Sunday, May 17, 2020

Mexican American Relations Improved Since The Industrial Age

IWA-Mexican American Relations Question: How have Mexican-American relations improved since the industrial age and is it sufficient enough for a functional relationship between cultures? Introduction/Historical Perspective After Mexico gained its independence from Spain, one of its biggest goals was for regional autonomy-politically, socially, and economically. However, its problem at the beginning of its independence in 1821 was that over 60% of its population consisted of indigenous people, all of which would integrate poorly into the influence of the Industrial Revolution. Additionally, after the U.S. Mexican War 1846-1848 (â€Å"Mexican-American War†) Mexico lost over 55% of its national territory. The Mexican-American War was the one of the most significant events of the beginnings of Mexican-American relations, and is commonly referred to as the â€Å"original sin† between the two nations. The conquering of Mexico’s territory was driven by American imperialism and the expanist views during the presidency of Polk. The increased presence of Mexicans in the United States then began as this new territory they lived on was now United States territory. However, during the railroad boom, the U.S. helped to invest with 60% of the U.S.’s total investments in Mexico being in railroads and the others into mining, ranching, and industry, etc. While Mexico was doing better as a country economically, the U.S. controlled most of their significant industries. Mexico allying with the U.S inShow MoreRelatedEssay on Historical Trends at American Colleges and Universities1515 Words   |  7 Pages Historical Trends at American Colleges and Universities The colonial colleges were among the first colleges created and were established under religious auspices. It was believed that an educated ministry was needed to establish Christianity in the New World. Harvard College was established in 1636, followed by Yale, William and Mary, Princeton and King ‘s College later to be called Columbia University and there were also others. The general colonial college curriculum included Latin, Greek, HebrewRead MoreMigration Of The Mexican Immigrants1827 Words   |  8 PagesIntroduction Migration for Mexican immigrants has not always been easy. Having to face the threat of deportation on a daily basis, the stress of acculturation, and coping with an unfamiliar territory has not intimidated nor defeated this population as they seek a better quality of life. As history would have it, the Mexican population not only makes up a large number of immigrants that live in the United States, but they have also contributed to and molded the culture that is seen in North AmericaRead MoreEssay on Its Time to Legalize Illegal Immigrants4950 Words   |  20 Pagesreally becoming a better place for everybody. Sure, globalization has made it easier for me to buy a vase from China, or Instant Message my friend in Italy, but I am hardly a representative sample of the global population. How have the Native Americans benefited from globalization. I doubt they are as thankful as John Q. Public. I think one must look at the reasons for globalization to determine whether or not it was a good thing or not. I fear that the reasons were purely economic, and theRead MoreCase Analysis of Wal-Mart Mexico7232 Words   |  29 PagesMexico in 1991 through a joint venture with Cifra, Mexico’s leading retail company, initially limited to developing Sam’s Club warehouse stores in Mexico. The tremendous success of the first Sam’s Club stores and the impending passage of the North American Free Trade Agreement (NAFTA) encouraged further collaboration, and Wal-Mart and Cifra expanded their joint venture through the 1990s. Wal-Mart purchased a majority stake in Cifra in 1997. Prior to the joint venture, Cifra’s lineup included AurreraRead MoreMidterm Review Essay9272 Words   |  38 Pages16 1.) All of the following factors contributed to explosive economic growth during the Gilded Age EXCEPT: Question options: | a) | availability of capital for investment. | | b) | a growing supply of labor. | | c) | abundant natural resources. | | d) | low tariffs. | | e) | federal land grants to railroads. | | | 1 / 1 point | 2.) By 1890, the majority of Americans: Question options: | a) | worked as farmers. | | b) | worked as independent craftsmen. | |Read MoreNespresso Co. Analysis15084 Words   |  61 Pagesthe Coffee Industry: The concept developed by Nespresso is protected by 70 patents (for machines, capsules and the service). The first ones expire in 2012, until then, the company as a complete monopoly. Nespresso is giving licenses to several industrial companies (such as Krups, Magimix, Alessi and Saeco in France) in order to produce the machines in exchange for royalties. The machines are then sold in malls, and all kinds of store selling household electrical applicants (Darty, Boulanger inRead MoreImperialism And War : American Foreign Affairs7199 Words   |  29 PagesImperialism and War: American Foreign Affairs 1865-1920 After the Civil War Americans got busy expanding internally. With the frontier to conquer and virtually unlimited resources, they had little reason to look elsewhere. Americans generally had a high level of disdain for Europe, although wealthy Americans were often educated there and respected European cultural achievements in art, music and literature. Americans also felt secure from external threat because of their geographic isolation betweenRead MoreGlobal Competitiveness4571 Words   |  19 Pagescompetitiveness among corporate. A number of factors have lead to the increasing globalization of the world economy and as a result the competitive environment faced by the corporate has changed dramatically since the last decade. The drivers of globalization include: decreasing tariffs, improved transportation, communications and information technology, global manufacturing of products and availability of services across markets. These changes have enabled the global competitors to mak e the productsRead MoreJ.Co Donuts Coffee5440 Words   |  22 Pagesthe earlier dark ages which show close parallels with the present situation. We proceed with confidence that we, strengthened by the superior examples of great humanists of the past, can again bring forth great composers, poets, and scientists. And we are firmly convinced that man is endowed with reason, and that it cannot be mankinds purpose that only a few individuals reach the level of reason in their thinking; on the contrary, we are convinced that through our efforts the Age of Reason can beRead MoreMahfuz7742 Words   |  31 Pages2012 Harvard Business Review 63 Spotlight on HBR AT 90 If you want to pinpoint a place and time that the first glints of the Management Century appeared on the horizon, you could do worse than Chicago, May 1886. There, to the recently formed American Society of Mechanical Engineers, Henry R. Towne, a cofounder of the Yale Lock Manufacturing Company, delivered an address titled â€Å"The Engineer as an Economist.† Towne argued that there were good engineers and good businessmen, but seldom were

Wednesday, May 6, 2020

Tennessee v. Garner 1985 Essay - 802 Words

Name: Tennessee v. Garner Citation: No. 83-1035, 83-1070 (1985) Facts: On October 3, 1974, Memphis Police Officers Hymon and Wright were dispatched to answer a â€Å"prowler inside call.† When the police arrived at the scene, a neighbor gestured to the house where she had heard glass breaking and that someone was breaking into the house. While one of the officer radioed that they were on the scene, the other officer went to the rear of the house hearing a door slam and saw someone run across the backyard. The suspect, Edward Garner stopped at a 6-feet-high fence at the edge of the yard and proceeded to climb the fence as the police officer called out â€Å"police, halt.† The police officer figured that if Garner made it over†¦show more content†¦Procedure: Garner’s father brought the action the police officer took in the Federal District Court for the Western District of Tennessee, looking for violations that were made of Garner’s constitutional rights. The complaint was alleged that the shooting of Garner violated the Fourth, Fifth, Sixth, Eighth, and Fourteenth Amendments of the United States Constitution. After a three day trial, the District Court entered judgement for all defendants. It dismissed the claims against the defendants as being the mayor and Officer Hymon and the Police Department as being the director for lack of evidence. Hymon’s actions were then concluded to being constitutional by being under the Tennessee statute. The Court of Appeals affirmed with regard to Hymon, finding that he had acted accordingly to the Tennessee statute. The Court of Appeals then reversed and remanded. It reasoned that the killing of a fleeing suspect is â€Å"seizure† under the Fourth Amendment, and is therefore constitutional only if actions are reasonable. In this case the actions were found not to be reasonable. Officers cannot use deadly force unless they have probable cause that the suspect poses a serious threat to the officer or has committed a felony. Issue: Garner, the suspect’s father brought forth that his unarmed son was wrongfully shot by a police officer as his son was fleeing from the burglary of an unoccupied house. He proposed aShow MoreRelatedTennessee V. Garner 1985908 Words   |  4 PagesTennessee v. Garner 1985 was a case that was the deciding factor that made it no longer acceptable for a police officer to use deadly force to inhibit a criminal from fleeing the scene. The only way that an officer would be able to do this is if the criminal was showing that they were going to be a greater threat if they were not dealt with immediately than they would be if they were just to continue pursuit of the person. This was a change to the old common law that if a criminal was trying to escapeRead MoreTennessee V. Garner Case1303 Words   |  6 PagesSupreme Court case in 1914 called Weeks v. United States, this amendment began to have more value for criminal defendants and their families (The Fourth Amendmen t and the â€Å"Exclusionary Rule†). For instance, one Supreme Court case known as Tennessee v. Garner that was argue on October 30, 1984 and decided upon on March 27, 1985, (Tennessee v. Garner) caused a large amount of controversy because it involved several different aspects such as, following Tennessee laws, the Fourth Amendment, and the statutoryRead MoreThe Death Of Tennessee V Garner1400 Words   |  6 PagesSidney Hildebrandt Tennessee V Garner On the night of October 3rd, 1974 at approximately 10:45 p.m. Edward Garner was shot by Officer Hymon in an attempt to stop him from escaping a crime scene. Garner died on the operating table due to the gunshot wound on the back of his head. His crime was burglary and he was found with a mere ten dollars and a purse. The case was argued on October 30th, 1984 and a decision was made on March 27th, 1985. The father of Edward Garner believed his son’s constitutionalRead MoreTennessee V. Garner Essay813 Words   |  4 PagesName: Tennessee v. Garner Citation: No. 83-1035, 83-1070 (1985) Facts: On October 3, 1974, Memphis Police Officers Hymon and Wright were dispatched to answer a prowler inside call. When the police arrived at the scene, a neighbor gestured to the house where she had heard glass breaking and that someone was breaking into the house. While one of the officer radioed that they were on the scene, the other officer went to the rear of the house hearing a door slam and saw someone run across theRead MoreThe Amendment Of The United States Constitution1767 Words   |  8 Pagesconsidered constitutional or unconstitutional. For example in the 1984 Supreme Court case of Tennessee v. Garner, 471 U.S. 1 (1985) where a Tennessee officer shot and killed a fleeing un armed black man. Here is the Supreme Court’s ruling on the case it reasoned that the killing of a fleeing suspect is a seizure under the Fourth Amendment, and is therefore constitutional only if reasonable. The Tennessee statute failed as applied to this case because it did not adequately limit the use of deadlyRead MorePolice Profiling And The Media1325 Words   |  6 Pagespast year regarding black suspects being shot and killed by white police officers. One case happened in South Carolina and the other in Illinois. After investigating and finding facts I will then compare both cases to the Supreme Court case: Tennessee v. Garner 1985, and determine what case is the most alike to it and why. Walter Scott Case and Outcome On April 4, 2015 in North Charleston, South Carolina, 50-year-old Walter Scott was shot and killed by Michael Slager, an officer of the North CharlestonRead MoreThe Reasonableness Of A Deadly Force Seizure811 Words   |  4 PagesIn 1985 the U.S. Supreme Court ruling in Tennessee v. Garner severely restricted the circumstances under which law enforcement officers may use deadly force to arrest a suspect. In assessing the reasonableness of a deadly force seizure per the fourth amendment, the Court ruled that the need for a police intrusion had to be weighed against its risks, and determined that common law any-fleeing-felon statutes were unconstitutional. In a narrative give the facts, issues, and court holdings. (ncjrs.govRead MoreCj 499-01 Unit 3 Crime Scenario Analysis1733 Words   |  7 Pagesgovernmental interest at stake. The Supreme Court has stated that this involves the inception (How it all started in the first place), the manner of force used (what did the officer do), and the duration (how long was the action) (Graham v Connor, 1989; Tennessee v Garner, 1985). In analyzing the above listed scenario, the information provided by the alleged victim to the officer includes three alleged crimes. These alleged crimes include First Degree Robbery RCW 9A.56.200, Assault II with a Weapon RCWRead MoreEssay on Use of Force in Law Enforcement2254 Words   |  10 Pages2010, p. 123). Graham v. Connor 1989 The appropriate use of force will vary from officer to officer because the courts do not look at every officer the same way, â€Å"The reasonableness of a particular use of force must be judged from the perspective of a reasonable officer on the scene, and its calculus must embody an allowance for the fact that police officers are often forced to make split-second decisions about the amount of force necessary in a particular situation† (Graham v. Connor 1989). ThisRead MoreA Unified Accountability System Of Law Enforcement Essay1736 Words   |  7 Pagesenforcement agencies do a minuscule job in police officer accountability. Furthermore, nearly 35 percent of the white community believes that accountability for police is lacking (Kindy Merle, 2016). Tennessee v. Garner In 1985, there was a court ruling made by the Supreme Court in the case, Tennessee vs. Garner. Furthermore, the officers reacted based on an older common law that allows the use of deadly force for fleeing felons. Consequently, the officers involved shot an unarmed suspected felon. The family

Tuesday, May 5, 2020

Information Systems Management The Term Hacking

Questions: Discuss the following points..1. Online security and hacking2. Techniques used by hackers3. Hackers and their activities4. Reasons for hacking5. Preventive measures taken by companies Answers: Introduction: The term hacking is often misinterpreted. Sverdlove (2014) stated that the incident of using a system in unpredictable or unintended way can be considered as hacking. Bodhani, (2012) suggested that use of hacking is effective for finding the shortcomings of a system. Although hacking can be used for assessing a system, the term mainly stands for breach of security in a system. However, recently use of hacking is increasing for accessing a system without authorization. Bradbury (2014) opined that gaining unauthorized access to a system can be considered as cracking. As the use of internet increased in past few years , incidents of hacking also increased. Currently users of internet services face severe challenges for protecting their information from hackers. Although the traditional hacking techniques are changed significantly, incidents regarding security loss due to use of conventional hacking methods has not been reduced. However evolution in hacking techniques makes the process o f protecting information more difficult. In this essay, both the traditional and modern hacking techniques are discussed. The essay also contains analysis on hacking purposes and preventive measures of hacking. 1. Online security and hacking: Figure 1: Hacking process (Source: Broad and Bindner, 2014,pp. 67) With the increase in internet services, incidents of hacking are also increasing. The hackers at the first stage scan the computers which are connected using internet. Hackers use several methods such as using credentials for getting access to a computer. Once the hackers get access to the computer they modify the data. Analysis on the hacking process indicates that the chances of being hacked are more for the computers which are connected using internet. 2. Techniques used by hackers: Viruses: Hacking attacks using viruses affect the functionality of a system. Finkbeiner, (2013) stated that that viruses are special programs which can replicate themselves. According to Broad and Bindner (2014) viruses have abilities to attach themselves with other programs or machine. Whenever the infected program or machine runs, virus is replicated and attached with new programs. Sverdlove (2014) opined that use of virus in hacking cause flow of unwanted traffic into a system. However the viruses can be classified according to their effect on system. Resident viruses: The viruses which reside into the memory of computer can interrupt the process of running a program. The effects of using resident viruses for hacking purpose are seen while executing programs. The viruses residing into RAM also impacts on the process of opening or reading files. File infectors: Hercheui (2012)stated that the operations of files are not only affected due to presence of memory resident viruses, but use of file infectors also restrict an user from accessing required files. Kizza, (2013) found that most of the viruses which are used for hacking falls in to the category of file infectors. Use of file infector enables a hacker to damage the functionality of any program while executing it. Direct action viruses: Direct action viruses have the ability of replicating themselves while being executed. Joe and Ramakrishan (2014) suggest that these viruses affect the files which are residing into the main directory of a computer. It observed that direct action viruses become operative during booting process. Boot viruses: Kizza, (2013) stated that use of boot viruses in hacking enables a hacker to damage the booting ability of a system. However Sverdlove (2014)opined that boot viruses can infect a system if it starts using an unknown disk drive. Overwrite viruses: Hacking techniques are not only used for stealing secret information it may be used for resulting information loss. Hackers can delete information contained in a file by using overwrite viruses. These viruses continue operating until the infected file is deleted. Macro viruses: Analysis on the current hacking trends indicates that the use of macro viruses is increasing. Use of macro virus impacts on the internet activities which are being conducted using the infected system. Joe and Ramakrishan (2014) state that use of macro virus results automatic execution of some processes. Use of macro viruses for hacking changes the browser settings or search settings of the infected system. Kizza, (2013) opines that the original search setting is impossible to be retrieved of a system is infected due to use of macro virus. However, Hercheui (2012) suggests that the chances of being affected by macro virus increase while downloading free programs such as computer games or free wall papers. Key Logging: Password stealing is one of the most common ways for gaining unauthorized access to a system .In case of business organizations user id or password loss can lead to loss of important data. Use of key logging techniques enables hackers for accessing information about the password. Hackers can use both software and hardware key logging systems for staking information regarding the password. However, (AS) states that use of software key loggers provides the hackers with more flexibility for installing and controlling the system. The hackers using software key logger get information on each stroke on the key board. Kizza, (2013) opined that the key logger software is able to identify the activities on key board and stores the information into software log. According to Sverdlove (2014), it is difficult to determine whether key logger software is present in a system is difficult as these programs execute at the backend. Hackers also prefer to use key logging software as it no t only can be installed quickly into a system, it does not reveal the identity of hacker also. Although the software key logger systems are used more, chance for losing secret information is high due to use of hardware key loggers also. Although the hardware key loggers can be installed using the USB port of system within negligible time, the hackers require accessing a computer physically for installing the device. Kramer (2012) opined that need of getting physical access to a software reduces the use of hardware key logger for hacking. Sniffing and spoofing: As the use of internet is increasing rapidly, the traditional hacking techniques are also changing. Although the use of online hacking methods such as spoofing and sniffing are comparatively new, the number of victims due to use of these hacking techniques are increasing. Use of sniffing provides the hacker with opportunity of accessing data which is being transmitted over a network. Kramer (2012) stated that snuffing can be used for monitoring important data over a network. However, sniffing can lead to loss of security if it is used by hackers. Kizza, (2013) suggested that the chance of being attacked by spoofing techniques is more among e-mail users. Hackers who are using spoofing methods send emails to internet users. In most of the cases receivers of these emails fail to distinguish between emails coming from authentic users and emails sent by hackers. If the emails sent for spoofing purposes are read, hackers can access control over the users system. Denial of service (DoS) attacks: Sverdlove (2014) stated that denial of service attacks are used for terminating functionality of a system by generating high traffic within it. Use of DoS attacks enables hackers for sending huge amount of data to the target machine from different computers. As huge amount of traffic is directed to a system by using denial of service attacks, it stops its required functions. Instead of executing intended operations, the infected system deals with the unnecessary data flow within it. According to Joe and Ramakrishan, (2014) DoS methods are also one of the emerging trends of hacking. Kizza, (2013) stated that use of DoS attacks can affect the functionality of a system for long term by terminating the internet services. Social engineering: Social engineering techniques can be implemented by using either manual efforts or computer based techniques (Jacobson, 2013). As stated by Hercheui (2012) machine based social engineering techniques include phishing, online scams and baiting. Chances of being victim of baiting are high among those users who use internet for downloading games of movies. Hackers use e-mail services for implementing phishing techniques (Joe and Ramakrishan, 2014). According to Kramer, (2012) the number of victims of online scam is increasing due to lack of awareness on safe practices of e-mail handling among users. 3. Hackers and their activities: Hackers can be classified as white hat hacker, grey hat hacker and black hat hackers on basis of their activities (Jacobson, 2013). Although the term hacking is used for indicating incidents on accessing a system without authorization, hackers also aim at finding bugs into a system (Joe and Ramakrishan, 2014). White hat hackers: As stated by Hercheui, (2012) hackers have the ability to modify computer systems. Although the functioning of white hat hackers is almost same with that of other hackers, white hat hackers aim at improving a system. White hat hackers access a system for finding its short comings (Zdziarski, 2012). Black hat hackers: Black hat hackers use their abilities of accessing computer systems for conducting criminal activities. Grey hat hackers: Grey hat hackers can use their abilities for either conducting criminal activities or examining a system. The hackers who do not use their abilities for personal profit can be referred as grey hat hackers (Sverdlove, 2014). 4. Reasons for hacking: Analysis on the recent trends of hacking activities indicates that most of the hacking activities are conducted for accessing secret information without authorization (Stallings, 2013). Often hackers aim at degrading the performance of a system instead of only accessing information. Hacking can also be used for assessing strength of a system (Michael, 2012). 5. Preventive measures taken by companies: Analysis on the hacking techniques which are being used currently indicates that the threat of losing confidential data is increasing due to evolution of traditional hacking techniques. Sverdlove (2014) stated that the incidents of important data loss can be prevented by increasing security of the system. Loss of confidential data not only causes huge financial loss for a business, it also impacts on the future activities of the organization in market. However the organizations can use protective measures such as antivirus and firewalls for preventing unauthorized users from accessing a system. Bradbury (2014) states that use of tools only does not makes the systems secured, users also require developing safe internet practices for avoiding private data loss. Use of firewalls: Use of internet is increasing for executing the tasks related with business. As a result, the organizations are facing difficulties for protecting data from unauthorized users. Use of firewall can enable the organizations to increase network securities. According to Hercheui, (2012) firewalls scan both the incoming as well as outgoing data while two networks are communicating. On basis of the scanning process, suspected actions are prevented. Sverdlove (2014) stated that firewalls follow some rules for controlling traffic in a network. As these rules can be set by network administrators, use of firewalls can enable organizations to prevent unwanted communications among networks. However, use of firewalls does not ensure that the system is completely protected. As the firewalls scans both incoming and outgoing traffic, it can prevent a system from communicating with other networks. Apart from this security of system also varies according to the nature of firewall. Ap plication firewalls check the content of each incoming and outgoing packets. Then these firewalls take decision whether a particular packet will be allowed to communicate with other networks or not. Although use of application firewall provides better security than using packet firewalls, often these firewalls restrict some specific sources from communicating. Apart from this, high cost of implementing firewalls also reduces its effectiveness. Use of antivirus: Although the incidents of online scams are increasing, hackers can access data due to presence of virus and worm into a computer. Presence of virus not only increase the chances of hacking but it also prevents the machines from executing normal functions. Use of antivirus not only increases security of the system but also makes it more efficient. However the antivirus requires being updated regularly for protecting new hacking methods. Often computers contain spyware or adware software. Although presence of such software does not increase security threats directly, presence of such programs can create pop-ups while a user is using internet. Kramer, (2012) states that speed of a computer reduces significantly due to presence of adware or spyware programs. According to Kizza (2013) strength of a system is an important factor for reducing the number of hacking attacks. It also indicates that presence of spyware or cookies reduces strength of a system and thus number of hacking attacks into such systems increases. Hercheui, (2012) opines that installation of anti-adware or anti-spyware programs in a computer reduces the number of unwanted software. Thus the strength of system increases and the process of protecting system from unauthorized access become easier. Hackers implement innovation in their existing techniques and thus the task of avoiding such activities become more difficult. It indicates that this anti- spyw are software require being updated regularly so that these programs can execute their tasks effectively. Using strong passwords: Use of strong passwords reduces the chance of hacking. Use of longer and complex passwords increases the number of possible combinations and thus it increases difficulty for guessing passwords. However the organizations also can implement two stage authentication policies to make their systems secure. Regularly updating OS and software: Most of the operating systems provide users with opportunities for implementing security techniques. As the natures of hacking techniques are being changed continuously, software manufacturers are also updating their products to reduce the number of bugs. Use of updated software strengthens the system and thus the system becomes more secured. According to Sverdlove (2014) use of updated operating system reduces the chance of being hacked by fixing potential security issues. Implementing safe internet practices: Although the availability of tools for preventing hacking attacks increased, the importance of using safe internet practices is also increasing. The organizations which require using internet services extensively, provides employees with guidelines for using internet safely. As the number of phishing attacks is increasing rapidly, employees are also provided with guidelines for safe e-mail handling practices (Kramer, 2012). The current trends of hacking activities indicate that often the hackers aim at deleting data instead of accessing it. Organizations require protecting their data by creating back up files. Creation of back up file reduces the chances of data loss even if a system is infected. Conclusion: Analysis on the hacking trends indicates that the hackers are using new techniques for accessing secured systems. Although the use of new techniques is increasing, risks caused by old hacking techniques are not reduced. Hacking attacks not only causes data loss for a system but also affect long term activities. However hacking attacks can be prevented by using firewall and antivirus programs. Awareness among users regarding safe practices for internet using can also reduce hacking attacks. References Bodhani, A. (2012). Bad... in a good way [ethical hacking]. Engineering Technology, 7(12), pp.64-68. Bradbury, D. (2014). Unveiling the dark web. Network Security, 2014(4), pp.14-17. Broad, J. and Bindner, A. (2014). Hacking with Kali. Waltham, MA: Elsevier Science. Finkbeiner, A. (2013). Researchers split over NSA hacking. Nature, 502(7470), pp.152-152. Hercheui, M. (2012). ICT critical infrastructures and society. Berlin: Springer. Jacobson, M. (2013). Applied cryptography and network security. Berlin: Springer. Joe, M. and Ramakrishan, B. (2014). Enhancing Security Module to Prevent Data Hacking in Online Social Networks. Journal of Emerging Technologies in Web Intelligence, 6(2). Kizza, J. (2013). Guide to computer network security. London: Springer. Kramer, J. (2012). Hacking the Kinect. [New York]: Apress. Lopez, J., Huang, X. and Sandhu, R. (2013). Network and system security. Berlin: Springer. Michael, K. (2012). Hacking: The Next Generation. Computers Security, 31(6), p.799. Stallings, W. (2013). Cryptography and network security. Upper Saddle River, N.J.: Prentice Hall. Sverdlove, H. (2014). The Java vulnerability landscape. Network Security, 2014(4), pp.9-14. Zdziarski, J. (2012). Hacking and securing iOS applications. Sebastopol: O'Reilly Media. Often computers contain spyware or adware software. Altho