Forensic Computing Authentication by Biometric Verification

Finger Scan is cost efficient and accurate. The finger print, the most common biometric measurement, has been in use for security measures by law enforcement agencies for more than 100 years (Johnathon, 2001). The fingerprint has come a long way from India paper cards and Ink. The way the finger scan works is, that it looks minutia, and it is the position of the end points and junctions of individual ridges that mutually form the finger print. Most commercial applications rely on the collection of approx 14 to 30 minutias though the number that can be tracked can run into the hundreds. The initial system for a finger scanner, consist of fixed CPU connected to a chip. The chip read your minutia when your finger is positioned on it. Once the scan is complete, the computer compares the minutia to a list of official users in its database. The stored record cannot be used to recreate a fingerprint, because the records doesnt store photographs, but instead reflect the information about the exact points of the finger (Thompson, 2001).

Financial Institutions One of the first financial institution to implement finger scans was the Purdue Employees Federal Credit Union in Lafayette, Indiana in 1996.

Using it for Authentication
The Commerce Community
The commerce community has also begun to use fingerprint scanning for (HRM) human resource management, scam, internal theft, and administration access codes. One main case is a co-worker punching in the time card for an absent co-worker. Hand, finger, and voice biometrics can put a stop to this scam and save the company cash. One more type of problem in which businesses lose cash is forging. One case of a companys attempt to stop forging through the use of biometrics is Walt Disney. In March 1996, Disney World began testing the use of 3-D finger geometry to reduce fraud and add ease for visitors. The theme park sales hundreds of dollars in passes and has suffered a profit lose through the criminal action of forging passes. The allegation of the biometric hand scan to verify pass holders, has stopped the previous serious of fake passes. The commerce community has also begun using biometrics systems for domestic theft. Every one in business knows that the greater part of theft comes from its own employees. Businesses have even prepared a group under decline to classify this type of lost inventory. With the use of biometrics, no employee can argue that some one cracked their code or that they dont know who had access to it. By eliminating this problem, shrinkage would decrease and profit would rise.

Health Care
One of the near futures incorporation with biometrics is in the medical field. There is an accurate use for this type of tools in health care, which would make authorization a stronger word. With the execution of biometrics there is an option for nurses to enter a patients Identity number, authenticate their access codes with the scan of their fingerprint, which in turn can download the patients file (Simpson, 2001). Signing out would be the similarity to giving a signature, clearing up the jumble of you did when and what Im sure that this example sounds a spot critical of todays medical procedure, but it has to be. Biometrics will not take over the method that the medical field has established slightly it will help to enforce tighter security.

Judicial system
Number of people agrees that fingerprinting should be allowed in our courtrooms just as it has been for so many years. With so much inquiry of the soundness of fingerprinting evidence, it cannot probably be allowed in our judicial system. In order for us to resolve whether or not fingerprint evidence is scientifically sound, we need to look at what forms a match. Fingerprints are exclusive. Every persons fingerprint is like a snowflake, there are millions of them, yet no two are accurately alike. If we personally find it hard to take a hidden print from the scene of a crime, and compare it to a record of millions of fingerprints. Fingerprint databases are built from police stations, jails, prisons, and credentials programs like Identi-Kid.

Advantages and possible Applications
Increase security - Provide a convenient and low-cost additional level of security.
Reduce fraud by employing hard-to-forge technologies and materials.
Integrate a wide range of biometric solutions and technologies, customer applications      and databases into a robust and scalable control solution for facility and network access
Unequivocally link an individual to a transaction or event.

DisadvantagesHurdles for implementation - Security and Consistent Accuracy
The finger prints of the persons working in Chemical industries are frequently affected. So these industries should not use the finger print mode of authentication.

It is notice that with the age, the voices of a person changes. Also when the person has throat infection or flu the voice changes or if there are too much sound in the environment this method may not validate correctly. So this method of verification is not practicable all the time
Biometrics is a costly security solution.

For people affected with diabetes, the eyes get affected resulting in differences (Ritter, 2002).

Clearing the Hurdles
Skilled assessor of fingerprint verification agrees that the process of comparing hidden fingerprints of unknown origin with inked impressions of known origin is an art rather than a science. It requires an examiner to assess, on the basis of knowledge in dealing with thousands of fingerprints, what parts of an incomplete and partially blurred hidden print show detectable friction ridge detail that can be used for identification purposes. But whether fingerprint identification is art or science is undoubtedly no longer applicable to a Daubert inquiry (Meagher, n.d.). What needs to be observed is whether the underlying premises upon which fingerprint detection are based have been experimentally authenticated. And these premises are of three kinds

(1) Friction ridge detail of the epidermis on the palm side remains unchanged of the hands during the lifetime of a person, except for accidental or alteration.

(2) Friction ridge pattern areas shows so much variety of detail that no two patterns are ever found to be accurately the same on the digits (or palms or soles of feet) of one individual or on the digits (or palms or soles of feet) of further individuals.

(3) While these friction ridge patterns shows an endless variety of detail, they nevertheless fall within certain wide classes or categories that permit police to store and recover millions of prints according to categorization formulae (Moenssens, 2002).
       
There is, however, reputable empirically established evidence of the uniqueness of fingerprint patterns. Research by many examiners has shown that the fingerprints of identical twins are dissimilar, as are the prints of triplets, quadruplets, and quintuplets. In that sense, fingerprint recognition has been found to be even more discriminating than the vaunted DNA (deoxyribonucleic acid) fingerprinting technique, which cannot differentiate, by todays technology, between the DNA of identical twins. Since inherited behaviour for similarity in patterns and sub-pattern types are the most common among people who are related closely to each other, the dissimilarity in the prints of such persons definitely can be taken as pragmatic evidence of fingerprint individuality (Moenssens, 2002).

Conclusion
Where we talk about conclusion of the Forensic Computing Authentication by Biometric Verification we came to realize that finger print, the most common biometric measurement, has been in use for security measures since years. Forensic computing is really very important in todays world, as we already know that internal theft and scam is very common in industries, if a person punching in the time card for an absent person. Hand, finger, and voice biometrics can put a stop to this scam and save the money of the company. Different types of industries like Health Care departments, Judiciary department and business communities are using the methods of authentication of Biometric Verification just because to stop scam, reduce fraud and unusual benefits taken by employees. There are some disadvantageshurdles for implementation- Security and consistent accuracy like Biometric authentication systems are cost effective and in rear cases it not works perfectly because there are some skin infection which changes the finger ridges and if we talk about voice biometric authentication system so some diseases like Flu and throat infection can change the persons voice. In spite of these disadvantages we have to focus on benefits of the Forensic Computing Authentication by Biometric Verification and in near future technology will definitely resolve these disadvantages.

E-Business Technology- Amazon.com

Amazon is one of the first major companies that started an ecommerce website for selling goods online. The e-business based in Washington started initially as a bookstore, but due to its success diversified into other goods.

This website went through a big architectural change and moved from a two tier monolith to a distributed, decentralized services platform that serves many different applications. From this we see that the hardware they maintain at Amazon includes databases at different locations that are serving a set of applications. Originally the e-store started as one application that was linked to a back end written in C. This however changed once the e-store grew its products.

The website is highly service oriented and has divided its databases into small parts that act as service interfaces. The architecture is built around several application servers that provide service to different applications. The webpage itself is one of the application servers and also has other servers like the customer service application and the seller interface.

The application does not use a specific approach and at certain places uses Jboss or java, but they dont use the entire j2EE stack they only use the servlets. For the process requests that they service they use C, but for the building of the content they either use Pearl or Mason.

 Amazon probably has one of the largest Xen installations and it has modified and adapted the Xen version. The exact version that they use is not known but we know that it is based on the LIUNUx platform. They are using the REDHAT LINUX platform. Apart from that for storage purposes they have two separate forms of storage, on local storage and one network based storage. The local storage also called the instance storage is where data is stored till the instance is terminated and the other one is where persistent data is stored.

The configuration at Amazon uses cloud computing and have a distributed architecture. This indicates that they operate in multiple different zones. This kind of architecture poses a problem for Amazon as operating in different locations can lead to problems in integration and also other administrative issues such as power breakdowns. Amazon has faced a major problem of power breakdown due to this architecture that they employ. Due to a certain power breakdown in one of the areas the website is shutdown which obviously leads to losses.

This kind of problem is one that is faced by many of the ecommerce sites that operate in multiple availability zones. This kind of problem can be resolved by having the same applications being run at several application zones. This can be resolved as the application that faces the breakdown will be the only one that is shutdown and the customers would not be affected. The aim here is to provide the customers with smooth operations of the website and to do so when an application is run in multiple zones. If one zone breakdowns the customer request can be serviced by other zones that also operate the same application.

Another solution to this problem can be that the company can adopt a more centralized architecture and operate in one zone instead of at multiple zones. This way the problem of a breakdown in one zone would not affect the website. The centralized database can be used to service all request but that poses the problem of low scalability so they need to create a hybrid solution by having certain application servers at multiple sites as well as a centralized server so that the smooth running of the website is not affected by the problems at any one zone and the customers are provided with a good service.

Network Infrastructure and the servers used for TESCO

TESCO is a UK based online grocery store, which boasts of being the largest retailer of grocery items in terms of global sales, on the World Wide Web. Since its inception in 1919, the company has gone a long way to meet the goals that had been set by founder Jack Cohen. Starting off as a single stall of goods, now the company is spread throughout the world through the internet, and with the trend of online shopping on the rise.

With big competitors such as EBay and Wal-Mart, TECO had to expand its business by meeting customer needs in minimal costs. Customer needs and demands poured in via internet through various channels.

Customer order processing was improved dramatically by the use of the BizTalk Server. Customer needs specifically increased after November 2005, when the company started TESCO Direct, to start delivering non-food products.

Network
Wireless LAN Technology

TESCO has been using Wireless LAN Technology

They use all wireless network components like routers, Wavelink
networking kit and network components.

Wireless network has different short comings and these days wireless products are inexpensive and ubiquitous but at the same time wireless network has many problems and someone can easily configure security setting and start using setup. Securing wireless setup is an important concern. TESCO took important steps to make their network wireless with highest security.

To make wireless network work for a longer period they used IEEE 802.15.4 standard. The IEEE 802.15.4 and Zigbee have a wide range of applications, including industrial control and personal health care, computer peripherals (Jawad, 2008).

The role of policy development and cryptography techniques plus public key infrastructure (PKI), secure remote access, wireless, and virtual private networks (VPNs), Harden network devices, operating systems, spoofing and hijacking.

Problem TESCO faced with wireless network are
It slowed down Internet performance, anyone can view files on computers and spread dangerous software, he or she can monitor the Web sites visit, read e-mail and instant messages ,he can send spam or perform illegal activities with connection.

A threat to the secure data on computers comes from both inside and outside users. It may be intended or it may be unintentional and accidental. There are also passive and active threats. Passive threats are those where only secure information is released without affecting the system (Computer Security, 1998). In case of active threats, information and system both are affected (Computer Security, 1998) and this is mostly intentional.

Threats could be from hackers who masquerade for accessing secure data or spreading virus. Insider attacks could come from the loss of confidential secure data by authorized users where as outsider attacks are intentional site invasion or data access by illegitimate users. Creation of trap doors that allow unauthorized person to access information. Virus attacks that may damage important data, files and hardware. Exhaustion attacks to access passwords or any other encrypt data. Other accidental failures including hazards to equipment and systems. For e.g., power failures, rainsnowair storm, earthquakes etc.

Solutions that TESCO employed
Following techniques were used to secure wireless network
64-bit WEP was used, WPA PSK, VPA 2, never broadcast SSID, enable WPA encryption instead of WEP, and MAC filtering was used to control unauthorized access, disable remote administration, and make sure to reduce transmitter power. All the above method makes network more secure and safer.
WEP is the best solution than anything else but if TESCO also used WPA2 to change encryption once in a month so that wireless would remain secure, never connect unprotected wireless network on computer systems.

Encryption is to encode the information into an unreadable format using specific mathematical key. In this way message cannot be read in the hands of unauthorized persons. Only authorized person having the same matching key can decrypt and read the message.

TCP was designed for wired networks initially where the packet error rates were far less than what we encounter on the wireless links. The main assumption which TCP makes is that the main reason for packet loss is network congestion. Wireless losses makes TCP to think that congestion has occurred and thus the initiation of congestion control mechanism occurs, resulting into poor performance.

Network Topology
If there are multiple computers being used in an institution, they have to operate through a proper network. This network enables each computer to function to its maximum. Data that is transferred across the network is done via a hardware called the media (Network Topologies, 2008).

Network topology is the way the physical wiring of the network is done. The three network topologies that are mainly employed in companies are,
Bus  in this a terminator is used for both ends of the network, a barrel connector may be used for extension.

Star  a central hub controls all the network communications, around which all the other hubs revolve. This can be done around 100 meters from the central hub.

Ring  this arrangement is in the form of a ring, which requires a data token for permission for communication of computers.

The TESCO company comprises a variety of departments, which are essential for running a smooth networking system. This enables prevention from fraud, especially, which is feared by many companies. If there is occurrence of failure of any program, there should be an alternative access which reduces chances of productivity being reduced.

If the star topology is employed in the company, maximum gains can be achieved, by one hub providing communication to all other hubs linked. The star topology provides expandability and matters can be dealt with ease using this method. The functionality of the star topology depends on the number of hubs attached, which usually are 24 in number (Hallberg, 2005).

There is a great advantage to the star typology, that if only ten ports are attached to the hub, then two hubs can be joined on further requirement of ports. This is because if there are ten ports then only ten devices can be attached for continuous access. This prevents the shutting down of the entire network in case of a mishap.

There is a range of cables that can be used in the star typology, among which the fiber cables are of significance. According to Kozel, Art and Armas, Ruben, (2005) Fiber cabling is used to enhance performance over short distances as well. This cabling involves speedy actions independent of the distances.

It will prove cost effective and efficient to employ the star topology in the organization, to achieve the networking goal set.

ServerThese needs were to be met by using Microsoft BizTalk Server 2006 and Microsoft SQL Server 2005.  For data, fixed and mobile telecommunications, TESCO signed up a deal with Cables  Wireless, to get connected to all chains around the world, under a single IP network.

Dissertation Chapter Literature Review

Social Networking Sites
I.i Introduction
Since their introduction to the mainstream media in the world wide web, social networking web sites have proliferated the Internet, spreading like digital wildfire, drawing in more and more people to the allure of social connectivity between people who could be friends who have long been out of touch, or just people looking to find new friends, possibly those of which may share a certain common interest with them as well as ways to cash in on the digital market that is the Internet. Many of those who subscribe to this sort of online activity have begun to inculcate these practices into their daily routines, ritualistically checking their site activities, updating and modifying their site pages.

As of this writing, there are currently hundreds and hundreds of online social networking sites and the number continues to grow by the day and while the features remain consistent among these websites, their audiences and cultures range widely. There are a multitude of these existing social network sites that cater to the strengthening of development of the then already existing social groups or networks, taking them to a digital platform conveniently accessible from anywhere with Internet connection, while others give people the opportunity to acquaint themselves with other individuals who may share their interests, ideals, and activities, or may just happen to be offering goods or services that they may currently be in the market for.

From wholesome, friendly sites such as Friendster and Facebook, to online adult communities such as Fetlife, to professional and business networking sites such as LinkedIn and Yelp, Inc., social networking sites strongly continue to deliver the power of connectivity and convenience that the Internet has been putting into the hands of the masses since it first became a mainstream medium.

This growing trend has caused many researchers and academic scholars to devote their time and attention to the study of this relatively young and blooming trend, employing extensive research and studies as to what effects these social networking sites may have on culture, and likewise the effects that culture may have on the development of these social networking sites as well.

I.ii History
Social Networking sites have long existed even before the immense popularity websites today such as FaceBook and MySpace are experiencing today. Before it turned out to be one of the most influential and commercialized entertainment and information media that it is today, the Internet was a media accessible only to a privileged few. Granted, the formation of the Internet was to create a digital ground for communication and networking, but due to the limited accessibility to computers, as well as the social connotation that these new machines were for select few individuals   namely of the highly intellectual, socially awkward archetype colloquially known as nerds.

Eventually though, connectivity and interactivity on computer networks began to flourish, kicking off with the Bulletin Board System or BBS, which allowed the download of files or programs from a central system, as well as the posting of messages for other users. Soon after, CompuServe began to follow suit, this time providing a more interactive way for users to connect by means of providing access to community forums   a form of communication present until today.

One of the best examples of the first computer networks that spawned what modern social networking is today is America Online or AOL. Considered by many as an earlier form of the Internet, America Online featured user-created networks or communities, even allowing members to create their own member profiles as well as view those of others. Soon after, the Internet was born and families rushed to get computers in their households.

During the mid 90s, early versions of what we now know as Social Networking sites began to slowly make their names in the Internet. Sites such as Classmates.com, a segment of United Online, sought to reconnect long-lost classmates, providing a means for digital reunions. The idea of reconnecting with old acquaintances was an immediate hit, allowing batchmates from highschool, college, and even former workmates and those in the military to satisfy their curiosities on whatever happened to their former colleagues as well as provide the opportunity to personally catch up with them (United Online 2010).

Soon after, sites sprang up to develop networks which centered on specific demographics. Among the earliest were Asian Avenue   now known as AsianAve.com   a site where Asians can meet fellow Asians living in America (AsianAve 2010) BlackPlanet.com, which is a site for the American Black community which allows discussions in forums, profile customization, and opportunities to meet up with other African-Americans (BlackPlanet 2010) meanwhile Migente.com much like the earlier mentioned sites, focused on the Latino   American communities (MiGente 2010), all of which are successful Social Networking sites that live to this day.

At the dawn of the new millennium, social networking finally made it big with the launch of Friendster.com. Friendster capitalized on featuring a degree of separation concept which showed how to individuals were connected (Friendster 2010). Users were able to map how they are connected to other users who they were not directly  friends  with on the network. After only three years since its launch, Friendster already had over three million subscribers. Eventually though, it grew less popular in the Western regions while still maintaining a solid fanbase in Asia as of writing. Friendster was among the early networking sites that catered to the young and trendy, as computers and the Internet became more and more accessible.

Taking on a more professional tone of networking, LinkedIn launched with entrepreneurs and businesspeople in mind. Creating a network for professionals who seek to get in touch with other professionals - be they in the same field or otherwise   LinkedIn provided a means for online businesses or even just businesses who rely on online resources to thrive (LinkedIn 2010). This proved a successful alternative to the trendy and casual social networking sites that were making the rounds at the time. Where Friendster excelled at keeping friends and acquaintances connected, LinkedIn provided business-minded individuals a means to let their businesses   online and in the real world   thrive. As of writing, LinkedIn currently boasts over 65 million users.

Currently leading the pack of social networking sites, Facebook launched in 2004 as a network for Harvard and only went public in 2006. Much is still argued as to what it is about facebook that attracts so many, with debate points leading to the easily accessible features as well as its obviously successful name recall. In its profile page, it claims to aim to  give people the power to share and make the world more open and connected.  (Facebook 2010) a goal which is often the credo for most any social networking site, and yet it is facebook that remains the most popular site on the planet.

I.iii Social Networks and Women
Studies in the developments of social networking sites have been conducted recently to determine the demographics of which these sites are more popular with. The findings are that women outnumber men on most categories of subscribers. This despite the fact that technology is commonly perceived as a field dominated by males. The number of women frequenting social networking sites continues to rise, making a significant impact on what was perceived as the  Gender Digital Divide  where males are seen to be more promiscuous in terms of computers.

Studies show that women are currently at the forefront of the social networking revolution that has been taking the Internet by storm for the past few years. Outnumbering many in almost all demographics in every social networking site, more and more women turn to social networking sites as of late and continue to have a higher growth rate than men. In a recent article in Forbes, pertaining to the Gender Digital Divide, women were reported to be enjoying different activities on the World Wide Web as those being enjoyed by males (Goudreau 2010).

Being the majority of subscribers to the major social networking sites such as Facebook, Twitter, MySpace, Flickr, and Bebo, the difference on preference shows itself opposite the sites where the majority of users are male namely LinkedIn, YouTube, and Digg. The initial observation is that men are more inclined to frequent content-based websites as well as promotional websites.

According to professor Sherry Perlmutter Bowen at the Villanova University in Pennsylvania in the same Forbes article, it is the early way boys and girls are raised that lead to differences such as these. The difference in the environment and culture of which how boys and girls are raised is what leads to different norms and behavior wherein boys grow up competing and comparing themselves with others, working for success while girls learn to build connections and relationships by means of sharing social information. (Bowen 2010). This is possibly why women tend to dominate the social dimension of the Internet while men are more inclined to go for the competitive side of it. Despite these facts, it is obvious that the resulting divide between men and women affect cultures as well, pertaining to effects on trends and the ease of which ideas are communicated, influencing decisions and the like.

Gender
As general as these effects on culture may be, it remains that among the most affected sectors of social network sites are women. Pertaining to the infamous Gender Digital Divide, women are seen to be one of the disadvantaged in terms of computers or computer-related issues. This stems from the findings regarding the digital divide as, according to Psychology Professor Joel Cooper from Princeton University,  a problem of computer anxiety whose roots are deep in socialization patterns of boys and girls and that interact with the stereotype of computers as toys for boys.  stated Cooper (Cooper 2006).

On the matter of Gender, women have long been at a disadvantage to most topics especially when it came to matters of performance. Women have always suffered from the social stigma that they are purportedly inferior to men. This misconstrued perception on the female of the species has led to their efforts to have the world - not just the men, as some women are reported to accept this societal prejudice   understand the capacities ad capabilities of women in relation to those of men and the human race as a whole.

Cooper made mention in his journal article that the growing digital divide on gender has been a wedge that is most often overlooked, which leads to women being disadvantaged in life as modern society turns to rely on computers more and more. (Cooper 2006) While the computer is continued to be perceived as a toy for boys, the lackluster interest shown by females towards computers early on in life continues to grow and grow as time goes by and leads to inadequacies that would require further conditioning as compared to boys, creating a more challenging world for women in this age where computer literacy is one of the most prominent requirements in securing a job.

The continuing observance of sexes in marketing proves to a point that man and woman inherently have different preferences, so much so that it remains a determining factor in marketing that may be able to determine the success or failure of a product or service being marketed. According to Doctor Steven John Simon of the Florida International University, in his article in The Data Base for Advances in Information Systems entitled  The Impact of Culture and Gender on Web Sites An Empirical Study , gender plays a major role in market segmentation due to its variables that effectively meet successful implementation requirements such as its ease of identification, and the accessibility of its segmentation as well as ease of profitability due to its large segments. (Simon 2001) This obvious distinction between male and female preferences is substantial proof of the effects of gender on cultural development, which - on the topic of gender roles in the computer age   leads to the divide which puts women into a disadvantage.

The history of women and the Information and Communications Technology industry is one that has been riddled with criticism since it was first observed and brought to attention. Appropriating the information systems theory of the Technology Acceptance Model or TAM, understanding the fundamental differences and similarities of genders plays a significant role in decision making. Preferences may attribute to integral decision making factors in the Technology Acceptance Model such as how a person believes a certain technology may help enhance the individuals performance of tasks, as well as how much effort a person would have to exert in order to efficiently utilize the said technology. These factors, as referred to in the TAM as the  Perceived Usefulness  and  Perceived Ease Of Use  respectively, are key components that play major parts in the influencing of individuals to acquiesce to the growing role of technology in todays modern times. Due to the differences observed between men and women in these fields, with women showing less favorable results, it is logical to conclude that there is in fact a gender gap in technology   a facet of modern culture that often goes overlooked.

Despite these overwhelming facts and figures, recent studies have shown that the rate at which women are subscribing to online Social Networking Sites continue to grow by the day, at a steadily increasing rate. According to recent studies conducted by Inside Facebook, an independent division of the Inside Network, women currently outnumber men in every demographic on Facebook, consisting of 56.2 of Facebooks US audience as of February 2nd, 2009. It listed the 18   25 year-old age group as the largest demographic of Facebook users, totaling to 19,319,820 users with women outnumbering the male audience by 1,791,620 at 10,409,700 users listed in the US alone (Inside Facebook 2009).

Back in July 29, 2008, San Francisco based startup RapLeaf released data citing that for all social networks, women outnumber men for those in the age bracket of 14 to 34 years of age, while men outnumbered women in the 35 and above demographic (RapLeaf 2008). This could be due to the fact that childrens exposure to computers are getting earlier and earlier as technology progresses and this could lead to females overcoming their anxiety over computers at a much earlier age, possibly even surpassing that of males. If the Gender Digital Divide showed the difference in preference between men and women with regards to computers, the introduction of the Internet changed that with the sudden rise in female users.

Age
As technology progresses, more and more people are being exposed to computers at n early age. It used to be that computers were exclusively used only for processing large amounts of data, a technology reserved only for those who need it but nowadays, most households are in possession or have access to a computer. Even students have turned to computers for the basic needs of completing their school assignments. Due to the popularity of the technology, use of computers have widened from the professional, to the casual, and even down to the recreational. No longer exclusively for work, computers can now be seen everywhere, from offices to homes to shops. This proliferation of modern technology made it possible for children to get an early start on their computer education.

Along with the appeal of gaming on computers, social networking is also one of the major factors as to why the computers suddenly piqued the interest of the youth of today, most especially women. The appeal of online connectivity is the idea of keeping in touch with friends who are far away, because it s cheaper to send an email rather than to call the person. Studies have shown that women, more often than men, use the internet not only for research and games women today use the internet to communicate with friends more than men. Their presence in the digital world is also not one of little circumstance, as social network site developers have been creating wholesome and fun environments in the form of social networks to allow for them to have fun and experience the each others company without living their comfort zones.

Focusing mainly on games whilst featuring member profile customization and searching, sites have aimed towards young women have started to crawl out of the woodwork. Websites such as ClubPenguin.com offer wholesome fun while providing a level of interactivity that would entice young women to join them. It launched in October of 2005 and has captured the hearts of the young women as well as the women whose hearts are still of kids (Club Penguin 2010). Other sites such as GaiaOnline.com and Habbo.Com allow for deeper customization features to truly personalize their online counterparts or  avatars  (GaiaOnline 2010) (Habbo 2010). This goes to show just how much a market the female computer users are.

On the other end of the spectrum are social networking sites for the elderly. Proving that the older generation is not to be left out in the online revolution, sites for the elderly have been developed to showcase features that would help the elderly adapt to todays modern times.

A recent study by Inside Facebook also showed that as of February 2 2009, the fastest growing demographic on Facebook was the 55 year old and above women category which grew by 175.3, overshadowing the males of the same age bracket which only had a growth of 137.8 as form September 2007 to February 2009 (Inside Facebook 2009).

Social Networking for the elderly is also seen as an effective means to combat feelings of inadequacy and loneliness in general in older people but is more prominent for old women, as it answers the social needs of people which is a factor that gets more and more inconvenient as people grow older. To allow for the elderly to remain in touch with their friends and families (who have most likely shifted their interactions to the much convenient digital realm), sites have been focusing on making their interfaces much easier to comprehend for the elderly. Among the more prominent sites is Jive, developed b Ben Arent which aims to provide hardware as well as software to allow for elderly technophobes to keep up and stay in touch with the modern families of today (Arent 2010) .

One thing of note about the social media is that with its continued rise in popularity, the contradiction between society and technology is being breached by breaking the traditional perception of technology being dominated by men, specifically of the more mature bracket. The prominence of both ends of the age spectrum goes to show the broadening of the online social media, alleviating the polarization between technophobes and techies which leads to a common ground for everyone which is important in todays modern age of computers.

That said, the technological revolution we are all experiencing is bringing mostly everyone on equal stances on the modernization of the world we live in, breaking the cultural barriers of age, gender, and location, as people of all age and culture are given a means to voice out their concerns, feelings, or anything else that they may want to get off of their chests, providing a great means for catharsis which helps in intrapersonal development as well as in developing social skills.

Culture
Undoubtedly, all these empirical evidences would somehow lead to effects on global culture, as the Internet is a factor that is not tied solely to any one country. Studies show findings not only for online cultures but also in the development of real life cultures which exist outside of the Internet.

Take for example the effects of social networking on women. Although the earlier notion was that of technology being something that males, rather than females would be more inclined to take up, leaving females at a disadvantage, the sudden outnumbering of women over men in terms of social networking has shown that the Gender Digital Divide is something that has been overcome in a way, as women are more likely to work with computers nowadays than before. The Gender Digital Divide has definitely been narrowed down, from the old days of men dominating the computer industry, to today where man and woman are of equal footing with each other in terms of technical knowhow and capability, albeit of different preferences.

The Internet itself has led to many influences in real world cultures as it has helped speed up the passing along of information,allowing people from the other side of the world the opportunity to influence those on the other side not only in decision making but also in cultural trends, technological advancements, thoughts and philosophies, concepts, ideas, visual arts, music, literature given the appropriate circumstances, the possibilities are enough to completely overhaul certain pre-existing cultures.

The same can be said of the other way around, wherein it is the culture in the real world that affects how people of different demographics, particularly women, behave and conduct themselves in terms of their activities on the World Wide Web, thus affecting the development of Cyberculture as well. As earlier stated in this literature review, the way boys and girls are raised differently directly affects the development of a person and how he or should would live out his or her life and make his or her decisions, thus affecting an individuals decision making on the Internet as well.

In terms of market structure and development in relation to culture, the online culture of the Internet is perceived as a new means to communicate, not much different from TV, radio, and newspapers, wherein popular shows, segments, or in the case of the Internet, websites, are flocked by consumer companies looking to advertise themselves to a larger audience depending on their target customers this on top of the perception of the Internet itself as a product of the Information and Communications Technology industry and in itself , a marketable product that stands as a product of substantially profitable interest.

According to the studies conducted by Geert Hofstede, a professor of psychology in the Maastricht University. In the Netherlands, Internet culture, or Cyberculture as it is more commonly known, derives from the traditional connotations of culture, albeit in a more loosely based context as it is contributed upon by users of the Internet who, as we all know, may come from any part of the planet that may have Internet access. This new form of culture is one that is considered to be the only global culture by some and is one of the most influential cultures of all time.

Hofstedes Cultural Dimensions
The word  culture  typically has different uses but for the purposes of this paper, we would refer to the common connotation of the word which pertains to a group of objectives, values, attitudes and traits as basically defined by communities, organizations, groups, or institutions. Eventually evolving into a study or analysis of these shared traits, experts and professionals were developed to devote their time and efforts into the study of culture and how it affects people and society and is turn affected by different factors.

With the latest trends of technological advancements, computers have successfully bridged the distance gap by providing successful two-way means of accessing and sharing information, denizens of the digital world have proceeded to unwittingly create their own specific culture them in being a group created their own traits and values.

Geert Hofstede, an expert on cultural matters as a professor in the Maastricht University in Netherlands, defined culture in his website first as  civilization  which encompasses manners, education, arts and crafts. The second definition is a derivative of social anthropology, although had recently developed a more distinct connotation that refers too the way people act, feel, and think, denoting a commonality in how minds work in distinguishing people of a group or category from another (Hofstede 2010). This may refer to countries, regions, jobs, organizations, institutions, ethnicities, even genders.

Focusing the paper on gender as a culture, we analyze the effects of this specific culture with regards to the recent developments of the demographic on social networking systems, as well as the effects of their participation in this current online trend on themselves as a culture as well as the pre-existing cultures that they may be a part of. We do this by basing the studies and findings on Geert Hofstedes model of cultural dimensions and applying it as a means of analyzing our subject.

Hofstedes Cultural Dimensions are ideas developed by Hofstede himself based on cultural differences between many different countries on a global scope. These studies combined to create independent dimensions of national culture differences. Although these are based on national cultures, we will apply these dimensions to the global community that is the Internet to see its effects on the culture of women and social networking in general.

Power Distance Dimension
The first Hofsedes dimension discusses how those of lesser power accept the unequal distribution of power. In cases of countries and institutions, those who are generally less powerful accept inequality as a fact of life. Tackling inequality as viewed from those of lesser power, which in most cases is the majority of the organization or countrys population, this dimension is suggestive that an institutions views on inequality is promulgated by the followers just as much as by their rulers.

Hypothesis
Despite their numbers, women out of power generally accept their status as natural law.

In applying this dimension to our studies, we can say that since majority of women on the Internet   despite their strength in numbers growing rapidly, are generally more accepting of their lesser roles if that is truly the case and could possibly still be attributed to the patriarchal society that majority of the world still lives in.

Individualism Dimension
This part focuses on the definitive traits of that considers a person an individual as opposed to being part of a collective. A culture with high individualism rates would generally have looser ties when compared to those with lower individuality dimension rates or those of high collectivism rates. This strongly distinguishes an individual from those around him or her as having high individualism in an institution or organization or even in a country would generally mean for people to be looking out mainly for themselves or those of immediate relations or proximity. Collectivism on the other hand would mean for a person to be primarily faithful to that group which he is birthed into, such as families or faiths, often with unwavering loyalty.

Hypothesis
The fact that more women are getting into social networking sites is evidence to both the individuality and collectivity of womens culture.

In their subscription to social networking sites, women are the current leaders in profile customization, showcasing diversity in their persona. The fact that they are into these social networking sites however, allow them to form bonds with each other, and as  a natural instinct to women, tend to protect and support each other hence fueling collectivism among them.

Masculinity Dimension
Hofstedes third dimension seeks to define a cultures distribution of roles according to gender. According to the studies, mens values typically differ from one nation to another, often with dimensions of competitiveness and assertion of ones self as opposed to softer, more caring values implicated by women. Unsurprisingly, womens values are also more general and differ less from one country to another due to this fact.

Hypothesis
The difference in values between men and women is what leads to women dominating the social networking scene.

Perhaps the most applicable of Hofstedes Dimensions to this study, the obviously high rate of femininity dimension in the culture of social networking women is what leads to their prominence in the said activity as it is in generally in their culture as women to share and care as well as build a lasting community   features that are showcased in most social networking sites.

Uncertainty Avoidance
This dimension tackles that of which society - or in some cases - organizations and institutions situate themselves in dealing with matters that are as of the moment beyond their understanding. It features how a culture would react towards unstructured occurrences, approximating their comfortability with regards to topics such as faith.

Hypothesis
Women in general are more prepared and tend to act accordingly when faced with situations that are out of the norm.

Quite possibly one of the less applicable of Hofstedes dimension in our study of culture and how it affects women in social networking as its effects on both male and female are pretty much the same leaving us with the outcome of which is the minimal effects it has on women and social networking. Although the female culture in general and the way their values were inculcated in them could quite possibly be the reason for womens easier adaptation to online changes.

Long -Term Orientation Dimension
This dimension is what importance a certain culture gives to its future, as opposed to its present as well as its past. Those oriented with the short term dimension of culture tend to be more focused on attitudes that are possibly influenced with the past or present, focusing on their immediate concerns, while long term dimension oriented cultures tend to focus their actions and decisions on those that will affect them in the long run, looking to lasting resolutions even if they may be far from the present.

Hypothesis
The possible focus of women on the long term orientation dimension has possibly led to current trends in social networking culture by women such as those of building relationships and sharing to the world therefore leading to their prominence in the field of  social networking sites.

These dimensions are of particular interest as it would allow us to properly analyze the effects that culture may  have on women that led to the development of their prominence in social networking sites. In effect this research model also works a basis for finding out what factors led to the sudden dominance of women in this field and possibly predict the succeeding trends in the digital world in relation to gender, specifically with women.

Graphic Design for Children

Kids are very attracted to visual treats. Therefore, the usual trend in kids menus are usually bright and catchy themes. The most colorful, the better. Famous characters such as hello kitty, dora, and spongebob are the usual subjects used to tweak a certain product. This is a great way to attract the attention of kids because they watch these characters everyday and are very entertained by them. Since they are recognized by kids anywhere, I think that it is a good idea to make a character that would be distinct and will embody the restaurant that whenever kids see it, they will definitely recognize it and think of the restaurant.  For Rusty Schooner, my idea of a kids menu would give the effect that a kid would undergo an undersea adventure and will feature a female diver serving as the guide. My female diver will exude charm as I will design it with a cute face and form together with other sea creatures who will look very friendly and fun. Putting in a little bit of dialogue and maybe putting in names of creatures would add to the informative aspect of the menu. This would be a good technique and will make the menu cohesive to the coastal atmosphere of the restaurant. Since kids love to brag, the pieces of information they can get from the menu is something that they can share with other kids and by word of mouth, more kids would want to eat food out of the cool menu. In addition, a mascot of the female diver will be a fun addition and selling accessories and stuff that are inspired by the restaurants products and characters will increase sales and improve marketing.

To Marcia, Dora the Explorer is such a big hit with kids. Not only do kids learn from it, but they are very entertained. The illsutrations are bright and colorful and I think that this adds a lot to the appeal. Your idea is agreeable since I think that visual stimulation is very important and before you can educate, you need to catch the attention of the subject first and foremost.

To Laneet, I think that the idea of an interaction with a kid and the parents during eating time is really good. It can be a venue for a parent to teach the kid a thing or two while bonding. However, you have to make sure that the games should be changed every now and then because loyal customers who keep coming back may tire of the same stuff when there are not new ones.In addition, the game should not take up a lot of time as it will keep the kids attention away from eating.

Chrysler Organizational Technology Plan Paper

The Chrysler Corporation was founded in 1925 by Mr. Walter P. Chrysler. The company expanded in 1928 by buying Dodge and simultaneously creating two new divisions namely, DeSoto and Plymouth. In the year 1987 Chrysler acquired the American Motors Corporation and its renowned brand Jeep. Later, in 1998 the company merged with Daimler-Benz Corporation and became DaimlerChrysler Motors Company LLC until 2007 (Chrysler Company History ). The American equity firm Cerberus acquired an 80.1 stake of the Chrysler LLC in 2007 thus leaving only 19.9 to Daimler AG.

Chrysler has been an epitome of innovation in the past. It was the first company to introduce four wheel hydraulic brakes in 1924 and rubber engine mounts in 1926. It has also taken a very scientific approach to designing cars by keeping in mind the effects of aerodynamics on automobile performance.

Chrysler has different brands that cater to the needs of different people across the world. It has distinct brands for different purposes, for passenger cars and minivans the corporation manufactures Chrysler and Dodge, for trucks and commercial vehicles they manufacture RAM while for SUVs they manufacture Jeep. Thus, they have a distinct brand for virtually all driving vehicles categories.
Although the company houses so many different brands it suffered during the current financial meltdown and was unable to keep the sales going at a reasonable level. Hence, the company filed for Chapter 11 bankruptcy in April 2009 and planned to get into a partnership with Italian automobile makers Fiat. The plan proposed that Fiat will initially hold a 20 stake while it can later go up to as much as 51 provided that it could meet up with the financial and development goals of the company.
Chrysler has added a number of unique technological features in its cars recently. These features are aimed at improving the driving experience as well as making the cars more fuel efficient.

Latest technologies for Chrysler LLC in 2009 include an in-vehicle wireless internet connectivity system which uses EVDO and 1xRTT system. The system also provides connectivity to multiple users in the car through Ethernet as well as wireless. The dual connectivity system allows passenger to be connected to the internet no matter where they go.

Chrysler has introduced iDFSO (Interactive Decel Fuel Shut Off) which is software that detects the motion of the car while it is decelerating and cuts the fuel supply to the engine to save on the gas consumption. This system will be added to almost all the upcoming models of the cars in 2009 and 2010.

Chrysler has improvised its engine technology and will be developing a more powerful and fuel efficient version of its renowned Hemi engine. This technology is aimed at improving the fuel economy and delivering an improvement of more than 40.

Theres a technology called blind spot monitoring which Chrysler has introduced. This aims to aid the driver while switching lanes or if he is being passed by unseen vehicles. The system uses ultra-wideband radar sensors for detection and the driver is notified through icons on side mirrors and audio alerts.

Another interesting technology is Rear Cross Path. RCP seeks to assist drivers while they are moving their cars out of a parking lot and there is heavy traffic behind them. The system warns the driver reversing the car about the presence of other drivers in the lane. The warning is shown through icon and an alert through a chime.

Censorship of Google in China

Internet censorship is the process of enacting controls to suppress the publishing of or access to information on the World Wide Web in the same way that rules can exist within a country to censor the publishing of certain information. However, internet censorship, due to limitations on censorship technologies, may not prevent access to information stored in servers outside the servers that exist outside the borders of the country implementing the censorship policy (Kitazume, 2010). In the Peoples Republic of China, information related to Tibetan and Taiwanese independence, police brutality, pornography, freedom of speech and expression plus the Tiananmen Square Protests of 1989 is censored by the government (Wines, 2010). Google aims at providing information to all users of the internet, and this has been the source of conflict between the corporation and the Chinese government.

Technology used in China to block internet access
The Chinese government has put up an elaborate technical system to block access to the categories of information listed above. Below is a brief description of the main technologies employed.

Uniform Resource Location (URL) Internet Filtering This is a technology in which internet content requested by an internet user is scanned by servers located at internet gateways for targeted key words (Thompson, 2006). For example, the key words Tiananmen Riots, if detected in content requested by a user, will lead to the whole webpage being blocked. This protocol works in the hypertext transfer protocol (HTTP) and may be circumvented using encryption protocols or escaped characters in the page.

Internet Protocol (IP) Blocking This is the use of codes to deny access to IP addresses containing material that is censored (Wines, 2010). All IP-based internet data transfer protocols including hypertext (HTTP), file transfer protocol (FTP) and POP are all affected by this censorship technology. Google had allocated additional internet protocol addresses to prevent IP-based blocking but the block was redefined to cover even the new addresses and IPs (Wines, 2010).

Domain Name System (DNS) Filtering This technology involves not resolving domain names or returning incorrect IP addresses requested by a user of the internet (Thompson, 2006). IP-based internet protocols like HTTP, FTP, POP and others are all affected by this censorship technology.
China blocks searches bearing the names of political leaders but the problem with the system is that the system is in some ways so crude that it blocks harmless content for example, typing the word Carrot while in China returns no results as the word contains a Chinese character that is also found in the surname of the President of the republic, Hu Jintao (Branigan, 2010). This leads to limitations in the access to information. With censorship efforts being stepped up, several websites and blogs have been shut down because of publicly speaking up about corruption, the manufacture of substandard goods and contaminated baby and human foodstuffs (Branigan, 2010).

Google-China row the cause
The Peoples Republic of China, due to its tough censoring policy, restricts the nature of information a person can access from the internet. The levels of censorship vary from one population group or another but ultimately affect the entire population. For example, residential places and restaurants that serve people who are not Chinese nationals have more relaxed censorship but in some public schools, there is prevention in the use of search engines (Wong, 2010).

Google Corporation runs the largest search engine and advocates for a free internet but the Chinese governments policy of censorship affects its business in the country. The search engine had imposed upon itself some censorship measures for its Chinese site HYPERLINK httpwww.google.cnwww.google.cn but in March of this year, it stopped censoring search results in China (Wines, 2010).

Google reneged on an earlier agreement it had signed with the Chinese government to censor search results in China in line with the Governments censorship policy after complaining of cyber attacks the corporation said they were coming from the Chinese government (Wong, 2010). These attacks are alleged to have targeted Google and other IT companies and are believed to have originated from within the borders of China. They resulted in loss of information on the part of Google, and are said to have targeted the e-mail addresses of human rights activists hosted by Googles Gmail. As a consequence of this attack, Google announced that it would have to review its Chinese operations in China.

The Chinese government in turn accused Google having intricate ties with the United States government and of providing information on searches conducted in China to intelligence agencies in the United States (Branigan, 2010). Google protested the interference of its operations and moved its operations from mainland China to Hong Kong. Commentators hailed the move by Google as plausible, having the opinion that at last a multinational corporation was finally stepping up to protect its consumers basic human rights and freedoms saying that internet censoring in the Peoples Republic of China violates peoples right to information.


Consequences of the Google-China row
Googles capacity for business
Google is the most popular search engine in the world but the Chinese online search market is dominated by Baidu. However, Google derives almost 2 percent of its 24 billion U.S dollars in annual revenue from the Chinese market. In addition to this, the Chinese IT market is the most rapidly growing market in the world (Reuters, 2010). If Google were to fully withdraw from China, its long-term strategy for building the broadest search engine and information database will be significantly compromised (Reuters, 2010).

The social impact
The internet is rapidly becoming the preferred source of information for many Chinese citizens. In fact, internet usage in the Peoples Republic of China is expanding at a rate much higher than her economic growth. Over 100 million users conduct business on the internet, and over 400 million people, especially the younger generation, use the internet on a regular basis (Kitazume, 2010). The internet has therefore revolutionized the way people gain access to news and information bearing in mind that the news appear on the internet are very different from what state and other conventional media line television and newspapers report. The withdrawal of Google will thus be a victory for the suppressors of free information movement and by extension democracy and other human rights.

Conclusion
After the exit of Google from the Chinese market, Baidu, Chinas leading search engine has emerged to be a big winner. Its market domination of the Chinese market rose from 59 percent to over 64 percent, and so has its revenue (Reuters, 2010). Google is still however selling advertisements in mainland China through its Hong Kong-based site HYPERLINK httpwww.google.hkwww.google.hk, but the content of the latter makes use of simplified characters of the Chinese language which may lead to erosion in the quality of information.