Tuesday, May 26, 2020

Contemporary Marketing Practices Of America s Health Essay

America’s health has taken a disastrous toll in the recent decades, with the rapidly increased popularity of processed convenience foods laden in fat and sugar, along with the correlating rise of obesity, diabetes, and cardiovascular diseases. As of 2010, nearly 70% of adults in America aged 20 or higher are overweight or obese (Ogden et all). Both obesity and diabetes are preventable diseases that result directly from overindulgence and poor nutrition. Contemporary marketing practices, which entail displaying misleading buzzwords on front-of-package food labels, negatively affect consumers’ abilities to make healthy choices. To help reverse this epidemic, it is essential that Americans begin reading labels and educating themselves about the foods they consume. To effectively determine which foods are best for their health, consumers must first understand the information presented on nutrition labels. When viewing a label, the top panel contains information about the se rving size and the number of servings in the container. Serving information is the most important section to regard on the label because all the following information pertains to a single serving of food, not necessarily an entire container. A hypothetical bag of chips may contain 8 grams of fat per serving, which is 12% of the recommended daily fat intake for adults. However, the label claims that there are 12 servings in the bag. Therefore, by a simple calculation, if one consumed the entirety of theShow MoreRelatedThe Theory Of Behavior Exchange Model1307 Words   |  6 Pagesalso birth order, and how it influences the role functions of the family. Classic birth order characteristics clarify that the first, middle, and last borns have traits that explore why they act in certain way. It is worth noting that not all children s traits fit to the classic birth order structure, so some middle children may show characteristics of first borns, thus we studies the reasons of that. The themes of this course taught me that simple things like stories can create a wonderful communicationRead MoreCorruption : A Great Distress Business Industry1681 Words   |  7 Pagesa cost. Corrupt practices in business transactions are a great distress business industry, especially when it becomes the international business market. These corrupt practices include bribery, extortion, lubrication and subordination. Extortion, lubrication and subordination are different variations of bribery. Money in today’s society is what keeps the world running in most cases. Bribery first came about in the fourteenth century by the works of Chaucer and his contemporaries (Quinion, 1). InRead MoreThe Application Of Qr Code1541 Words   |  7 Pagesof QR Code has resulted in a revolutionary change in the marketing management practices. QR code has made it easier for the marketing professionals to sale services by virtually representing the usage, benefits and drawbacks of the service t o the clients (Chitty, Hughes and D Alessandro, 2012). The paper has been developed to discuss the potential application of QR Code in service marketing and discuss several factors using various marketing theories and principles. Finally, the paper discusses theRead MoreComparative Human Resource Analysis : Coca Cola And Pepsico1465 Words   |  6 PagesConcerning Employees.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...5 4. Human Relations Discussion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..6 5. Conclusions†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 6. References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 Comparative Human Resource Analysis: Coca-Cola v/s PepsiCo. INTRODUCTION Human Resources constitute as one of the most imperative components of any organization, be it small scale business or a large conglomerate. Some of the key functions of the Human Resources Management team comprise of recruitingRead More Health Hoax By Fast Food Companies Essay1469 Words   |  6 PagesFor decades the Fast-food industry has supplied Americans with tasty, comforting food, quickly and for a low cost. It was not until recently, when the health craze first hit America in the late 1980’s that the corporations developed a new approach to marketing their food products to fit their customer’s wants. Even the most common fast food chains, such as McDonalds and Subway started advertising â€Å"healthier† food items on their menus to continue appealing to the general public. While fast food restaurantsRead MoreEssay about The Fast Food Health Scam 1564 Words   |  7 PagesFor decades the Fast-food industry has supplied Americans with tasty, comforting fo od, quickly and at a low cost. It was not until recently, when the health craze first hit America in the late 1980’s that the corporations developed a new approach to marketing health food products to fit their customer’s wants (Nielsen). The most common fast food chains, such as McDonalds and Subway, started advertising â€Å"healthier† food items on their menus to continue appealing to the general public. While fastRead MoreFood and Culture Essays1398 Words   |  6 Pages1 The traditional and contemporary food habits of African Americans compared with the typical American majority diet Introduction I have chosen to write on African American food habits because I believe their food tells a story of endurance and adaptability during hard times. I’ve heard the word ‘soul food’ bandied about without actually knowing what the essence of it was. I would like to see what it’s unique features are and to know more about the possible cultural, social and other factors thatRead MoreMarket Segmentation in Hospitality Research6132 Words   |  25 Pagesresearch published between 1990 and 1998. The literature is divided into three sections: segmenting a market; market targeting and marketing positioning. Identiï ¬ es new areas for research, deeper examination of segments, identiï ¬ cation of difference between markets, and more segments. Introduction â€Å"One of the most important strategic concepts contributed by the marketing discipline to business ï ¬ rms and other types of organizations is that of market segmentation† (Myers, 1996). Segmentation involvesRead MoreMarketing Strategy for Oral Hygine Product6948 Words   |  28 PagesMarketing Strategy MKT306 Assignment July 2010 University of Sunderland, UK Joey Kwan Lay Kuan Student ID: 089111572 Table of Content Assignment Questions 1 Abbreviations Report 1.0 Executive Summary 2 3 4 2.0 Terms of Reference 3.0 Corporate Objective 4.0 Situational Analysis 4.1 Industry Analysis 4.2 SWOT Analysis 4.3 Competitive Advantage and Core Competencies 5.0 Recommendations 5.1 Segmentation Targeting and Positioning 5.2 Marketing Objectives and Goals 5.3 Marketing StrategiesRead MoreWesternization Vs. Eating Disorders1645 Words   |  7 PagesHistorically, through an array of cultures worldwide, individuals have transformed their appearances in order to conform to the beauty ideal of relevant culture. Those that are apart of the Pa Dong Tribe, which reside among the boarder of Thailand, practice the elongating of the neck through the use of brass rings. African and Amazonian tribes consider beauty through the stretching of their lips that is achieved using large lip plates. Tribes in Africa strive to achieve a larger body weight by eating

Wednesday, May 6, 2020

Female Youth And The Juvenile System Essay - 903 Words

Females in the Juvenile System In beginning my research on females in the juvenile justice system, I was shocked to see how many of the new female juvenile statistics had increased and were gradually catching up on the juvenile male statistics. The numbers have been growing every year, and may soon surpass the numbers the boys have held for so many years. It makes me sit back and wonder what in the world is going on with our female youth in today’s society to cause such a slight, in some cases, to drastic increase depending on the offense. In this research paper, I want to examine the statistics for female youth over the last ten years to discuss what offenses are increasing over others, investigate the reasoning behind this increase in order to try and understand where these teens are â€Å"coming from†, and if there is a way for our society to be proactive in our female youths lives in order to prevent them from entering the juvenile justice system and one day adult p rison. Female youth, under the age of 18, encompass one of the fastest growing divisions in the juvenile justice system. In past years, female youth arrests accounted for 670,800 arrests, or a total of 27%, during 1999. During 1990 and 1999, their arrests increased over males in most offense categories and overall increased 83%. In 2006, the FBI statistics indicated that aggravated assaults decreased for both boys and girls, but in the category of simple assaults, boys again decreased but shockingly the girl’sShow MoreRelatedCrime Statistics And Juvenile Crime951 Words   |  4 PagesJuvenile Crime Statistics The paper will focus and highlight some details of the statistics of juvenile crime statistics and juvenile crime itself. Is an aim to evaluate the reduction in national juvenile arrest, narcotics offenses, minor assaults, and the allegations regarding minor females, with the incousion of ethnic and racial classes. Additionally, data will be shown on the increase in arrest for minor females, the contrast in decrease for their male delinquent counterparts and voilent crimesRead MoreJuvenile Offenders And The Criminal Justice System1307 Words   |  6 Pagesâ€Å"The behavior of a repeat or habitual criminal.† Juvenile offenders are studied on the re-offense that will occur and it is said that from 70% to 90% of offenders will re-offend. In the light of the criminal justice system and recidivism there is not actual consensus on what a criminal recidivism counts as, for example whether it counts as a repeat probation violation. National data that exist proves that 6 out of 10 j uveniles return to juvenile court before their 18th birthday. You have to wonderRead MoreThe General Strain Theory Of Female Delinquency1253 Words   |  6 PagesA major theory used to explain female delinquency is the general strain theory (GST). According to Bartollas, â€Å"GST explains female delinquency by contending that many females experience harsh discipline, parental rejection, peer abuse, negative secondary school experience, homelessness, and a strong need for money;† these strains can cause females to cope through delinquent behavior (73). The social learning theory also explains female delinquency as â€Å"some females tend to associate with others whoRead MoreJuvenile Crime Statistics Essay931 Words   |  4 PagesJuvenile Crime Statistics William Scott Bennett CJA/374 September 24, 2012 LeDetra C. Jones Juvenile Arrests 2008 Data is collected by law enforcement agencies within the United States and submitted to the Federal Bureau of Investigations for tracking purposes. These numbers are used by analysts at the FBI to indicate trends in crime and to possibly develop alternative policing methods. A statistician can manipulate numbers to show what they feel is relevant, but aside fromRead MoreThe Juvenile Justice System788 Words   |  3 Pages The juvenile justice system was founded with the goal to serve the best interests of the child, with an understanding that youth possessed different needs than adults. Over the course of our semester we have come across various research studies that proves that the adult system is not well equipped to house and rehabilitate the delinquents. These studies have shown that more juveniles that are transferred to the criminal justice system ends up back in the system, which means the recidivism rateRead MoreCommunity Based Treatments704 Words   |  3 PagesCOMMUNITY-BASED TREATMENTS Sometimes when a juvenile is charged with a crime there are options available to them that does not include jail time. One option is community-based treatments, community-based treatments refers to efforts to provide care, protection, and treatment for juveniles that are in need. The two community-based treatments that I will focus on are probation and electronic monitoring. Probation is non-punitive legal dispositions for delinquent youths, emphasizing treatment without incarcerationRead MoreThe High Incarceration Rate Of Juveniles1748 Words   |  7 PagesThe high incarceration rate of juveniles is a significant social problem that affects society as a whole as well as the youth’s individual welfare and developmental trajectory. Adolescents who are incarcerated in the juvenile justice system face a multitude of negative lifelong implications. The history of incarcerating youth in residential facilities such as juvenile halls, camps, ranches or group homes as a consequence for committing crimes has a deep-rooted history in the United States. â€Å"For moreRead MoreGender Differences Within Juvenile Status Offenses1650 Words   |  7 Pages Gender Differences Within Juvenile Status Offenses University of Utah Rachel Brough Juvenile status offenses are minor offenses that only apply to those under the age of 18 such as skipping school or running away from home. Other examples include curfew violations, possession and consumption of alcohol, and possession and use of tobacco. Theories such as the labeling theory and Robert Agnew’s General Strain Theory attempt to explain why females commit juvenile status offenses. Additional theoriesRead MoreJuvenile Crimes And Juvenile Crime1620 Words   |  7 PagesJuvenile Crimes Juvenile crime occurs when a person violates the criminal law under the age of majority (in most states it’s 18). The juvenile system is way different than the adult system. When a juvenile commits a crime there are legal consequences for their actions depending on what he/she did. Sometimes the system can put them in rehabilitation or a detention center. If the offense is minor, the juvenile could be released to the custody of a parent or legal guardian. In the United StatesRead MoreThe Development Of A Juvenile Criminal Justice System1740 Words   |  7 PagesStates of America, crime rates among the youth under the age of 18 years have significantly increased. This phenomenon is attributed to various factors, among them being family disintegration, school dropouts and other antisocial behaviors. Therefore, the development of a juvenile criminal justice system was crucial as it is tailored to distinguish the judicial process related to juvenile crimes. Various facilit ies such as specialized detention centers and youth centers are also put in place in order

Tuesday, May 5, 2020

Computer Crime Theft of Unprotected Data

Question: Discuss about theComputer Crime for Theft of Unprotected Data. Answer: Introduction: The essay depicts the importance of data security in Information System (IS) in terms of ethical dilemma. Nowadays, the rate of computer crime is increasing at a rapid manner (Cameron 2013). In order to reduce the rate of crime certain sophisticated methodologies are needed to be adopted. Generally, unauthorized and unauthenticated users steal the unprotected data without the permission of the owner of the data. The aim of the essay is to frame different ethical issues that might occur in cyber crime and their mitigation techniques. The objective is to set an ethical as well as moral circumstance in computing technology. In other words, each and everything that opposed to public policy against the public welfare may disturb the public tranquility will be mentioned in this essay. From the above discussion two major hypotheses can be stated Hypothesis 1: Cyber attack is an offensive approach and Hypothesis 2: Active and defensive tools are needed to be acquired to remove the security oriented issues. Immediate access of protected data can be done with the help of encryption key (Campbell, Nelson and Simek 2015). However, if the data are not protected then those data can be easily theft by the hackers. Nowadays, this is termed as major issue in the field of computer study (Shimonski 2014). If a data owner does not protect its data then it does not mean that, the data can be theft by any unauthorized person. If the data steals by someone then, that will be an issue from the ethical perspective. Additionally, from the security aspect it can be said that the owner of the data should make keep his data protected with certain encryption key. The key must not be shared or public key all the time rather they should use private key for their data security. Computer Crime: Theft of Unprotected Data The first hypothesis states that, cyber attack is an offensive approach that means stealing someones data without permission is not correct from the ethical perspective (Brumen et al. 2013). There are many reasons behind this statement. In case of cyber attacks, it generally targets big organizations and sometimes, someones personal data such as banking details and personal details (Slusky and Goodrich 2016). Not only this but also infrastructures, computer networking system, and personal data can also get theft by the virus attacks or worm attacks. In viral attacks, personal device can also get corrupted. The cyber attack can be ranges from the installation of spyware on the personal computer to spoil the complete infrastructure of the device. From the demonstration of worm recently cyber attack has become too sophisticated and dangerous (Tajpour, Ibrahim and Zamani 2013). There are basically, three factors such as fear factor, vulnerability factor and spectacular factor that contri bute in cyber attacks. While analysing the reasons behind cyber attack it can be stated that, it causes fear factors within groups and organizations. Attackers create frequent interruption in personal data of the users. It causes deliberate exploitation of computer information system. In technology department and enterprises cyber attacks uses malicious code to alter computer code, logic and data to disrupt the consequences of the system (Muthama 2013). Cyber attacks influences many consequences such as theft of identity, fraud and exploitation, snooping and spoofing. Denial of service is another form of cyber attack that socially and politically motivates attackers to carry out the fears. Cyber attacks generally targets the common public, national and corporate organizations. The main reason of cyber attack is to steal ones data, for personal uses or sometimes for different misuse. The personal or banking details of the users are getting theft by the attackers and they misuse it. From recent news, that to ok place in the year of 2013 in New York, is named as crypto wall 2.0 (Rose 2014). In that case, an attacker attacks a particular website with certain virus attacks and the users personal files and images get corrupted for that virus (Schia 2016). Not only this but also, those files get corrupted by the attackers private key. The encryption key used by the attackers is not a shared one and therefore, in order to retrieve the data that particular key cannot be used by the victim at the same time. Additionally, it came to focus that the victim cannot fetch the corrupted files without any payment of bit coins. A similar case was found on the same year in Germany also (Choi, Scott and LeClair 2016). Where, the victim had to pay bit coins to decrypt the data encrypted by the hackers. The victim of the attack denied to pay the coins and the amount became doubled after a week. These situations are completely unethical as a hacker do not have the permission to steal someones personal data w ithout his or her permission. The second hypothesis states that active and defensive tools are needed to be acquired to reduce the security and ethical issues. Several tools are utilized by technology users and organizations to remove the ethical issues. Top 10 tools are used to reduce the rate of computer crime and ethical issues. According to Slusky and Goodrich (2016) information is a power which is certainly true when it comes to cyber crime. Unauthorized access to personal information gives a power to the hackers to tap into the personal account of the user. Additionally, through personal computer information hacking one can steal the banking details and accordingly can transact money without the permission of the users (Pfleeger and Pfleeger 2012). These issues can be resolved by adopting some tools. Hackers are not the only one who gains power from the information, whereas, prevention of hacking is another part of education that helps the victims to keep their data secured from the attackers. Another tool that can be used by the victims is known as firewall. Firewall is capable to monitor the traffic between devices and the network systems. Firewall keeps a system defensive more than a common one (Reyns and Henson 2015). If over any instant messenger a user is chatting or sending electronic mail to someone then that time, password and user identity keep the system secured from unauthorized users. The users should use strong passwords so that the data cannot get decrypt easily by the hackers. Again, comprehensive security software, updated operating system, safe network and secured control panel should be incorporated by the users devices. The study of technology and computer systems hackers expands their mind in a broad range (Eck and Weisburd 2015). There is always a contradiction on the term hacking as it is glorified and at the same time it is undetermined by the common medium. In some cases it has been found that hackers help to detect the location of the criminals with the help of their hacking technology and software. Many ethical dilemma related to cyberage are evolving nowadays at a huge rate (Brumen et al. 2013). The right of the society to the security and the exploitation of personal information is another ethical issue. Hacking is termed as a brand of disobedience that expresses dissatisfaction within the system. Hacking helps to monitor illegal attacks also. Apart from this, the wide range of growth of the internet services computer security has become a major concern from the government and business perspectives (Masum, Ullah and Azad 2015). It has come to focus that professional ethical hackers possess variety of skills to complete the trustworthiness and security within the organizations. Schia (2016) stated that, the need for information security practices is enhancing with each security breach. In order to reduce the rate of cyber attack hacking can be reversibly used by the organizations and computer users. The major challenges for the businesses are a complexity of security requirement due to the rapid changes of hacking technologies. The code of the ethics generated by Australian Computer Society are- the primacy of public interest, professionalism, enhancement of quality of life, competencies, honesty and professional development (Shevchuk and Voronyak 2014). Conclusion From the overall discussion it can be concluded that, computer crime and theft of unprotected date is a major ethical issues nowadays growing in a rapid manner throughout the world. In order to reduce the rate of this problem several tools are adopting by different organizations and users. In this essay the hypothesis stated above mentioned that one of the most recent basis offensive approaches is cyber attack. Another hypothesis states that, active and defensive tools are required to be adopted by the organizations and other computer users to protect different crucial data. The essay also elaborated the clear explanation of the issues and one objection to computer crime that is theft of unprotected data. How ethical hacking helps to determine track criminals are also mentioned here. Apart from this, code of conducts generated by Australian Computer Society is also mentioned in this essay including the beneficial perspectives of Ethical hacking. The essay depicted that, in computer c rime theft of unprotected data is one of the major issues References Brumen, B., HeriÄ ko, M., SevÄ nikar, A., Zavrnik, J. and Hlbl, M., 2013. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?.Journal of medical Internet research,15(12). Cameron, P., 2013. Cyberlaw Linguistics-Referents to Techniques, Places, and Identity of Cybercrimes and Cyberattacks Under International Law. InProceedings of The 2 nd International Conference on Law, Language and Discourse: Multiculturalism, Multimodality and Multidimensionality(p. 217). Campbell, R., Nelson, S.D. and Simek, J.W., 2015. A Primer on Cyber Dangers and How to Avoid Them. Choi, K.S., Scott, T.M. and LeClair, D.P., 2016. Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory.International Journal of Forensic Science Pathology. Eck, J.E. and Weisburd, D.L., 2015. Crime places in crime theory.Crime and place: Crime prevention studies,4. Masum, A.K.M., Ullah, M.C. and Azad, M.A.K., 2015. Information Technology (IT) Ethics in the Light of Islam.IIUC Studies,9, pp.243-260. Muthama, M.N., 2013. Regulation on access to Internet: Problems and solutions.Journal of Theoretical and Applied Information Technology,54(3), pp.453-459. Pfleeger, C.P. and Pfleeger, S.L., 2012.Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall Professional. Reyns, B.W. and Henson, B., 2015. The Thief With a Thousand Faces and the Victim With None Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory.International journal of offender therapy and comparative criminology, p.0306624X15572861. Rose, R., 2014. IA2Private Sector- Public SectorCybersecurity: Privacy and Regulation. Schia, N.N., 2016. Teach a person how to surf: Cyber security as development assistance. Shevchuk, I.S. and Voronyak, L.Y., 2014. Problems of Computer-Based Crimes.à Ã‚ Ãƒ Ã… ¡Ãƒ Ã‚ ¢Ãƒ Ã‚ £Ãƒ Ã‚ Ãƒ Ã¢â‚¬ ºÃƒ Ã‚ ¬Ãƒ Ã‚ Ãƒ Ã¢â‚¬   à Ã… ¸Ãƒ Ã‚  Ãƒ Ã… ¾Ãƒ Ã¢â‚¬ËœÃƒ Ã¢â‚¬ ºÃƒ Ã¢â‚¬ ¢Ãƒ Ã…“à Ã‹Å" à Ã‚ ¤Ãƒ Ã¢â‚¬  Ãƒ Ã¢â‚¬â€Ãƒ Ã‹Å"à Ã… ¡Ãƒ Ã‹Å", à Ã…“à Ã‚ Ãƒ Ã‚ ¢Ãƒ Ã¢â‚¬ ¢Ãƒ Ã…“à Ã‚ Ãƒ Ã‚ ¢Ãƒ Ã‹Å"à Ã… ¡Ãƒ Ã‹Å" à Ã‚ ¢Ãƒ Ã‚  à Ã¢â‚¬  Ãƒ Ã‚ Ãƒ Ã‚ ¤Ãƒ Ã… ¾Ãƒ Ã‚  Ãƒ Ã…“à Ã‚ Ãƒ Ã‚ ¢Ãƒ Ã‹Å"à Ã… ¡Ãƒ Ã‹Å", p.46. Shimonski, R., 2014.Cyber Reconnaissance, Surveillance and Defense. Syngress. Slusky, L. and Goodrich, J.A., 2016, June. Human Factors of Cybersecurity Awareness. InEdMedia: World Conference on Educational Media and Technology(Vol. 2016, No. 1, pp. 430-438). Tajpour, A., Ibrahim, S. and Zamani, M., 2013. Identity Theft Methods and Fraud Types.IJIPM: International Journal of Information Processing and Management.