Thursday, November 28, 2019

Fraud Detection in Banking Transactions free essay sample

The purpose of this document is to detail the description of the Real Time (Active) Fraud Detection in Banking Transactions (FDBT) Project. This document is a key project artifact and is used during the design, construction, and rollout phases. Scope The objective of this project report is to capture the functional and non-functional requirements for the Real Time FDBT project. This report lists out the complete system requirements and design architecture of the project. The requirements contained herein will include, but not be limited to: Capabilities or system functionality – What a system does, to include, but not be limited to: Interfaces (internal and external hardware) Business Rules Data source and destination Exact sequence of operations and the algorithms used in those operations Triggers or stimuli to initiate operations or to force a change in state Error handling, recovery and responses to abnormal situations Validity checks Input/output sequences and conversion algorithms Frequency of use and update Constraints- Limitation imposed on the solution by circumstance, force or compulsion to include, but not be limited to: Design constraints based on TrinucInc IT Standards Control and Governance constraints (internal and external) Non-functional requirements to include, but not be limited to: Performance Requirements, Usability Quality Requirements (audibility, reliability, maintainability, etc. We will write a custom essay sample on Fraud Detection in Banking Transactions or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page ) Business Continuity, Operational Support Security and Control and Training Introduction Background According to the National Check Fraud Center in Charleston, South Carolina, bank fraud alone is a $10 billion a year problem. This is nearly 15 times the $65 million taken in bank robberies annually. The Concise Oxford Dictionary defines fraud as ‘criminal deception; the use of false representations to gain an unjust advantage. Fraud is as old as humanity itself, and can take an unlimited variety of different forms. However, in recent years, the development of new technologies (which have made it easier for us to communicate and helped increase our spending power) has also provided yet further ways in which criminals may commit fraud. As fraud attempts grow in both number and variety, financial institutions are challenged with the need for comprehensive, yet cost effective, risk management solutions. It is our belief that these fraudulent or suspicious financial transactions can be identified, characterized and red-flagged in real-time providing vital information to reduce their occurrences. For e. g. a check deposit followed almost immediately by a cash withdrawal would be a suspicious activity and warrant a red flag to check the customer’s motives. Banking databases with all the transaction information is readily available. We use this information coupled with our business logic to detect fraud and to develop the real time fault detector. Types of bank/financial frauds Check fraud New Account fraud Identity fraud Credit/Debit card fraud ATM transaction fraud Wire fraud Loan fraud Research The research regarding the project was done two fold – Business Issues and Technical research. First step was to identify the various ways in which bank fraud occurs and come up with common sense solutions to them based on our technical knowledge base. Next was to come up with the software architecture with technical decisions on choice of RDBMS, ETL tool and OLAP tool. Business Issues Detailed list of ways fraud occurs and activities that could red flag the transaction as suspicious are (Note: Activities generally pertain to personal banking and not corporate accounts): If check deposit is closely followed by cash withdrawal within say 10 hrs. If transaction type is above a specified number in 48 hours. If active more than one session at the same time. If trying to withdraw more money than the limit in credit. If trying to withdraw more money than the amount in debit. If trying to log on for more than 3 times at once. If any transaction is more than 80% credit limit in 48 hours (one transaction or sum or transactions in the 48 hour period). Deposit activity out of the normal range for any account Invalid Routing Transit numbers Excessive numbers of deposited items Total deposit amounts greater than average Large deposited items masked by smaller deposit transactions The amount xceeds the historical average deposit amount by more than a specified percentage A duplicate deposit is detected Deposited checks contain invalid routing or transit numbers The level of risk can be managed based on the age of the account (closed account getting lot of transactions suddenly). The number of deposits exceed the normal activity by the customer Consider the proximity of the customer’s residence or place of business Wire transfers, letters o f credit, and non-customer transactions, such as funds transfers, should be compared with the OFAC lists before being conducted. A customer’s home/business telephone is disconnected. A customer makes frequent or large transactions and has no record of past or present employment experience. A customer uses the automated teller machine to make several bank deposits below a specified threshold. Wire transfer activity to/from a financial secrecy haven, or high-risk geographic location without an apparent business reason, or when it is inconsistent with the customer’s business or history. Many small, incoming wire transfers of funds received, or deposits made using checks and money orders. Almost immediately, all or most are wired to another city or country in a manner inconsistent with the customer’s business or history. Large incoming wire transfers on behalf of a foreign client with little or no explicit reason. Wire activity that is unexplained, repetitive, or shows unusual patterns. Payments or receipts with no apparent links to legitimate contracts, goods, or services. A customer who purchases a number of cashier’s checks, money orders, or traveler’s checks for large amounts under a specified threshold. Money orders deposited by mail, which are numbered sequentially or have unusual symbols or stamps on them. Suspicious movements of funds from one bank into another, then back into the first bank: 1) purchasing cashier’s checks from bank A; 2) opening up a checking account at bank B; 3) depositing the cashier’s checks into a checking account at bank B; and, 4) wire transferring the funds from the checking account at bank B into an account at bank A. A rapid increase in the size and frequency of cash deposits with no corresponding increase in non-cash deposits Significant turnover in large denomination bills that would appear uncharacteristic given the bank’s location Different banks take different actions when confronted by a fraudulent transaction. The following table describes some of the actions taken by the bank and an ID no. is assigned to each: Bank Action Identification Number Freeze Account – No future transactions 8 Deny transaction 7 Teller warning – confirmed fraud, call security e. g. blacklisted check 6 Teller warning – double check ID, customer has bad history 5 Teller warning – call person from whom check originated. (Large check amt. †¦) 4 Deny ATM/online banking access 3 Reduce line of credit 2 Report to collection agency 1 We further generate a table to assign risk ranks for the various fraud detection rules along with the various dependant transaction parameters: Fraud Activity Description Dependant Parameters Business/Detection Rule Activity scale No. If any transaction(s) is more than 80% credit limit in 48 hours Old amount, requested amount(sum of amounts) Requested amount ? 0. 8 old amount 4 If transaction type is more than †¦types in 48 hours Type of transaction Count of number of similar transaction in specified time span 4 If active more than one session at the same time Transaction time Same transaction times 6 If trying to withdraw more money than the limit in credit Line of credit, requested amount Difference of LOC – Requested amt ? 0 7 If trying to log on for more than 3 times at once. Transaction time Same transaction times 6 Check deposit closely followed by cash withdrawal Transaction time, transaction type Transaction times of deposit and withdrawal ? 10 hrs 6 . . . This transaction data provided by Teradata acts the input to Ab-Initio where we apply our business rules in the transformation stage and obtain our output, which here would be to red flag the fraudulent transactions. Technical Research Relational Data Base Management System TERADATA Teradata data warehouse brings together all of the obtained data into a single repository for a completely integrated, 360-degree view of the truth. The Teradata Warehouse is a powerful, complete solution that combines Teradatas high-performance parallel database technology, a full suite of data access and management tools, and robust data mining capabilities, world-class scalable hardware, and the most experienced data warehousing consultants. With the Teradata RDBMS, you can access, store, and operate on data using Teradata Structured Query Language (Teradata SQL). Teradata SQL is broadly compatible with IBM and ANSI SQL. The Teradata RDBMS provides†¦ Capacity to hold Terabytes of data. Parallel processing which makes it faster than other relational DB. Parallel Data Extensions (PDE) a software interface layer on top of the operating system that enables RDBMS to operate in parallel env) Single data store and can be accessed from anywhere else. Fault tolerance – automatically detects and corrects any hardware failures. Data integrity –completes the transaction or rolls back to a stable state if a fault occurs. The architecture includes both Symmetric Multi-Processing (SMP) and Massively Parallel Processing (MPP) systems. They communicate thru fast interconnect. BYNET for MPP systems and board less BYNET (Virtual ByNet) for SMP systems. Users of the client system send requests to the Teradata RDBMS through a choice of various supported utilities and interfaces, which are listed below: BTEQ, Teradata SQL Assistant, Teradata WinDDI, Teradata MultiTool, FastExport, FastLoad, MultiLoad, Tpump, Teradata Visual Explain. These benefits have resulted in many Oracle Customers shifting their data warehouses from Oracle to Teradata in the past 3 years. Added to this Teradata provides the ability to Establish a single, centralized data warehouse with direct access by hundreds or even thousands of users across the organization. Integrate data from multiple sources and functional areas using one data model. Handle large and growing data volumes, complexity and number of users without any restructuring and reorganizations. Allow ad hoc, complex queries at any time with no scheduling necessary. The technical prowess has won Teradata, a division of NCR, a customer list of about 650 large companies and government agencies, including Albertsons, FedEx, Ford, the U. S. Postal Service and Wal-Mart. Characteristics of Teradata RDBMS that endeared us to use it in our project are: Extensive customer references. Time to solution is enhanced by Teradata’s flexibility that can be used for rapid initial implementation and ongoing extensions. Teradata can significantly lower total cost of ownership. Teradata Database is supported by an infrastructure of support 24/7/365. As data volume grows so will the system, but the growth is relatively effortless from a hardware and software point of view. More and more users will need access to the data warehouse, but adding them will not impact performance. Teradata’s performance with complex and ad hoc queries is unequaled. Loading and reloading the database is fast and fail safe with Teradata. If the warehouse needs to interface with the mainframe, Teradata offers seamless interoperability. Teradata Database is a mature product first released in 1984 Extraction, Transformation and Loading tool Ab Initio software is an ETL tool for enterprise class, mission critical applications such as data warehousing, batch processing, data movement, data analysis and analytics. Ab Initio helps to build large-scale data processing applications and run them in parallel environments. Ab Initio software consists of two main programs: Co-Operating System, which the system administrator installs on a host UNIX or Windows NT Server, as well as on processing nodes. (The host is also referred to as the control node. ) Graphical Development Environment (GDE) uses graphical components to build applications that transform large amounts of data. Business rules are applied to the datasets in the data transformation step by using the filter by expression component. Characteristics of Ab Initio ETL tool needed for the project are: Parallel data cleansing and validation. Parallel data transformation and filtering. Real time, parallel data capture. High performance analytics. Integration with Teradata RDBMS Integration and parallel execution of fraud detection custom codes. Has volume of 30 terabytes of data. Online Application Processing Tool Erwin is used in the design, generation and maintenance of high-quality, high-performance databases, data warehouses and final reports and graphs. From a logical model of the information requirements and business rules that define the database to a physical model optimized for the specific characteristics of your target database, Erwin helps to visually determine the proper structure, key elements and optimal design for the database. Its breakthrough Complete-Compare technology allows iterative development—keeping the model synchronized with the database at all times. Erwin Data Modeler scales across the enterprise by seamlessly integrating with CA’s Model Manager. This powerful model management system provides an important solution to the security management requirement. By dividing, sharing and reusing designs across different development efforts, modeling productivity can be maximized and corporate standards can be easily established and enforced. System Design and Architecture The data warehouse functional architecture as well as the technical architecture serves as a blueprint for the data warehousing effort. Throughout the project along with the architectural details various issues of fraud detection and some solutions to them with technical details have been discussed. The functional requirements express how the system behaves, focusing on the inputs, outputs and processing details of the system. The technical architecture centralizes the information and proposes how to integrate it. The technical architecture model depicts the overall framework and displays physical and logical interconnections. The technical architecture plan provides further insight on details dictated by the model, some of which were not apparent during previous project phases. The plan shows not only what has to be done, but also gives some indication as to why by its placement in the overall architecture model. The technical architecture model and plan provide two key benefits to the data warehouse project: improved communications and enhanced adaptability. Furthermore, by keeping these documentation items synchronized with project modifications, one has a ready, reliable data warehouse reference source. The data obtained by different financial institutions may vary in their formats and information provided. For the sake of generality and flexibility we use data generated according to the official data architecture standards as presented in the Center for Information Management website. (www. cimu. gov. mt) We will start the description of system design by showing the steps involved in the creation of datasets in Teradata. In our project we use the 6. 1 demo version of Teradata. 1. Start the Teradata Instance from the Windows START menu and selecting the Teradata Service Control icon. Minimize the screen after it says â€Å" Teradata Running† 2. Now Start Teradata SQL Assistant also from the Windows START menu. The above screen pops up. It has Query and History windows that pop up by default. In Query Window, we can write all the queries that we want to run. History Window keeps track of all the queries that we run. 3. Click on the top left most Connect button to connect to an old or create a new database. Fig. 1 Selection of database menu. Here financial database is being selected. We can click on the new button and create a new database too. Fig. The above screen shot is an instance of retrieving the Teradata database. Database specifications are entered. It will then ask for the names of database to be filled and some fields where we can specify the username and password for that particular database that we are about to create. Thus a Teradata database is created. 4. The next step would be to create some tables into this database. We can write a query in the Query Window to create a table. Click on the execute button to run any query. Fig. 3 This screen shot shows how a test table is created with two columns. 5. To see the newly created table click on the top left disconnect button and click the connect button again. Similarly, data can be inserted into in using insert query. Note: If we do right click on the query window, we can see Query Builder. We can use the Query Builder to build all sorts of Queries. Query Builder can be used to extract information from the table. The tables created for this project. They are: customer (customer details) cc_acct (Credit Card Account Details) credit_tran (Credit Card Transaction Details) checking_acct (Checking’s Account Details) checking_tran (Checking’s Transaction Details) avings_acct (Savings Account Details) savings_tran (Savings Transaction Details) accts (Account Types) These tables with the columns are listed below: Fig. 4 Customer details table Fig. 5 Credit card account details table Fig. 6 Credit card transaction details table Fig. 7 Checking account details table Fig. 8 Checking account transaction details table Fig. 9 Savings account details table Fig. 10 Savings account transaction details table Fig. 11 Account details table . . Teradata is also used to further provide the following data (but we do not show their creation or use in this project report): Customer information such as full name, address, SSN, number and types of accounts, credit limit, contact phone numbers etc†¦ Bank information such as bank branches, branch locations, sales representatives etc†¦ 6. Our table creation process in Teradata is now over. We now use the ETL tool Ab-Initio to create the graph implementing our business rules. For the sake of presentation simplicity and project confidentiality, we concentrate only on the following fraud detection rules: Customer transaction is not part of the bank (fake transaction). Customer withdrawals are more than 80% of his balance in the span of 24 hrs. There are basically three components for the creation of graphs in Ab-Initio: Input Component Transform Component Output Component. The next step involves specifying the input component in Ab-Initio. We do this by double clicking the input component and entering the URL path of the input file location and also the record format of the file. Fig. 12 Screen shot of the input component step of the graph creation process. Fig. 13 Screen shot with the view of the record format step. The file what we have used in this example is of size 9,649 KB. 8. We can view the data of the input file by right clicking on the component and selecting the view data option. There are almost 112000 records in this file but for simplicity only 100 records are being viewed. Fig. 14 View of our inputted table 9. Now, we join the input port to the reformat component and the output port of the reformat component to the output port. We can now apply transform on the input file by either selecting the transform option in the parameters tab of the reformat component or by entering the record format in the output component. Fig. 15 Reformatting of input components Fig. 6 Applying transform option in the reformat component In this example the tran_time, channel, tran_code has not been provided to the output port. As a result, the output file won’t have these fields in it after the graph is executed. 10. The next step is to build the graph. Fig. 17 Screen shot of the graph building process 11. Upon successful completion of the graph building process, we can view our output file by opening it in any editor like the Note Pad. Fig. 18 The output file of the Ab-Initio Graph as viewed in Note Pad Fig. 19 Full view of all the datasets in the output file The output file is 8,650 KB. 2. Similarly, a Flat file (any database table) can be read and written or loaded into a Teradata table by following the above-mentioned steps. The config dbc file and the path of the output with the file name is specified. Fig. 20 Transforming of flat file data Thus, data can be loaded to any database table using Ab-Initio. 13. The next step would be to sort the data obtained in the order we want and according to the variable we want and storing them as flat files. This step is basic in most data warehousing steps. We then apply our business rules to the data and obtain our output, which here are the red flags. A detailed description of the steps involved is as follows: F E D C B A Fig. 14: This figure shows how a red flag can be triggered if any customer crosses 80% of its limit in any type of account. Ab-Initio Component to sort the input data on the basis of Cust_ID. This join component joins the sorted inputs of the customer details and it’s account types that he/she has according to the Cust_ID. The customer_details_summary is taken as the normal output from the output port and the unmatched_customer_details and the unmatched_customer_accounts are outputted from the first and second output port. This join function takes care of the business rule to check if the customer really exists or not. This join component has three input ports. The number of input ports can be specified in the count of the parameter tab in the join component. FD file used is a lookup file. IT has weight specified for fraud. With the help of this component, the customer_detailed_summary, unmatched_customer_accounts and the fd file are joined on the basis of Cust_ID. It is a reformat component, which is one of the forms of, transform component. The business rule of putting a red flag for the customers who have crossed their account limit with more than 80% is applied here in the transform function. In this example total of 16 records. The one with flagged is given a weight of 1 and the one without flag as 0. The details of the customers with the fraud detection. FD file is a lookup file that has a column with 1 and 0 which when combined with the customer_detailed_summary on the basis of cust_id helps flagging the customer who crosses more than 80% of their limit. 14. New graph with intention to apply a second business rule: 4 3 1 Fig. 15 This graph shows how the detailed checking transactions of a customer performed within 24 hours can be found out Ab-Initio Component to sort the input data on the basis of Cust_ID. The join component joins the sorted checking_account of customers with the sorted_checking_transactions on the basis of cust_id to get the checking_account_transactions in the normal output port, unused checking_ accounts in the first unused port and the unused_checking_transactions in the second unused port. This join function takes care of the business rule to check if the customer is valid or not. It sorts the output on the basis of the customer_id which is then, Rolled up on the basis of the day to get the transactions performed within 24hours. The reject_rollup_checking is also sent to a reject output port. Thus, all the checking transactions of a customer within 24 hours are calculated. Logical Model – 1 (Erwin) Conclusion In this project we have concentrated on the financial fraud detection in banking transactions. But the generic nature of the project architecture would enable us to use the same software with minor changes to input data, business rules etc. o satisfy the fraud detection in other areas such as company financial bookkeeping, telemarketing, pay-per-calls scam etc. Also in there is a wealth of information that can be inferred form the output of our project. The following are some points for the further scope of our project: How this architecture could be used not only to detect fraud but also to identify target customer groups for marketing. We can als o provide monthly or weekly reports of sensitive and high-risk customers and even ATM and banking locations, which are fraud prone. Improve the overall security standards of the company. Develop a progress report for individual bank branches and identify their individual areas of improvement. References Kimball, R. , Reeves, L. , Ross, M. and Thornthwaite, W. (1998). The Data Warehouse Lifecycle Toolkit, John Wiley Sons, Inc. Silverston, L. , Inmon, W. H. and Graziano, K. (1997). The Data Model Resource Book, John Wiley Sons, Inc. www. teradata. com www. abinitio. com www. ca. com/db www. fraud. org http://teradata. uark. edu/research/

Monday, November 25, 2019

Sample Query Letters

Sample Query Letters Sample Query Letters Sample Query Letters By Maeve Maddox Reader Blaine asks Does anyone out there know of a website or a book with a lot of sample query letters? The question comes just as Im studying this guide to marketing a novel: The Sell Your Novel Tool Kit: Everything You Need to Know About Queries, Synopses, Marketing, and Breaking In by Elizabeth Lyon. The book was recommended to me by a colleague for the very reason that it contains numerous sample fiction queries. Chapter Six defines the query and offers step-by-step instructions for writing one: Queries Defined Lead Model Query Letter Body Closing Style Types and Uses Chapter Seven provides 15 examples of actual letters. Several genres are represented, including Literary Historical Christian Adventure Mystery Suspense Fantasy Romance Childrens 9-12 So far Im finding Lyons book extremely helpful as I prepare to market a mystery novel of my own. When Im ready to do something with one of my non-fiction projects, Ill have a look at her other guide: Nonfiction Book Proposals Anybody Can Write. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Freelance Writing category, check our popular posts, or choose a related post below:Farther vs. FurtherBetween vs. In BetweenDozen: Singular or Plural?

Thursday, November 21, 2019

RyanAir Strategic Management Assignment Example | Topics and Well Written Essays - 3000 words

RyanAir Strategic Management - Assignment Example After the September 11th (9-11) terrorists' attacks on the world trade centre the airline industry has been trying to draw back its customer base. It has slowly regained its pre 9-11 customer levels. Some airlines are recovering from bankruptcies and lay offs within the industry. The airline industry has regained its consideration as the main way of travel for the tourism and business industries. Economic recovery in other industries such as tourism and conference hosting could benefit the airline industry if the industry responds with a marketing campaign promoting air travel to destinations that are popular for tourism and business industries. Post 9-11 the American airline industries recovery was assisted by special payments (bail-outs) from the U.S. government. This greatly affected European Union (EU) airlines. The lowering of ticket prices by the American carriers also affected the EU airline industry. A trans-Atlantic airline pricing agreement helped keep the EU airlines in business. In addition the EU agreed to allow European governments to provide payouts to their airlines (much as the American government did) to help them recover from the 9-11 related industry slowdown (World Airline News, 1). Although the airline industry may have recovered from its 9-11 reaction to the World Trade Centre attacks it is still affected by the ongoing wars in Afghanistan and Iraq. Security within the industry is much higher than pre 9-11 but there still remains the possible threat of another attack using the airlines as a target or tool of the attack. European Union airlines continue to compete with trans-Atlantic airlines from the United States and other North and South American airlines. Tourists are choosing to visit countries they believe "safe" such as England and Ireland rather than Middle Eastern or South West Asian countries. This is good for EU air carriers who benefit greatly by the increase in business. RyanAir's Development (History). Ryanair is an airline that continues to exploit the low cost air industry by providing some of the lowest fares in the industry. Ryanair is purposely modelled after the American airline South West Airlines and uses the no frills approach to providing air transportation. This means no in flight meals or snacks or such (for free). The airline provides basically a seat (or ride) only. Ryanair is headquartered in Dublin Ireland at the Dublin airport. It's only Irish competitor is Aer Lingus which is Ireland's national airline. Ryanair holds a 25% stake in Aer Lingus and makes no secrets about its interest in acquiring Aer Lingus. Ryanair currently has 232 low cost routes across 24 countries. Its reputation in the European Union is as the EU's first

Wednesday, November 20, 2019

Scotland, the Stateless Nation Essay Example | Topics and Well Written Essays - 1750 words

Scotland, the Stateless Nation - Essay Example Many attempted to settle in Central America through the Scottish sponsored Darien project with a hope of establishing the same success as the English. There they were fated to die, abandoned by both the Scottish and English government. The Scottish government and investors lost huge amounts of capital that contributed to the later depression of the 17th Century3. Large numbers of Scotsmen and their lassies relocated to Canada, North American Colonies as well as Australia and New Zealand. The motivation for leaving their homeland varied over the 18th, 19th and first decades of the 20th Century. However, the main causes of this startling Diaspora arose from the blunt fact that Scotland as a nation had lost as a rival to England. This process began much earlier than the era of colonization at least six hundred years earlier. England, the poor leadership from the aristocracy of both lands, the European wars of the 18th Century and the Imperial expansion of Great Britain in the 19th proved the death of the nation of Scotland. The conquest of England by the Normans brought about a six hundred year war between England’s’ new masters and Scotland, which culminated in 1688. Malcolm Canmore, Malcolm III, and William the conqueror hated each other at first sight. However, William the Conqueror forced Malcolm III by the Treaty of Abernathy in 1072 to surrender his son Duncan to the Norman court as a hostage. Malcolm III received in exchange for this fealty land in England4. The very use of hostages was a weakening stratagem because it influenced indirectly and directly the youthful heirs of one’s opponents, in a positive manner, towards the ways of their captor (host). Herein, the English turned the Scottish laird and chieftain to their purposes and ultimately through them destroyed the Scott ish nation. The Normans and the Scots continued in a never-ending battle between each other until after the middle of the 18th century.  

Monday, November 18, 2019

Push and Pull Marketing Essay Example | Topics and Well Written Essays - 1000 words

Push and Pull Marketing - Essay Example Since consumers’ attention is the main aim of communication mediums, communication strategy can be either pull strategy or push strategy. Both approaches are distinct from each other and every organization has to ensure that it plans and executes that strategy which will work for its offering (Hegel III & Brown, 2008). The main difference between push and pull marketing is that pull marketing induces end consumers to create demand, while in push marketing, marketers entice trade buyers to purchase and carry out the products that allows them to reap profit potential benefits (Steglin, 2012). Push Marketing Strategy In push strategy, the primary aim of marketers is to design marketing strategy in a way that will push products onto the consumers. It basically means offering attractive incentives to employees and sales representatives for pushing the product on specific points or places where there are more chances of customers buying products impulsively. In other words, in busin ess to business marketing, it means using marketing mediums to get attention of businesses to buy the supplier’s materials and products and sell it to end consumer. The main forms of communication mediums used are price inducements, promotions, trade shows, trade promotions, sponsorships and many more that will get the attention of retailers, wholesalers and other businesses to purchase the company’s products or services (Segal, 2012). For instance, push marketing strategy is commonly found among energy drinks companies as they try to get the attention of end consumers by organizing various events such as trade shows and promotional incentives. British Petroleum uses push strategy by attracting its customers who are the processors of their products that supply refined products to the end consumers. The company offers various perks, price breaks and discount offers so that it can get the attention of its business consumers. Unilever uses push strategy for its distributo rs, wholesalers and retailers so that it can get good placement for its products in their stores. Pull Marketing Strategy In pull marketing strategy, marketers try to inspire consumers to demand the company’s products or services. In this technique, a lot of money is spent as the tools used to grab customers’ attention are very expensive. The marketers need to incorporate strategies that will help in creating relations with target market and getting them engaged with their offerings. Some of the commonly used marketing mediums for pull strategy are word of mouth, sponsorships, product placement and advertisement in newspapers, on radio and Television (Segal, 2012). For instance, Apple uses pull strategy to attract its target market; it relies heavily on placement of products, Public Relations efforts and advertisements that are innovative and attractive which will help in creating more demand for its products. The company’s advertisements about its computers end with quotes like â€Å"available at specific places† or â€Å"Buy now†. Almost all the advertisements of the company has message that pulls consumers towards it as information about product with complete details are provided. Red Bull also focuses on pull strategy as it sponsors various events round the year such as Formula 1, soap box derby and concerts. With all these communication med

Friday, November 15, 2019

Durkheims Approach to Sociological Analysis

Durkheims Approach to Sociological Analysis Outline the main features of Durkheims approach to sociological analysis, and discuss how this may be used to understand suicide rate. Durkheim was a French positivist, with an emphasis on functionalism, which revolves around a biological analogy where in society, is seen as an organic whole with each component working to maintain the others, similar to the human body. Its main interest is seeing how these parts create a stable whole. One of the main areas of Durkheims approach is the focus on social facts, these are social phenomena and ways of thinking and behaving that restrain individuals in some manner or other and can include institutions such as the state and education. They appear from collectively formed rules and practices, be they religious or secular and are beyond our control as individuals. Because of these social facts individuals have littler or no control over their own actions, rather than constructing their own world they are directed by the system as society needs certain social behaviours and phenomena to survive. These social facts are passed on from generation to generation and shared among the individuals. From this perspective it is not individual will that drives behaviours but rather the common norms and values of society that shape ones consciousness. Not only are these types of behaviour and thinking external to the individual, but they are endued with a compelling and coercive power b y virtue of which, whether he wishes it or not, they impose themselves upon him (Durkheim, 1895 pp50). These social facts form the basis of a collective consciousness, which Durkheim sees as the body of beliefs and sentiments common to the average members of a society (Durkheim, 1893). This collective consciousness promotes solidarity, forging a common bond between individuals in a society, creating a form of order and stability. Without a form of moral consensus there would be conflict and disorder From where interest is the only ruling for each individual finds himself in a state of was with every other (Durkheim, 1973, p89) Since the collective consciousness is a social fact it too constrains individuals to act in terms of the greater good and for the good of the society and is deeply imprinted on the individual as without it there would be no society as we know it. These social facts can have problems if they regulate too much or not enough, without enough control the individual would give in to their own wants and desires, with too much they would feel repressed, inevitably both will lead to deviance, that being going against the norms and values of society. From a collective consciousness come two forms of solidarity, organic and mechanical. Organic solidarity is based upon a dependence that individuals in an advanced society place on each other. It is common among societies where the division of labor is high. Though individuals perform different tasks and often have different values and interests, the order and survival of society depends on their reliance on each other to perform their specific tasks. Mechanical solidarity on the other hand is based upon the similarities among individuals in a society, within it people feel connected through similar work, education and religious practices. It primarily exists in societies that possess a low division of labour where this is little interdependence between individuals and where there is a basic or lack of organisation and compared to societies with organic solidarity there is more value placed on religion, society and its interests and there is a greater collective consciousness and les s emphasise placed on individualism, that being where you count yourself as an individual rather than part of a group, putting yourself first etc (Haralambos 2004 pp). From organic solidarity and individualism can come anomie, this is a sense of normlessness, where norms themselves are unclear, broken down or unregulated If the rules of the conjugal morality lose their authority, and the mutual obligations of husband and wife become less respected, the emotions and appetites ruled by this sector of morality will become unrestricted and uncontained, and accentuated by this very release; powerless to fulfil themselves because they have been freed from all limitations, these emotions will produce a disillusionment which manifests itself visibly(Durkheim, 1972, p. 173) He noted that it was common in societies that possessed a less defined collective consciousness and a higher amount of individualismThe state of anomie is impossible whenever interdependent organs are sufficiently in cont act and sufficiently extensive. If they are close to each other, they are readily aware, in every situation, of the need which they have of one-another, and consequently they have an active and permanent feeling of mutual dependence.(Durkheim, 1895, p184) Imbalances in the amount of regulation caused by social facts and the amount of integration from solidarity are one of the main factors within suicide, less advanced societies having too much integration and regulation and industrial societies have too littler of either. Durkheim said that suicide was a social act, not entirely an individual one revolving around the relationships between the individual and society. He found that there was a correlation between the suicide rate and various social facts. For example he found that suicide rates were higher in protestant countries than catholic ones, he also found that there was a low rate during times of social and political upheaval due to the amount of solidarity that such events creates (Durkheim in Marsh, pp66-69). He laid out four types of suicide, depending on the degree that individuals were involved in society and on the degree that their behaviour was regulated. The four types being egoistic, anomic, altruistic and fatalistic. Egoistic suicide is common in industrial societies with high amounts of division of labour and comes from a high amount of individualism, which stems from a low amount of integration due to a weak collective consciousness from the social groups from which they originally belonged; in effect society allows the individual to escape it In this case the bond attaching man to life relaxes because that attaching himself to society is itself slack (Durkheim in Marsh pp67). This sort of suicide Durkheim said accounted for the differences of suicide rates between Protestants and Catholics, with Catholicisms demanding a higher amount of conformity, in comparison to the Protestant church that encouraged the individual to interpret the religious texts in their own way without stigma. Another type of suicide common in industrial societies is anomic which results from a low amount of regulation. It occurs when norms and values are disrupted by social change, procuring feelings of uncertainty with in the individual. Whenever serious readjustments take place in the social order, whether or not due to a sudden growth or to an unexpected catastrophe, men are more inclined to self destruction (Durkheim in K. Thompson, 1971, pp109) Durkheim found that suicide rates rose during positive as well as negative directions of social change. He noted that there was a rise after the crash of the Paris stock exchange in 1882 and the conquest of Rome in 1870 by Victor-Emmanuel which resulted in rising salaries and living standards but also a rise in the suicide rate. On the opposite side of the spectrum is altruistic suicide that comes from a high amount of integration and strong feeling of society and solid collective consciousness. This form of suicide is mostly present in pre-industrial societies who possess mechanical solidarity. This was seen as a self sacrifice for the good of the group This sacrifice then is imposed by society for social ends (Durkheim in Marsh, pp68). It is not done because it seen as the best option but more out of a sense of duty to said group. For someone to do such an act out of duty then they must have little self worth, the individual being fully submerged into a group and feeling like just a part of a greater thing, thus highly integrated. For society to be able to compel some of its members to kill themselves, the individual personality can have little value. For as soon as the latter begins to form, the right to existence is the first conceded (Ibid, pp68) Various examples of this can be seen throughout history, Vikings considers it dishonourable to die of old age or sickness and so ended their own lives to avoid social disgrace. Durkheim placed no importance on fatalistic suicide, saying that it had more place in history than in modern societies. It occurred when society restricted an individual so much that they were repressed, feeling that they had no futures or dreams. One of the major criticisms of Durkheims analysis is his concepts of integration and regulation. Durkheim gives no hint as to how one would measure integration or regulation for example he simply asks us to assume that such underlying concepts are significant in relation to the explanation of suicide. He assumes that suicidal behavior results from a deviation from normal levels of integration and regulation. We are given no idea what exactly is a normal level, so we cannot say what amount of regulation and integration is normal or abnormal (Web ref 1). However with some work, it could be possible to come up with various test relating to theses concepts, so that we could measure them among different groups in society. A second criticism is that his work on suicide is based upon official statistics from the 19th century He gives us little idea about the reliability of the source of the statistics and the methods used in recording them could not be up to scratch, some could be wrong, s ince they were hand written things could be misread and so on. Another factor is that the determination of suicide involves is process of interpretation by numerous people such as policemen, doctors, coroners etc (Ibid). In this respect, we have no real way of determining either the reliability or validity of suicide statistics. The coroner is the one who decides whether death was due to suicide or not and various factors can sway his judgment towards it not being so. The individuals verdict depends on their outlook on their work and on their outlook on suicide. Some would be thorough in the investigation whilst others would be concerned about not intruding upon the rights and feelings of the surviving relatives. For example if the victim was Catholic, since traditionally the Catholic Church view suicide as a sin, the coroner may well make his decision based on the effect that the stigma that a suicide verdict carries may have on the relatives. It is known that coroners in Catholic countries such as Italy and Mexico are more-reluctant to classify a suspicious death as suicide than coroners in non-Catholic countries. Another fact is that some countries suicide is classified as a crime, in such countries, coroners tend to be more-reluctant to classify a death as suicide than in countries where such a law does not apply, for example when suicide was illegal in Britain the punishment was that deceased property would be ceased by the state, so it would be justifiable to deem a suicide as something else to avert any more tragedy. Also where the victim was insured against death, coroners tend to be less likely to classify death as suicide than in instances where there is none, as such an act can void the coverage. One final criticism is that he does not take into look into individual action as a cause; however he does briefly acknowledge it but claims that it has no part in sociology (Ibid) Bibliography Durkheim, E (1973). Moral Education. Macmillan USA Durkheim, E (1975). On Morality and Society. revised ed. Chicago: Chicago University Press Durkheim, E (1982). The Rules of the Sociological Method. revised ed. London: The Free Press. Durkheim, E (1997). The Division of Labour in Society. revised ed. London: The Free Press Haralambos and Holborn (2004). Sociology themes and perspectives. 6th ed. London: Collin Marsh.I (1998). Classic and Contemporary Readings in Sociology. London: Pretince Hall. Thompson.K and Tunstall.J (1983). Sociological Perspectives. 9th ed. London: Penguin Books

Wednesday, November 13, 2019

Michael Jordan :: Free Essays

Michael Jordan Michael Jordan is an American Professional Basketball Player . I picked Michael for my biography because I consider him to be the best basketball player in the NBA . Michael is recognized for his spectacular ball handling skills and for his outrageous dunks . He is also the leading scorer in the NBA , and a winner of three NBA most valuable player award in 1988,1991, and 1992 . Jordan was born in Brooklyn , New York , and raised in Wilmington , North Carolina . He accepted a basketball scholarship at the University of North Carolina and as a freshman he scored the winning shot in the 1982 NCAA championship game .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In 1984 Jordan led the U.S. basketball team to victory in the Olympics . After that he left college to play for the Chicago Bulls . Jordan was successful as a professional from his first season , Leading the NBA in the 1984-85 season in points scored . He also was named rookie of the year and started in the All Star game .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In the 1986-87 season Jordan became the second player ever to score 3000 points in one season . In the following six seasons he led the NBA in scoring averaging more than 30 points per game . Jordan led the Chicago Bulls to their first NBA championship tittle in 1991, and did it again in 1992 and in 1993 . Jordan retired from basketball in 1994 to play baseball . He only played for about one year but he didn't have what it took to be a baseball player . He came back to play basketball in the middle of the 1995 season to lead the Bulls into the first round of the playoffs where they where beat .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Jordan was the NBA's most valuable player for the 1987- 88 season and again for the 1990-91 and the 1991-92 season . This is the first time a NBA player won for two consecutive seasons .

Monday, November 11, 2019

Richard III: Power of Language and Own Villainy

Deformed in body and twisted in mind, Richard is in every way the dominant character of the play, to the extent that he is both the play’s protagonist and major villain. He is selfish, evil, corrupt, sadistic, and manipulative. His intelligence, political brilliance, and dazzling use of language keeps the audience fascinated and his subjects and rivals under his control. At the beginning of the play, it is made clear to the audience that Richard has no justification for seizing the throne. This is because England is obviously not oppressed or subject to tyranny as the lengthy civil war has just ended, and Richard’s oldest brother, King Edward IV, now sits on the throne. Richard himself, states that ‘All the clouds that loured upon our house’ (1. 1, 3), the house of York, has been dispelled by the ‘son of York’ (1. 1, 2), King Edward IV. However, Richard intends to upset the kingdom by seizing power for himself. He says that ‘since I cannot prove a lover to entertain these fair well-spoken days, I am determined to prove a villain’ (1. , 28). This simply means that since Richard was not made to be a lover, he has no use for peace, and will happily destroy peace with his crimes. This shows Richard’s unabashed enjoyment of his own villainy as he can so blithely toss aside all of the things that the rest of humanity cherishes. Richard III is an intense exploration of the psychology of evil, and that exploration is centred on the workings of Richard’s mind and the methods he uses to manipulate, control, and injure others for his own gain. Perhaps more than any other play by Shakespeare, the audience of Richard III experiences a complex, indefinite, and highly erratic relationship with the main character. Richard is clearly a villain as he declares outright in his very first speech that he intends to stop at nothing to achieve his ultimate goal of becoming king. However, despite his open allegiance to evil, he has such a charismatic and fascinating personality that, for much of the play, we are likely to sympathize with him, or are at least impressed by him. In this way, our relationship with Richard reflects the other characters’ relationships with him, conveying a powerful sense of the force of his personality. Even characters such as Lady Anne, who have an explicit knowledge of his wickedness, overlook his dishonesty and violent behaviour and allow themselves to be seduced by his brilliant wordplay, his skilful argumentation, and his relentless pursuit of his selfish desires. Richard’s long, fascinating soliloquys, in which he outlines his plans and gleefully confesses all his evil thoughts, are central to the audience’s experience of Richard. Shakespeare uses these soliloquys brilliantly to control the audience’s impression of Richard, enabling this manipulative protagonist to work his charm on the audience. In Act I, scene i, for example, Richard offers a pretext for his villainy towards others by pointing out that he is unloved, and that he is unloved because of his physical deformity. Richard himself is brutally honest about his appearance. He admits to being imperfectly shaped and blames premature birth for his condition. He knows that he is ‘not shaped for sportive tricks’ (1. 1, 14) and while others delight in ‘an amorous looking glass’ (1. , 14), his misshapen body creates a ‘shadow in the sun’ (1. 1, 26) that alienates him from others. Hence, Lady Anne calls Richard a ‘lump of foul deformity’ (1. 2, 57) in Act I, scene ii. This proves that Richard’s claim not only makes the other characters of the play seem like the villains for punishing him for his appearance, but also makes it easy for the audience to sympathize with Richard during the first scenes of the play and even hope that he will succeed despite his obvious villainy. It quickly becomes apparent, however, that Richard simply uses his deformity as a tool to gain the sympathy of others, including the audience. This is already noticeable in his very first speech as Richard seems to take a deliberate perverse delight in his outward shape. He chooses words such as, ‘cheated’, ‘deformed’, ‘unfinished’, ‘half made up’, ‘dogs bark’ at him as he passes by because of his ‘deformity’ to describe himself. Richard’s unabashed villainy is a much more natural part of his character than simple bitterness about his ugly body. Nevertheless, he still manages to use speech to win our trust, and he repeats this throughout his struggle to be crowned king. An interesting secondary theme of Richard III is the power of language, or the importance of language in achieving political power. Language may not always be a necessary instrument of power, but for Richard, it is a crucial weapon. As we have seen, it is with his extraordinary skills with words that allows him to ridicule, insult, taunt and deceive all who stand in his way to power. Richard’s skill with language and argument is what enables him to woo Lady Anne, have Clarence thrown in prison and blame the king for Clarence’s death, all at very little risk to himself. In conclusion, I feel Richard III’s unabashed enjoyment of both the power of language and his own villainy makes him a character worthy of both respect and admiration, and therefore I completely agree with this statement. This is because Richard’s unabashed power of language shows off the ingenious wit and intellectual cleverness of the character, actor and playwright, while his own villainy makes the play all the more fascinating and entertaining as his heinous acts become more chilling.

Friday, November 8, 2019

Cell Membrane essays

Cell Membrane essays Cell Membrane/ Electron Transport Chain Biochemical Pathway 1. The cell membrane structure is vital to the life of the cell. The cell membrane is shaped as having a phosphate head at the very outer surface, and two fatty acid tails hanging from it. The membrane is double, so at the tip of the fatty acid tails, there are two more fatty acid tails attached to another phosphate head. This is what it looks like: The reason the cell membrane is shaped like this is mainly to control the water flow in and out of the cell. Water is very important to the cell: if too much water enters the cell, the cell will explode, and if too much water leaves the cell, the cell will shrivel up and die. This is how the cell membrane controls water flow: the phosphate heads are polar, and slightly attract water. However, the fatty acid tails in between are non polar, and repel water, so the fatty acid tails prevent too much water from entering or leaving the cell. With this tough membrane, there has to be a way for things to enter the cell. This is where the channel proteins come in. They act as gateways to the cell. There are many ways to enter the cell. Some ways require energy, while others dont. The ways that require energy are put into a category called active transport, while the ways that dont require energy are put into a category called passive transport. An example of active transp! ort is the proton pump. The proton pump is an integral part of chemiosmosis, and it pumps protons from an area of low concentration to an area of high concentration. This requires energy since things like to move from an area of high concentration to an area of low concentration. An example of passive transport is facilitated diffusion. This is very easy since the particle is moving from an area of high concentration to an area of low concentration and through a channel protein made exactly for its size and shape. 2. These membranes are very importan...

Wednesday, November 6, 2019

Essay on Christian Propaganda

Essay on Christian Propaganda Essay on Christian Propaganda This is a free example essay on Christian Propaganda: Throughout history, the Christian community has used various ploys in order to gain members. In the Ninth Century AD, monks, in England, recorded the folklore of their â€Å"heathen† neighbors in their own language. In the 11th through 18th centuries, in various areas, Catholics used raw torture and death to force conversion. And even today television stations such as PAX â€Å"family programming† is little more than tele-evangelists and trumped up â€Å"miracles.† Two prime examples of the texts written and some what enriched by the monks of England are, of course Beowulf and Judith. While it remains unclear as to exactly who wrote the original manuscripts, it is believed that it was a monk or priest, and it has been widely accepted that these stories were handed down, generation to generation, by oral tradition. The epic poem Beowulf directly precedes Judith in the same manuscript, leading us to believe they were recorded by the same persons, with the same motives. In Beowulf we read of a hero that destroys the enemy of his brethren, Grendel (and Grendel’s mother), believed by some to be the descendant of the biblical Cain, thus ending his lineage; a lineage that has been that of pure evil from the time of Cain’s brother Abel’s murder. Beowulf then leads his people into battle with the dragon, killing both the dragon and himself, much like St. George. In Judith we read of a heroine (interestingly an Israelite) oppressed b y a tyrant, Holofernes. Eventually Judith can take no more, and rises up and smites her oppressor, with, ironically, his own sword. Much as the Hebrews did in Exodus. We then must look at instances such as the various Inquisitions instituted by the Catholic Church for nearly eight centuries, the most commonly known being the Spanish Inquisition. Starting in the mid- 15th century (1478), the Spanish Inquisition was not suppressed until 1834. Over these 356 years hundreds of thousands of heretics, heathens and other â€Å"sacrilegious† persons were tortured and killed by some of the most horrible means possible; all for what they believed, or did not believe, as the case may be. People were hanged, burned at the stake, boiled alive, or worse, for no â€Å"good† reason except they were not Catholic. They were told if they renounced their faith, they would be spared, but as those who did found out, more often than not, they were lied to. As anyone would guess, word of these events traveled rather quickly, and the Catholic population in Spain grew rapidly. So we ask. why did the Inquisition last 356 years? The answer is it did not, at lea st not in practice. Granted there were the fanatics that continued to torture those accused of heresy, but as a whole the practice was discontinued after a relatively short period of time. The institution, however, was not officially suppressed by the Pope until July 15, 1834. If a person were to look at local television listings, the majority of what they would find would pertain to what the American public watches most, drugs, sex, and violence. However, there are a few networks, such as PAX that offer what they call family programming; what I call Propaganda. Over half of their programming consists of tele-evangelists. The network executives, rope in young parents with inoffensive material, hoping that they will watch their network almost exclusively. Before long, the children of these young parents are asking Mom and Dad, why they never go to church. Have they ever seen a miracle? And before you know it, this entire family is going to not only a Sunday worship, but Wednesday evening as well, not to mention the Tuesday-Thursday Bible Study; thus completing this vicious cycle. We have in this country, what is called Separation of Church and State, and freedom of speech. This is why we can turn on our television at five o’clock in the morning and s ee The Reverend Brother What’s his Face. But where does it stop? Will the church ever stop trying to brain wash us â€Å"heathens† into belief? ______________ is a professional essay writing service which can provide high school, college and university students with 100% original custom written essays, research papers, term papers, dissertations, courseworks, homeworks, book reviews, book reports, lab reports, projects, presentations and other assignments of top quality. More than 700 professional Ph.D. and Master’s academic writers. Feel free to order a custom written essay on Christian Propaganda from our professional essay writing service.

Monday, November 4, 2019

Annotated Bibliography. Generation Challenges in the future of nursing Essay

Annotated Bibliography. Generation Challenges in the future of nursing informatics - Essay Example Moreover, the article indicates that they are expected to make a reasonable effort in addressing rising demand for the nursing care services, which are focused on increasing supply of nurses. In this case, the nurses can increase their efficiency in the provision of care through the use of health Information Technology that has been considered a crucial issue through numerous discussions. The article covers issues related to the effect of the health IT and health informatics through an outlook of the nursing profession. In addition, the vendors across the health IT field are urged to facilitate understanding of the nursing profession through gearing them to meet challenges for reforming new era attributed to collaboration in offering health care services. Ball, M.J. (1995). Nursing Informatics: Where caring and technology meet. New York: Spinger-Verlag The book focuses on markets in health care practice and education settings, whereby it aims to address the issues relating to nursing practice and students; in fact, issues discussed relates to nursing leadership, nursing faculty and nursing informatics specialists. Moreover, this book is designed meet the needs of professionals in the health care fields such are quality officers, administrators, health IT professions, who are in the health care facilities. ... /journal_of_nursing/challenges_in_nursing_informatics.htm> The article discusses challenges faced by nurses due to constrains associated with innovation technology. It also seeks to explore ways through which these challenges can be overcome. The article offers nursing documentation, thereby explaining dynamics and complexity of the processes. Moreover, the article focuses on bridging the gaps that are present in the nursing documentation to the electronic record. In addition, there are abilities of nursing students discussed in the article, thereby allowing them to understand challenges, which are involving the constants evolutions of technology. In this case, the article offers relevant issues related to nursing practice in relation to challenges. Kaminski, (2011). Organizational management and generation X. Nursing Informatics. Retrieved on 2 Feb 2012 from The article takes into consideration the challenges and threats that are faced by managers in organizations, whereby this mana ger are classified into echelon of Baby Boomer and senior Silent Generation managers. These challenges are attributed to the emergence of the work force referred to Generation X, who are considered to be offering dynamic solutions to meet the needs of the workforce. The article covers issues related to technological knowledge, thereby facilitating the adaptability to change and diversity. There are other issues discussed in the article relating to sharing of time and downsizing, which have become a challenge to the organization. In this case, the unique brands of workers that are acquiescent to the needs are reflected in various scenes, in the workplace. Ericksen, A. (2009). Informatics: the future of nursing. RN journal. Retrieved on 2

Saturday, November 2, 2019

How SOX (SarbanesOxley Act of 2002) affects corporate governance and Research Paper

How SOX (SarbanesOxley Act of 2002) affects corporate governance and what additional improvements need to be added to SOX to improve corporate governance - Research Paper Example Oxley, thus the act’s nomenclature, and enacted on July 30, the act aimed to regulate and control the corporate and accounting sectors, particularly in the public company boards of management, and the management and public accounting companies (Shakespeare 333). The act goes by several names, considering its purpose. The act was referred to as the Corporate and Auditing Accountability and Responsibility Act when in the house, whereas in the Senate is as per the Public Company Accounting Reform and Investor Protection Act. The SOX (also Sabox) was proposed as an act that would protect investors by ensuring improvements in the corporate disclosures precision and trustworthiness for among other purposes pursuing the securities market and laws. The outcome of the act is sections that dictate the responsibilities expected of a public corporation board of directors, the criminal consequences to various misconduct, and creation of regulations by the Securities Exchange Commission (SEC) on the compliance of public corporations to the act’s laws. The laws of the act are encased in eleven titles under the elements which include the Corporate Responsibility, Public Company Accounting Oversight Board (PCAOB), Corporate and Criminal Fraud Account ability, Auditor Independence, White Collar Crime Penalty Enhancement, Enhanced Financial Disclosures, Studies and Reports, Analyst Conflicts of Interest, Commission Resources and Authority, Corporate Tax Returns, and Corporate Fraud Accountability. The section covers the legal provisions which include disclosure controls (302), Improper influence on conduct of audits (303), disclosures in periodic reports also termed as Off-balance sheet items (401), Smaller public companies (404), criminal penalties for influencing US Agency investigation/proper administration (802), criminal Penalties for CEO/CFO financial statement certification (906), and criminal penalties for retaliation against