find a type of punishment for her. I feel that she shouldn’t receive punishment for what she claim she didn’t know because as I said earlier children can play double roles and the parent/parents wouldn’t even know it. Therefore parents can only be responsible for certain limitations of their child/ children behavior. In the story, Leo said that Patricia Holdaway was the first parent charged under the curfew law of Roanoke Va. This I felt was unjust a lot of parents...

Friday, November 22, 2019

Building Sustainable Organizations Analysis

The report discusses the HRM practices in an organization through the case study of a   hospital which is located in Australia with around 400 staff members. The hospital has its unit across the Australia. The case study discusses ineffective HR practices operating in the hospital administration which have contributed to high attrition, grievances, absenteeism and shortage of staff in the organization. The hospital has been reported to have some serious accidents involving patients and staff members. The case then discussed a contrasting view of another hospital that is effectively implementing HRM practices in its administration through employee engagement activities, HR policies, job analysis and recruitment and selection. The hospital has been reported to have great patient services because of its sustainable management practices and policies. The first hospital discussed in the case reflects ineffective HRM practices which have degraded the quality of patient services and have even led to some serious patient accidents. The hospital only has one payroll department which takes care of the salary of the employees and one HR consultant who conducts weekly visits to the hospital. All the responsibilities of an HR manager have been laid down on the middle managers which has overburdened them. The CEO of the hospital has been overlooking the consequences of this activity of overburdening middle managers. This has resulted in work conflicts, staff turnover and absenteeism. The overall quality of the services of the hospital has also degraded. The hospital lacks an effective munication model, which is taken care by an HR manager. Effective munication is required for assigning roles and responsibilities, boosting employee confidence and evaluating performance of the employee. An effective munication holds an organization together through effective policies, employee handbook, meetings and conferences, performance evaluation, employee engagement etc. munication helps to transfer the information from one department to other and thus maintains the flow of information through mails, telephones, meetings, documents, employee record etc (Fielding, 2006). It is the role of an HR to maintain an effective munication in an organization which is not present in the hospital. Employment r elations are also not being properly managed ineffective HR policies. Employment relations are required to hold the employees and have good staff retention in the hospital through developing relation between employee and the hospital through benefits and pensation, appraisal system etc (Gardner & Palmer, 1997). The employee gets frustrated and demotivated due to work conflicts and situation based problems. They need to be motivated by an HR manager through meetings and other activities. The managers are not even aware that these assigned responsibilities are not even part of their job and get frustrated sometimes which creates absenteeism and staff turnover. This overall impacts employee petence through work conflicts and absenteeism which indirectly affects the quality of the services of hospital and leads to disappoint patient. This spoils the image of the hospital and affects the long terms goals and objectives of the organization. A sustainable HRM model is required to improve the quality of the services of the hospital (Wolper, 2004). The CEO of the hospital needs to review the performance of the hospital in order to build a sustainable business model. He needs to understand that an HR consultant is not enough while considering the long term goals and objectives of the organization. The patient care and safety are one of the essential ponents for a successful running hospital which are not as per the norms of a hospital. The severe accidents may increase in the future and may have disastrous consequences on the operational system of hospital. The CEO needs to develop a sustainable HRM model in order to achieve the long term goals and objectives of the hospital (Wolper, 2004). CEO would have to create an effective HR department and ensure proper implementation of the HR policies and practices. He could have a look at the HRM model of other successfully running hospital as mentioned in the case study. The hospital has a proper HR department which has led to quality services to the hospital through its staff retention and employee engagement. Thus, CEO should plan to develop an HRM model in the hospital by considering the following roles and responsibilities of an HR department and should hire an HR manager who could assist him in other recruits for the department. The HR manager is responsible for hiring the suitable employees as per the needs and requirement of the job profile in the organization. Employees are recruited through different channels such as newspaper ads, online ads, networking, telephone etc. It is the responsibility of an HR to use the right channel for selection (Brinkerhoff & Goldsmith, 1992). When a new employee gets hired and joins the organization, he needs to be well versed about the organization and his duties and job role. The HR manager guides and instructs the employee through an induction and training program regarding what he would be expected to do through employee handbook, job description, pany policy manual and training and mentoring. He also checks all the required documents of the employee such as id proof, degrees etc (Brinkerhoff & Goldsmith, 1992). It is the duty of an HR manager to ensure that hospital plies with the rules and regulations of the government through his legal research expertise on hospital. The hospital must abide by the laws as prescribed by the government which may include recruitment contracts with the medical practitioners. Then there are employee contracts which should be very well documented (Brinkerhoff & Goldsmith, 1992). It is the duty of an HR to control and monitor the performance of an employee through employee engagement, resolving work conflict, handling grievances, appraisal system etc. The employee performance is responsible for quality of the services of a hospital. An HR boosts the confidence of employees through different activities and ensures smooth operational activities in an organization (Wolper, 2004). An HR manager is also involved in core team of a hospital and helps in building strategies in alignment with the goals and objectives of the organization. An HR manager acts as an intermediate between the employees and the hospital and thus, helps to resolve employee issues and concerns through proper planning and devising solution (Evans, 1990). Training and development is a very crucial element to develop a sustainable business model in hospital industry. It ensures quality services and equipping the staff with latest technology and practices in the market. It is the duty of an HR to conduct regular training in the hospital such as handling patient effectively, being polite to the patient etc. Thus way training improves the quality standard of a hospital (Savage, Fottler & Khatri, 2010). HR is responsible for running operations of a hospital smoothly and effective administration is the core element of HRM in hospital. The responsibilities may vary from hospital to hospital (Fried, Fottler & Johnson, 2005). Studying the above roles and responsibilities, it can be evaluated that an HR plays a very important role in effective delivery of services and ensuring quality patient care. Further, the report would discuss the ways to develop a sustainable HRM model in a hospital and its consequences. A sustainable HRM model consists of six elements which would be discussed one by one below: HR Management Systems: It ensures that the operational activities are being maintained in an organization through integration of data, staffing and placement and employee support system. The data is helpful is evaluating the performance of the employees and provides employee feedback and coaching and mentoring to the employees if required. This would improve overall work productivity of the hospital through an effective appraisal system and policies and measures (Evans, 1990). Leadership: Employees look for continuous guidance and instructions from their superiors to make sure that their work is in alignment with the goals and objectives of the hospital. HR manager would make sure that the employees are fully aware of their job profile and expected results through intensive planning and organizing. Their involvement in the decision making process ensures that the hospital’s planning, budgeting and organizing considers the issues and concerns raised by the employees. Thus, an HR ensures that there is continuous involvement of stakeholders in the decision making process (Evans, 1990). Partnership: A hospital must ensure that there is proper planning, organizing and optimum utilization of the resources. Partnership is a way to hold the stakeholders and direct them towards a mon goal and objective of the organization (Evans, 1990). Finance: Employees need motivation in order to increase their work productivity which can be ensured through timely incentives and a properly defined salary structure for an employee. The salary package of an employee must be defined in advance so that he is aware about his benefits which may include education, medical, allowances etc (Evans, 1990). Education: Employees look for their career advancement and growth in an organization. Education would motivate them and would also help to increase the work productivity of a hospital (Evans, 1990). Policy: An organization must have effective policies to ensure discipline in the system. An employee must abide by the rules and regulations of an organization so as to align with the goals and objectives of the hospital (Evans, 1990). Thus, a sustainable framework can be ensured through following approaches: A sustainable HRM model would involve four steps which are as follows: Purpose: The purpose is analyse the current situation which can be done through various methods such as taking feedback from the stakeholders, reviewing the records and documents etc. In the case study, CEO must identify the key stakeholders first and then analyse the plete situation through the inputs received from the stakeholders (Savage, Fottler & Khatri, 2010). The process can be carried out through a meeting with the key stakeholders, reviewing the existing HR documents which can be collected from HR consultant and payroll manager. This would help in identifying the root cause of the problem (Savage, Fottler & Khatri, 2010). Purpose: Once the inputs have been received from the previous step, this step would define the actions required to be taken. This would be carried out through prioritizing the actions which are necessary in the current scenario. The planning would involve cost calculation for the implementation of those actions and the consequences the actions would have on the hospital (Savage, Fottler & Khatri, 2010). Purpose: The most critical part of building HRM model is the execution of the planned layout and most of the organizations fail at the execution level. Thus, a leader must ensure that the roles and responsibilities are properly allocated to the respective departments and employees so as to ensure that an effective implementation is being carried out (Savage, Fottler & Khatri, 2010). Thus, the phase would involve planning the execution though funding, allocating the responsibilities and budget planning for the action plan. Purpose: It is very important to measure the success of plan that has been executed and evaluate the process of implementation. Monitoring and controlling helps to determine the milestone achieved and helps in future planning (Savage, Fottler & Khatri, 2010). The process involves analyzing the key stakeholders who would decide the factors for monitoring and evaluating the execution. The roles and responsibilities of the employees must be clearly defined (Savage, Fottler & Khatri, 2010). Developing a sustainable business model for any organization is a challenging task and requires the contribution of all the stakeholders of an organization. But, once the framework is being developed, it would have great results in terms of employee mitment and improve the service quality of the hospital. Effective munication: munication helps in constant flow of information in an organization. An effective munication is required in an organization to keep the employees updated regarding their roles and responsibilities. The HR manager would ensure an effective munication in the organization (Zelles, 2012). Performance Management: Performance management must be evaluated on a regular basis in an organization. Effective HR policies would help to evaluate the performance of an employee (Niles, 2012). Employment Relations: An organization must ensure that the employees are satisfied with their job role to maintain employment relations. An HR manager acts as an intermediate between the organization and the employee to build trust and loyalty among the employees which helps to increase the work productivity (Zelles, 2012). Thus, a sustainable HRM Model is crucial for an organization to ensure employee mitment and quality services. The r mendations for the CEO of the hospital are as follows: The report has analyzed the case study and the measures required to be taken in order to devise a solution for the same. The discussion has involved the steps that CEO needs to consider to build a sustainable HRM Model for his hospital to improve the quality of the services. Most importantly, a sustainable model requires a great leader, HR management systems, effective HR policies and involvement of key stakeholders in the decision making process. Gardner, M & Palmer, G. (1997). Employment Relations:  Industrial Relations and Human Resource Management in Australia. Melbourne: Macmillan Education AU. Dressler, S. (2004). Strategy, Organization and Performance Management:  From Basics to Best Practices. Sydney: Universal-Publishers. Colbert, B.A. &Kurucz E.C. (2007).Three Conceptions of Triple Bottom Line Business Sustainability and the Role for HRM.Pro-Quest, 30(1), 21-29. Brinkerhoff, D.W. & Goldsmith, A.A. (March 1992). Promoting the sustainability of development institutions: A framework for strategy.World Development, 20(3), 369-383. Hahn, T., Pinkse, J., Preuss, L. (March 2015). Tensions in Corporate Sustainability: Towards an Integrative Framework. Journal of Business Ethics. 127(2), 297-316. Savage, G.T., Fottler, M.D. and Khatri, N. (27 July 2010). Strategic Human Resource Management in Health Care. UK: Emerald Group Publishing. Fried, B., Fottler, M.D. and Johnson, J.A. (2005).Human Resources in Healthcare:  Managing for Success. US: Health Administration Press. Evans, D.W. (1990). People, munication and Organisations. London: Pitman. Anthony, R.J. (2009). Organizations, People & Effective munication:  Most Good and Bad Consequences e Down to People and munication. US: UNIV READERS Holbeche, L & Matthews, G. (2012). Engaged:  Unleashing Your Organization's Potential Through Employee Engagement. US: Wiley. Zelles, R. (2012). Methodologies to measure and define Employee Engagement. Germany: GRIN Verlag. Bridger, E. (2014). Employee Engagement. London: Kogan Page Publishers. Macev, W.H., Schneider, B., Barbera, K.M., & Young, S.A. (2011). Employee Engagement:  Tools for Analysis, Practice, and petitive Advantage. London: John Wiley & Sons. Flynn, W.J., Mathis, R.L., Jackson, J.H., & Valentine,S.R. (2015). Healthcare Human Resource Management. US: Cengage Learning. Wolper, L.F. (2004). Health Care Administration:  Planning, Implementing, and Managing Organized Delivery Systems. Burlington: Jones & Bartlett Learning. Nick, G., Reinhold, G., & Valerie, I. (2005). Managing Health Services. UK: McGraw-Hill Education. Niles, N.J. (2012). Basic Concepts of Health Care Human Resource Management. Burlington: Jones & Bartlett Publishers.

Wednesday, November 20, 2019

Main differences between perfect competition and monopoly market Essay - 2

Main differences between perfect competition and monopoly market structures - Essay Example Additionally, the firms already in perfect competition have no way of exploiting customers, because other firms can entre and compete with them. Furthermore, firms in this market structure have good price information because buyers or consumers have to know the prices so that they can compare with other firms before they buy a product. On the other hand, suppliers have to know the prices so that they can merge them with others (OConnor 2004). Based on the above analysis of firms in perfect competition, the following assumptions can be deduced from the firms. The firms offer homogenous products meaning that products are differentiated in terms of packaging or branding so as to beat competition and stay in business. Buyers and sellers in this market are many, and this means that exit of seller in the market has no effect on the prices. This further indicates that both buyers and sellers have no influence on price hence price is determined by market (Chakra arty 2009). Firms under perfect competition have no influence on the price therefore they are the price takers. Because of existence of many firms in the market each firm charges the price determined by the demand and market supply. In the short-run, firms under perfect competition make supernormal profits or loss. Because of no barriers to entry or exit from market structures under perfect competition, other firms join into the market and if they make losses, firms making losses exit the market. In the long run, due to the many firms that have joined the market influenced by super-normal profits made by other firms, the supply in the market will be more hence supply curve shifts to the right to the point where super-normal profits are no more (Khanna, 2008). Additionally, in the long run supply has more influence on the price than the demand. The first graph represents market of many suppliers and many

Monday, November 18, 2019

Latinos as into the United States Essay Example | Topics and Well Written Essays - 1000 words

Latinos as into the United States - Essay Example Factors driving Mexican migration to the United States in 1848-1945 Mexican revolution in 1910 was the push factor that sparked a large exodus of Mexican laborers to the southwest though this push coincided with a pull force in United State of economic development (Ornelas, 1999). Economic development mainly in California, Arizona and Texas contributed by extensive irrigation system, elaborate transport system and the demand induced by World War 1 (Ornelas, 1999). Social and economic instability in home land caused Mexican laborers to be attracted in United State where unskilled laborers in southwestern industries were paid even five times better compared to similar industries in the home country (Ornelas, 1999), thus higher wage was the attractive pull force to Mexican. According to Ornelas department of labor in 1914 reported that about 8000 aliens mainly of Mexican had entered United State at Eagle pass, Significant northward movement by Mexican laborer began with construction of Mexican railroad connecting United State border towns with Mexico city and greatly increased with completion of construction of rail road in 1980’s (Ornelas,1999) this is because rail road provided the most common mode of transport for Mexican migrant.aso automobile transport provided another means of transport to United State (Ornelas,1999). Due to intensified military operation after the assassination of President Francisco Madero, many people were panic stricken and this lead to expanded dimension of movement across the border and many Mexican ended up in United State (Ornelas, 1999).

Saturday, November 16, 2019

Irony Essay Example for Free

Irony Essay Both â€Å"The Necklace† and â€Å"The Gift of the Magi† have plots that depend in large measure on the use of situational irony to create a surprise ending. â€Å"The Necklace† tells the story of Madame Mathilde Loise, a lowly clerk’s wife, who, in an effort to appear more debonaire than she is, borrows expensive jewels from Madame Jeanne Forestier, a wealthy friend. After the inevitable loss of the jewels, Madame Loisel and her husband secretly replace the jewels. Years later, Madame Loise, now impoverished, encounters Madame Forestier on the streets of Paris and admits to the secret. Madame Forestier, shocked by the change in Loise, explains that the necklace was merely costume jewelry. The situational irony that both the reader and Madame Loise experience simultaneously is the twist, the unexpected turn of events that is both a perfect example of irony and the very element that makes the plot so original and memorable. Similarly, â€Å"The Gift of the Magi† employs irony to provide the unexpected ending. A young couple, barely able to feed and house themselves, sells their most valuable possessions to buy presents for each other. In an ironic catch typical of O’Henry, Della sells her hair to buy a watch fob for Jim, her husband. Jim, in turn has secretly sold his watch to buy the tortoise-shell combs Della dreamed of running through her long, dark hair. The story makes use of both dramatic irony and situational irony to create the literally-doubly ironic ending: both â€Å"sacrifice for each other the greatest treasures of their house. †

Thursday, November 14, 2019

Social Traditions in Medea, The Piano, and The Age of Innocence Essay

Social Traditions in Medea, The Piano, and The Age of Innocence Traditions demonstrate a set of social norms that have been followed and adapted to for an elongated amount of time. In each of the plots, Medea, The Piano, and The Age of Innocence, the standard set by society was broken and the consequences imposed took form in varying degrees and shapes of violence. Whether it was outright murder as in Medea, or a more subtle but intense struggle as in The Age of Innocence, these consequences serve as the community's opinion of this breach of its expectations for its members. All societies have many traditions set up, and each of the characters in the books either plays the role of someone who helps to uphold these traditions by following them and imposing consequences on those who don't, or someone who disregards tradition and attempts to point out its pitfalls and shortcomings in modern society. The first role, the person who reinforces tradition, is generally someone who refuses to think outside the box, or does not like the product of going against the tide. This person is comfortable with the way that society has set itself up as far as social norms and expectations. Edith Wharton's character of Newland Archer describes May Welland's innocence as a "helpless and timorous girlhood...she dropped back into the usual, as a too adventurous child takes refuge in its mother's arms." (Wharton 123) May Welland and her family are quite content living within the boundaries that New York society has erected for them, and they fear the changes and consequenc es of acting otherwise. The adventurous spirit of Newland Archer is dangerous to their precious social norms and unwritten rules for how to conduct oneself in society. Howev... ... when his son learns a story of his relations with Ellen and speaks to him about it many years after (Wharton 41). The lesson that he learns is that society is very concerned with the affairs of its members and even his wife had heard the rumors about the two cousins. While May was busy upholding her traditional role as faithful wife, she also was acting within social norms and ignoring his infatuation with her cousin Ellen, and allowing a facade of a strong marriage to continue. The violence presented in this book, while not as obvious as that in The Piano or Medea, is no less intense. May's innocent look but underlying manipulation of Archer's feelings towards her and his feelings of obligation demonstrate a great struggle between the "innocent" May Welland who looks "blankly at blankness" and the "fiery beauty" of Ellen, and both of their desires for Archer.

Monday, November 11, 2019

Swange Dance

SWANGE DANCE Introduction. Benue State is state of the historic Benue river, a State renowned for the valiancy of its progenitors, a State of notable political gladiators and hardworking people who rightly brand themselves as ‘the food basket of the nation’. Benue is also a State of rich cultures and traditions, as exemplified in the world acclaimed SWANGE DANCE which has brought fame to both the State and the nation. Meaning of Dance Dance is a type of art that generally involves movement of the body, often rhythmic and to music.It is performed in many cultures as a form of emotional expression, social interaction, or exercise, in a spiritual or performance setting, and is sometimes used to express ideas or tell a story. Dance may also be regarded as a form of nonverbal communication between humans or other animals, as in bee dances and behaviour patterns such as a mating dances. Definitions of what constitutes dance can depend on social and cultural norms and aesthetic , artistic and moral sensibilities.Definitions may range from functional movement (such as folk dance) to virtuoso techniques such as ballet. Martial arts kata are often compared to dances, and sports such as gymnastics, figure skating and synchronized swimming are generally thought to incorporate dance. In some cases, the motion of ordinarily inanimate objects may be described as dance (the leaves danced in the wind). History Dance does not leave behind clearly identifiable physical artifacts such as stone tools, hunting implements or cave paintings. It is not possible to say when dance became part of human culture.Joseph Jordania recently suggested that dance, together with rhythmic music and body painting, was designed by the forces of natural selection at the early stage of hominid evolution as a potent tool to put groups of human ancestors in a battle trance, a specific altered state of consciousness. The same could be said of the Swange dance which originated from middle belt of Nigeria, Benue state, among the Tiv, Igala and Idoma people, a locale which is around the River Niger. Swange is a popular social dance of the Tiv people of Benue State in Central Nigeria.It is a dance of fast, slow, rhythmic and undulating movements, expressing youth and vigour. Swange is played at various types of social and religious functions for the enjoyment of the old and the young. The dance is characterized by rhythmic contortion in slow mode & vibrant display, typical of African dance forms. It has wonderful beat and beautiful rhythm. It is heavily percussion- based, aided by a traditional horn (al-gaita), which blows in an unbroken succession for as long as the drumming, Singing and dancing is going on. The dance particularly exhibits fluidity in body movement, which was inspirited by the flow of the River .Sixfootplus had this to say about it â€Å"Swange is the name given to the traditional dance of the Tiv-speaking people of Benue state of Nigeria. The dance is cha racterized by rhythmic contortion in slow mode & vibrant display, typical of African dance forms. It is heavily percussion- based, aided by a traditional horn (al-gaita), which blows in an unbroken succession for as long as the drumming, Singing and dancing is going on. † Some Benue artists mix this dance pattern up with their stage performances to the admiration of their fans; notable amond these are, Zulezoo, Bravo D, Sixfootplus etc.If you have been opportuned to listen to Swange music or watched the Swange dance, let us know what you feel about it. Significance of Swange Dance Swange Dance has been an important part of ceremony, rituals, celebrations and entertainment since before the birth of the earliest human civilizations. [pic] Swange Dance References www. nairaland. com/12749/swange-music-how-see-it http://www. goodlife. com. ng/gltourism. php? gltourism=read&id=164 Joseph Jordania, 2011, Why do People Sing? Music in Human Evolution, Logos, pg. 98-102

Saturday, November 9, 2019

Marketing and Starbucks Essay

1.0 Introduction: The Starbucks Corporation was founded by three entrepreneurs at the place called Seattle in 1971. Initially they were selling of whole bean coffee in one Seattle store and by the year 1982 the business had grown tremendously and has opened five stores selling the coffee beans, a roasting facility, and a wholesale business for local restaurants. When the Starbucks started its business it was only a small retail coffee shop as like the other coffee shops. The main vision of the Starbucks owners was to educate customers about the fine coffees and feel the smell of the Dark roasted coffee, selling just the coffee was not their aim as the coffee was sold in the USA since 1960’s (Starbucks case study). Howard Schultz was recruited as the manager of retail and marketing and it was Howard who brought new ideas to the owners, but he was turned down. Schultz in turn opened his own coffee bar was named Il Giornale in 1986 based on Italian coffee cafes, selling brewed Starbucks coffee. By 1987, Schultz had expanded to three coffee bars and bought Starbucks from the original owners for $4 million and changed the name of his coffee bars from Il Giornale to Starbucks. His intention for the company was to grow slowly with a very solid foundation. For the first two years, Starbucks losses doubled as overhead and operating expenses increased with Starbucks expansion. Schultz stood his ground and did not sacrifice long term integrity and values for short-term profit. By 1991, Starbucks sales increased by 84% and the company were out of debt. Starbucks grew to 20 stores by 1988. By 1996 it grew to 870 stores with plans to open 2000 stores by the year 2000. 2.0 Marketing stategyof Starbuks: Marketing strategy is carrying out segmentation, targeting and positioning. Doing the detailed understanding of the marketplace into strategic decisions and the targeting of appropriate customer groups. This targeting should emphasise on any differential advantages and adopt a suitable positioning within the target segments (Dibb and Simkin, 1996). Starbucks has adopted a Differentiation strategy it is a strategy which seeks to provide product or service that offer benefits and should be different from competitors that are widely valued by customers. The aim this strategy is to achieve advantage by offering better products or services at same or higher price. When Starbucks was launched there were many coffee bars in the United States at that time but Starbucks wanted to stand unique from the others. Marketing has powerful potential to contribute to the highly important aspects of the organisational competitiveness, namely innovation (Kerin, 1992) and competitive analysis (Varadarajan, 1992) and Schulz wanted to innovate and recreate the experience of the Italian coffee bar culture. Starbucks mainly focused on the strategy of new products, a stronger connection with the customers as the Third place and expanding store locations in the United States and abroad. Starbucks has followed the simple STP process (Segmentation, Targeting and Positioning). 2.1 Segmentation: Market Segmentation is a process of dividing a market into distinct groups of buyers with different needs, characteristics, or behaviour that might require separate products or marketing programs is called Market Segmentation (Kotler and Armstrong, 2006). Initially Starbucks was based as a Socio-Economic segmentation base in consumer Markets as it has concentrated on social class particularly the business class people those who are working at the office and wanted to have a cup of coffee with a good atmosphere and facilities. Starbucks also had segmented his market by geographic and demographically by selecting the store location where they can find the educated and coffee lovers (Dibb and Simkin, 1996). 2.2Targeting: After a company has defined market segments, it can enter one or many segments of a given market and should make decision about how many and which customer groups to target (Dibb and Simkin, 1996). Target Marketing is a process of evaluating each market segment’s attractiveness and selecting one or more segments to enter (Kotler and Armstrong, 2006). The concept of target marketing is a logical implication of the basic philosophy of marketing (Lancaster and Massingham, 1993). A company should target segments in which it can profitably generate the greatest customer value and sustain it overtime. Starbucks wanted to develop a reputable relationship with the customers, Most of companies enter in a new market y serving a single segment, and if this proves successful than they add more segments, initially Starbucks did the same thing targeted the parents with the young children and it was hit concept and it has added more segments by including Teenagers and developed its product range also (Kotler and Armstrong, 2006). 2.3 Positioning: Once the company has decided which market segments to enter it should decide what positions it wants to occupy in those segments. Market Positioning is arranging for a product to occupy clear, distinctive, and desirable place relative to competing products in the minds of target customers. A products position is the place that the product occupies relative to competitors in consumers minds. Here in this case the Starbucks has developed a unique market position for their products because if a product is to be exactly same like the others on the market than consumers would have no reason to buy it. Starbucks has positioned themselves in the market as a highly reputed brand (Kotler and Armstrong, 2006). In this case Starbucks has planned his positioning in such a way that it distinguish their products from competing brands and give them the greatest strategic advantage in their target markets. Starbucks has a descriptively simple statement to inspire and nurture the human spirit-â€Å"one person, one cup, and one neighbourhood at a time†. Starbucks positioning strategy was customer base so that it can give the best service more than what the customers expect. Starbucks has gained a competitive advantage over customer satisfaction and employee satisfaction as Starbucks had developed its positioning strategy based on the customer and provided the utmost facility in terms of layout, furniture to the music, and in terms of employee satisfaction Starbucks make employee as a partners and gave them a personal security with a freedom to participate in the every decision of the business and make it successful (Porter & Miller, 1985, Porter, 1998). 3.0 Developing Marketing Mix: One of the major concepts in the modern marketing is once the company has decided its overall marketing strategy than it should plan the details of the marketing mix. â€Å"Marketing mix is the set of controllable, tactical marketing tools (product, price, place, and promotion) that the firm blends to produce the response it wants in the target market† (Kotler and Armstrong, 2006). Starbucks has a made good decisions on marketing mix tools 3.1 Product: â€Å"Product means the goods and services combination the company offers to the target market†. Starbucks has used Brand name, Quality, Variety and Services as their Product tool which can be concluded by this statement, Starbucks with a good Brand name provides best Quality and with the Variety of Products, it has adopted Quality improvement strategy (Kotler and Keller, 2009). Initially Starbucks started with the coffee than it has included non-fat milk, cold blended beverages. Later on stated seasonal offerings such as strawberry and cream Frappuccino, gingerbread latte with some food items like cookies and pastries. Before launching the products Starbucks was getting the approval of the customers. 3.2 Price: â€Å"Price is the amount of money customers have to pay to obtain the product†. Though the Price of the Starbucks was higher than the other coffee shops, the customers were ready to pay the amount because Starbucks has developed a luxurious image with all the facilities inside the store. Starbucks as a good Brand have offered more benefits and facilities and the best quality of products to justify their higher prices (Kotler et al, 2006). 3.3 Distribution and Service: Starbucks has a good distribution channels initially it was selling coffee beans and doing wholesale business for local restaurants. In terms of service and location Starbucks opened the stores in a such a way that it can reach to targeted customers and it has also gave more stress on giving the best customer service by spending a lot of money by training its employees (Starbucks case study). 3.4 Promotion: Starbucks initially did not use the advertising tool for promotion but it was the Public relations and the Personal selling tool that helped the Starbucks to achieve its target

Thursday, November 7, 2019

Copernicus Essays - Copernican Revolution, Ancient Greek Astronomy

Copernicus Essays - Copernican Revolution, Ancient Greek Astronomy Copernicus Nicolas Copernicus Nicolas Copernicus 1473-1543 Physics February 8, 2000 Nicolas Copernicus Nicolas Copernicus 1473-1543 Copernicus was born in Poland in 1473, he started his education at Cracow University. There he studied mathematics and optics. From here he went to Italy, where he was appointed as a canon in the cathedral of Frauenburg, where he spent a comfortable academic life studding. Copernicus had some small hobbies while at the cathedral, he painted, and frequently translated Greek poetry into Latin. One other hobby that just wasn't small enough to be called a hobby to most of us was astronomy. He made investigations quietly and alone, without any help. He observed from a turret on a protective wall around a cathedral, he also looked with his naked eye rather than with a telescope. He was one of the founders of modern astronomy. Copernicus died in 1543 of a cerebral hemorrhage. In 1530 right before Copernicus died he managed to published his work, De Revolutionibus. Which said that the earth rotated on its axis once daily and traveled around the sun once yearly. This might no sound very controversial but at this time the church and its followers believed in the Ptolemiac theory, which stated that the universe was a closed space bounded by a spherical envelope beyond which there was nothing. (Landry 1999) Copernicuss works went against the church, and most scientific beliefs. This may be one reason why Copernicus didnt publish his work until his deathbed. Another reason may be that Copernicus was a huge perfectionist, and continuously redid his works over and over to get them right. (Field 1995) So you can see why Copernicus wasnt in any big rush to have the world know about his theory. On one hand he would cause a Nicolas Copernicus tramoundous stir in the church, and all the scientific community. He wouldve most likely have been fired from the comfortable church position he had for many years, and couldve given him a bad name. If it hadnt been for George Rheticus, a 25-year-old German mathematics professor Copernicuss might have never publiched his work. (Field 1995) Rheticus stayed with Copernicus for two years, and convinced him to release his work. His work the Copernicus's heliostatic cosmology involved giving several distinct motions to the Earth. It was consequently considered implausible by the vast majority of his contemporaries, and by most astronomers and natural philosophers of succeeding generations before the middle of the seventeenth century. Its only defenders included Johannes Kepler (1571 -1630) and Galileo Galilei (1564- 1642). Strong theoretical underpinning for the Copernican theory was provided by Newton's theory of universal gravitation (1687). (Field 1995) So Copernicuss whole argument stated that the planets and the Earth were in orbit around the sun, and the moon was in orbit around the Earth. This is called the The Heliocentric System: Nicolas Copernicus In conclusion Copernicus said that the Sun was the center of the universe, and went against all known knowledge, religion, and teachings. He took all his observations with the naked eye and with no help. Many disregarded his book and his theory, which went against everything that the church believed in. However if it wasnt for Copernicus, modern astronomy would have never made advances as far as it has to today. Copernicuss hard work and strength is why he is one of the most important founders of modern astronomy. Bibliography Field, J. V. (1995 August). Home page. [Online]. [2000, Feb. 8]. Astronomy 161 The Solar System . [Online]. University of Florida. [2000, Feb. 8]. Landry, Peter (1999 June). Home page. [Online]. Dartmouth, Nova Scotia. CANADA. [2000, Feb. 8].

Monday, November 4, 2019

Kings Hard work To Attain Civil Rights Research Paper

Kings Hard work To Attain Civil Rights - Research Paper Example Martin Luther King Jr. is the most important single Civil Rights Movement Activists because of his leadership qualities, activities to attain civil rights and attainments. Leadership Qualities Of Martin Luther King Jr. Martin Luther King Jr. was an exemplary leader of the Civil Rights Movement. During his life, he exhibited five important leadership qualities including faith, honesty, strong cognitive ability, high self-confidence, willpower and social acceptability (Chumach 1). This section will include the summary of the entire research paper including the leadership qualities, the hard work and the attainments of Martin Luther King Jr. Retribution needs to be handed down by the law enforcement agents, who are described as being blandly dispassionate as they inescapable. In some instances, their energy is usually misdirected like the park ranger who denied accessibility to the ginseng plants.

Saturday, November 2, 2019

Economic topic Assignment Example | Topics and Well Written Essays - 1750 words

Economic topic - Assignment Example This paper, therefore, explains the empirical evidence on different roles played by the history and geography on the international finance and how they are inter-connected in improving the investors desires in the market. Over the recent years, geography has been seen as the growing interests of the international finance, particularly, on the studies of using the gravity models. The models were being used to determine the direction of the cross border financial flows and stocks. Using this approach, the bilateral trade in assets is deemed to increase depending with the size of the country and also decline with information asymmetries and transaction costs. This is because they are being captured by geographical distance and the variables relating to it (Portes and Rey, 2005). Furthermore, there has been a lot of empirical work on the gravity but has taken place without a theoretical foundation which can stand firm on the matter of financial holdings for cross-border. Anderson and van Wincoop (2003) gave an analysis that the estimated gravity equations which are not being founded in economic theory can result to biased estimations since some variables are omitted. It also leads to comparatives with an incorrect static analysis which doesn’t consider the general equilibrium effects of changing the cross border barriers. Different sources of literature such as Clemens and Williamson (2004) highlight the important trend and progress of the financial globalization since 1990s although it has not analyzed the historical forces which have influenced the international investment for a longer period of time. The existing literature also doesn’t highlight the applicability and generality over time of the emphasized factors on the standard framework. These shortcomings aroused the interests of writing this paper in order to be addressed accordingly. The paper gives a clear discussion on the issue by estimating the gravity model the international investment u sing an example of information on Us investors’ holdings. The history an effect is being tested through the past holdings influenced the current holdings (Eichengreen and Irwin, 1998). The aspect on how the past investment influences the current investment is through the fixed costs. The empirical evidence and literature theories have shown the permanent impacts on trade patterns as a result of mart penetration. This is due to the fixed costs incurred by firms when entering into the new market which they can’t get when exiting the same market (Dixit, 1989). The passing shocks of literatures can be cumulated to impact a more powerful still which can lead firms to penetrating the market and have the ability to learn more about the market in question thereby, have the advantage of having the initial information of the market. This helps many organizations to analyze the conditions of the current market with the information contained of the past before deciding on which st rategy to be used in penetrating the larger market. In simple terms, the historical theories and literature helps many companies to be prepares on the impacts as many firms have been penetrated in the past. As it is currently penetrating, hence, there