Friday, December 27, 2019

Jilting in William Faulkners A Rose for Emily and...

Jilting in William Faulkners A Rose for Emily and Katherine Anne Porters The Jilting of Granny Weatherall Webster’s dictionary defines the word â€Å"jilt† as the act of rejecting a lover. So to be deserted by another, left at the altar, or unwanted by another, is to be jilted. In William Faulkner’s â€Å"A Rose for Emily† and in â€Å"The Jilting of Granny Weatherall† by Katherine Anne Porter, Emily and Granny Weatherall throughout the course of their lives experience jilting several times. In turn, this rejection places a significant emphasis on both of their lives. After Emily’s father passes away in â€Å"A Rose for Emily,† Emily’s sweetheart rejects her. The only man that her father must have approved of ran out on her, leaving†¦show more content†¦With this discovery, Emily knew she could never have him and could not bear the thought of another man that she loved leaving her. This must have been the breaking point for her. Emily was determined not to let another man leave her for the third time. Therefore she purchased the arsenic so she could be with him forever. The last person to see Homer was a neighbor as the Negro man was admitting him in at the kitchen door at dusk one evening. Again, Emily submerged herself into the familiar calm of isolation until her death. After her funeral, the narrator (the town) paints the picture of their discovery in the room above the stairs. A room in which no one had seen in for forty years. â€Å"The man himself lay in the bed. For a long while we just stood there, loo king down at the profound and fleshless grin. The body had once lain in the attitude of an embrace, but now the long sleep that outlasts love, that conquers even the grimace of love, had cuckolded him. What was left of him†¦. Then we noticed that in the second pillow was the indentation of a head. One of us lifted

Thursday, December 19, 2019

Risk Management An Investment Decision Making Process

Risk management refers to the process involved in identifying, analyzing and acceptance or preventing of uncertainty in an investment decision making process (Dorfman, 2007). In most cases, risk management is carried out to control losses that may occur as a result of an event that may occur in a business. It is good to note that failure by a business to take adequate risk management can result to severe loss or consequences, not only for the business, but also for individuals. In simple terms, this is a two step process that involves determining the risks that may arise and the dealing with the risks in a way that is most effective for your business investment goals (Hubbard, 2009). This article provides an example of how failure to put the right risk management strategies can lead to massive loss in a business. The article uses Spear Investment Company located in New York as a perfect example of a business that failed to apply risk management properly. The paper will also look at h ow the company management would have acted before to avert the consequences. Staff turnover is one of the major risks that affect many business and this is what made Spear Investment company fail terribly in it mission to attain its goals because it led to massive losses. It was in 2008 when the company faced a massive staff turnover as a result of dissatisfaction by the employees because of the way they were treated by the management of the company. The dissatisfaction led many employees toShow MoreRelatedApplication Of Management Accounting Theories Essay1541 Words   |  7 PagesExecutive Summary Management accounting is one important area which is widely used in many industries and areas. The application of management accounting theories, methods, tools and principles could influence one company’s decision making process, evaluation process, performance estimation and investment management. This report will emphasize two important areas which are investment appraisal and variance analysis which are used to make the decision and estimation. For investment appraisal methodsRead MoreFinancing And The Development And Implementation Of Strategies1190 Words   |  5 PagesSUMMARY The role of finance within the strategic planning process has become more relevant than ever. With the introduction of the balanced scorecard the financial performance of a firm has been emphasized has a key indicator of success and links strategic goals to performance and provide timely, useful information in order to facilitate strategic decisions. The article, The Role of Finance in the Strategic-Planning and Decision-Making Process, by Pedro M. Kono and Barry Barnes discusses how financialRead MoreThe Government Accountability Office Is A Challenge For The Congress And The Administration1313 Words   |  6 Pagespractice of effective risk management is a challenge for the Congress and the administration. Risk management is a strategic process in helping policymakers to make decisions about assessing risk, and having limited allocating resources in taking action under conditions of uncertainty (GAO, 2008). However, with the policymakers recognizing the risk management, it helps them to make informed decisions, while Congress and the administration have charged federal agencies to use a risk-based move to prioritizeRead MoreWhy WP Should Apply ERM for Stakeholders Essay932 Words   |  4 PagesCOSO, ERM is: †¢ A process, ongoing and flowing through a company; †¢ Every people at every level of an organization will affect ERM; †¢ ERM is applied in strategy setting; †¢ ERM is applied every level and unit across the company and consider the risk at entity level; †¢ Identify the potential risks which affect the company and manage these risks within its risk appetite; †¢ Has the ability to provide suitable assurance to the management and boards. Why WP should implement an ERM process and what are theRead MoreWho Are The Individuals That Should Be Involved In Making Capital Investment Decisions721 Words   |  3 Pagesinvolved in making capital investment decisions. These executives would include the CEO, CFO, COO, as well as other top level managers. Most companys will usually have a group of executives to make these types of decisions. This is because these individuals will have backgrounds and associations with other companies unlike the others in the group. This will aide the management team in bringing a separate knowledge base to make the best possible decision (Ang Trotman, 2015). Capital investment decisionsRead MoreThe Government Accountability Office : A Challenge For The Congress And The Administration1313 Words   |  6 Pagespractice of effective risk management is a challenge for the Congress and the administration. Risk management is a strategic process of helping policymakers to make decisions about assessi ng risk, and having limited allocating resources in taking actions under conditions of uncertainty (GAO, 2008). However, with the policymakers recognizing the risk management, it helps them to make informed decisions, while Congress and the administration have charged federal agencies to use a risk-based move to prioritizeRead MoreEssay PRINCE 2 Project Management Methodology 1216 Words   |  5 PagesHistory of PRINCE2 PRINCE2 (Project in Controlled Environments, Version 2) is a project management methodology that are released in 1996. It was based on combination of two methodology that is PROMPT (Projects Resource Organization Management Planning Technique) and IBMs MITP (Managing the Implementation of the Total Project) methodology. PROMPT that is originally created by former IBM Project Managers in 1975. Central Computer and Telecommunications Agency (CCTA) one of IBM’s client which is responsibleRead MoreRole Of Finance For The Innovative Management Process1457 Words   |  6 Pagesinnovative management process; Paper 1 The article discusses how the fundamental success of a strategy depends on some very important factors. It is important the company is in alignment with the external environment, that it have a realistic internal view of company core competencies and that the company has or will have a sustainable competitive advantage. It is also important the company proceeds with careful implementation and monitoring of its financial resources during the innovation process. ThisRead MoreRisk and Return Tradeoff Memo1103 Words   |  5 PagesHEAD: RISK Risk and Return Tradeoff Memo The process of portfolio construction can be quite complex. Analysts go through reams of statistics – past performance, future potential, and industry knowledge and rely on personal insights into the market to arrive at the final list (UOP, 2009). Every investor aims to maximize returns while minimizing risk. Individual securities must be evaluated not only on the risk-return trade-off in isolation but also on their contribution to the risk-returnRead MoreThe Information Which Goes Into Financial Decision Making1231 Words   |  5 Pagesgoes into financial decision making can be divided into two parts: future estimates and historic facts. When deciding on whether or not to sign off the business case of the project, one of the main issues the project sponsor needs to think about are the financials. He needs to firstly find out if the project will make a profit, then secondly what the profit is, with financial timescales. When making an investment appraisal, there will always be other options for investment. Even if it’s just

Wednesday, December 11, 2019

IT Management Issues for Developing Economy- myassignmenthelp

Question: Discuss about theIT Management Issues for Developing Economy. Answer: Introduction The current business environment is that of globalization and developing economy, and thus many businesses are trying to attain the maximum market attainable in both levels of market, that is, global and local markets. Everyday business people struggle to attain their ideal objective. For this reason, businesses have been working extra hard to tout-do their competitors in several different ways one of the commonly known way is merger and acquisition (MA). The main objective of expanding and growing a business is to gain financial stability and profit maximization for stakeholders. (Gleich, Kierans, Hasselbach 2010). The assumptions made include the following: Monet has already merged, it has implemented the ERP and the intelligent portal. Also the loyalty scheme is being practiced. Mergers and acquisitions (MA) offers firms and companies possibility of a wider and bigger share in the market and diversification. Monet (group of 5 holiday resorts) are utilizing this technique for the purpose of growing the 5 resorts. The objective of the managements decision was expanding their market, increasing the number of clients so as to get more, achieving financial stability and become more competitive. With the current conditions of economy MA have achieved quality across the global market. Also technological advancement, competition and globalization has facilitated growth of MA. (Dringoli, 2016). Concept of Mergers and Acquisition Merger involves mutual agreement between two or more businesses to combine and become single business. The idea of MA has brought about increased profits and reduced operational costs through operational and structural benefits brought by merger. The benefits that come around by merging are vast and include the following: the business is able gain power, control and dominance in the market environment, efficiency value is increased like cost savings and enrichments, resource sharing bring about economies of scale offering competitive advantage due to reduced costs, the risk of utilizing innovative methods of financial risk management is greatly reduced and the best benefit is tax advantage. (Sherman, 2011). However, success of a merger depends on the efforts and strategies of the merging businesses. If this is not done well by the Monet management, it will lead to some disadvantages including: experienced workers will be lost, small merging business workers need exhausting training, the merger may experience difficulties due to competition among the employees of the combined resorts, there is over capacity of business that may require retrenchment and duplication. (Hassan, Ghauri, 2014). Information Technology and Information System Issues Information technology has led to development of new communication channels thus facilitating customer connection. In this generation nearly everybody is connected via the internet and people can easily connect and chat and share experiences. This has led to expectations of customers changing like they expect quicker, better and quality services. Clients now know that they possess power to choose what they want, where and when to have or go. Therefore, Monet implementing ERP systems and intelligent electronic portal is a way to satisfy these customer demand. (Chew Gottschalk, 2009). An information system (IS) is integrated components for gathering, processing, displaying storing information in form of knowledge. Monet utilizes such systems to run and control their day-to-day processes and interact with customers to attain market power. Also the company can use information systems such as ERP and web 4.0 portals to monitor and control operations and extend services to customers. (Cohen, 2012). ERP Benefits to the Monet and its Customers According to Worster, Weirich Andera (2012), ERP implementation brings several benefits to the company including: Competition- ERP software needs a big investment. But a greater cost lies in not making the investment. Businesses cannot risk failing to implement ERP while their competitors gain the benefits of employing the system. Seeking technology solutions will ease ways of lead generation. Efficiency- An ERP solution get rid of duplicate processes and reduces greatly the urge to manually key in information. The system will also smoothen, and simplify business processes and improve efficiency for organizations to collect information, regardless of what department they are operating in. Forecasting- correct forecasts are created through implementation of Enterprise resource planning software because it offers users and managers the tool they require. Business are able to make estimates that are more realistic and more effective prediction Collaboration- department collaboration is important and a necessity in a business structure. Departments are able to operate together if the data keyed into ERP systems is consistent and centralized. The software also deals with most aspect of a business, thus automatically motivating collaborative, interdepartmental energy. Scalability- designed ERP systems permits the addition of new clients and operates to improve the solution implemented initially with time. When the business is ready to move to the next step or requires more resources, ERP software should have the ability to facilitate that growth. Reporting- ERP software ease reporting and makes it more customizable. With enhanced capabilities of reporting, the organization can respond easily to complex information requests. Consumers can also execute their reports without depending on the assistance from IT, thus saving time of the users. Some of the customer benefits associated with the implementation of ERP include; service delivery is fast- when inventory information is correct and is accessible easily, orders are sold faster. An ERP system enables updates of real-time to maintain correct inventory information. In circumstances where customers are used to booking resorts, or tours at the click of a button, faster booking order fulfillment is vital.(Kimbrell, Ellis East Carolina University, 2013). Accurate services- correct fulfilling services needs cross-functional collaboration between reservation, billing, tour guide among others. ERP data is distributed among several departments thus bettering insights, and keeping everyone aware about service status. When services are met correctly and on time, client satisfaction is enhanced and expenses that come with errors are reduced. (Chetty, 2016). Improved Customer Service- When client service representative have permission to access detailed customer data all in one portal, customer requirements can be met faster. An ERP system can be structured in a way that the user is able to view the most relevant data on his or her custom-built dashboards for example client related information versus daily information of the entire system. Thus simplifying the access of required information. (Information Resources Management Association, 2011) Lower Costs- ERP software minimizes operation and administrative costs by reducing errors, repetitive duties, and excess inventory. Monitoring operations also aids in prevention of downtime and disruptions, and enhance betterment of employee management and program. Best clients are prioritized and rewarded with free tours among other offers. When organization processes are made better, both the company and clients reap the benefits. Impacts of Web 4.0 Level Ultra-Intelligent Electronic Portal Creation of such a portal will enhance interaction of Monet customers with their website. When customers visit this site, s/he will be recognized if one stands in front of the recognition devices like scanners and cameras the system will identify the customer and say word like: Welcome to Monet, services at its best. How may I help you today Customer Name? such a system makes a customer feel recognized and have a feeling of belonging. Many people want a system that interacts with them with less typing and this system will be unique to Monet business. (Ozkan, 2010). However, implementing such a system to a newly merged enterprise is a big risk to a business. This technology is sophisticated and may be complex to customers when interacting with it. Clients tend to prefer easy to use portals and therefore since web 4.0 will be a new technology, it may not be well received by customers. (Murugesan, 2010). There are a lot of opportunities that can come up with merging the 5 resorts into one. The company may decide to diversify its services not only to be the normal resort services but they can venture into opportunities like transportation-airport pick up and drop for non-clients, entertainment- rather than the television sets installed in the resort rooms, the company may decide to venture in to cinema business where clients can be going there to watch movies. Such opportunities will expand the business territory and enhanced market power. (Nelson, Joos Wolf, 2013). Acquiring New Customers Achieving loyalty requires giving back something to your clients through rewards like free meals, airport transfers, and free tours. Hotel businesses should acknowledge that loyal clients are more profitable but can also shift to other competitive resorts. The loyal customers of an organization should sometimes be offered goods or services at a lower price. This will increase their loyalty thus increasing the profit of the business. It is essential to give reason to your clients on why they should stay and utilize your services. (Zeidler, 2009). The easiest and most efficient way of attaining this is by creating a client loyalty program. Investing energy and time in improving client loyalty should be a part of any business' marketing techniques. If you fail to invest in client loyalty, the likelihood of losing more client than attracting them is higher. (Bainbridge, 2017). An effective client loyalty scheme should utilize customer information and control each clients interactions with your business. This should include what they buy, why, and when. This knowledge permits you to provide useful and targeted rewards, like vouchers and rewards on what they buy. Offers like this are useful to the as they will make the customer come back frequently. This will lead to more sales for the business as the client redeems their rewards and use more money with your business.(Humby, Hunt Phillips, 2008). Targeted and tailored offers may also have a higher perceived worth than generic unique rewards. Bespoke rewards make the client feel valued and improves the relationship with you. This is an evidence to the customers that you understand their requirements, and thus helps in attaining customer. In addition, it gives the feeling that you are investing time to focus on them which helps enhance a positive emotional reaction. (Zeidler, 2009). This positive reaction can be employed and nurtured with the use of communications carefully. Frequent communication through the email or newsletter, will assist in relationship building and make your clients feel valued, while making sure they are updated on major pertinent rewards. Frequent clients engagement is also a method of achieving client loyalty. (Humby, Hunt Phillips, 2008). Benefits of Implementing Customer Loyalty Scheme The following are some of the advantages of having a customer loyalty scheme: Costs is reduced The evidence is in the numbers: generating new businesses from an existing client is five times cheaper compared to acquiring new clients. As such building customer loyalty scheme will reduce the cost of having a new customer. (Agnihotri, Rapp Business Expert Press, 2010). Recommendations the most efficient brand ambassadors are your satisfied customers. They are likely to recommend fresh business, which can ease sales and provide cheaper ways of lead generation. A survey conducted on customer loyalty revealed that approximately 20 percent of new sales achieved come from the existing clients. Repeat business Loyal clients invest more in your business. This is because they will repeatedly buy your services or goods over a long period of time. In accordance to the sales and business cycles, one loyal customer can bring more profit annually than maybe ten first-time clients. Bigger sales building relationships with loyal clients, leads to easiness on sales of higher volume of goods and. Thus, achieving client loyalty should yield larger profits and more sales. Clients that trust your business also listen and heed to your recommendations. This offers a chance to sell along your product lines. Staying ahead loyal customers place you ahead of your competitors. Organization that have built strong brand loyalty are immune to forces of competition which is vital in markets with regular new players. Conclusion It is said that a single size can never match it all. Many companies believe that the quickest method to widen business territories is exercising mergers and acquisition. Mergers results in economies of scale and collaboration resulting to reduced cost and increased operations. Stakeholders will agree to the idea of merging if they believe they believe it will lead to them having competitive advantage over their rivals. Advantages goes on and include gaining competitive advantage, market dominance, reduced operational costs among others. However, such a decision to merge come up with some disadvantages including employee competition and rivalry. Implementing ERP will make management of the different departments including accounts, tour guides, bookings among others. Recommendation Monet management, therefore, should go ahead to implement the decision because with it comes along a package of several advantages mentioned. Also for Monet to maintain market power then it should be gathering information on both their loyal and new customers on their preferences every season so as not to give them an option. It is also necessary for them to always follow up on clients about the services they received and what they would like get improved. References Agnihotri, R. S., Rapp, A. A., Business Expert Press. (2010).Effective sales force automation and customer relationship management: A focus on selection and implementation. New York, N.Y.] (222 East 46th Street, New York, NY 10017: Business Expert Press. Bainbridge, S. (2017).Mergers and acquisitions: A transactional perspective. Foundation Press. Chetty, N. G. (2016).The operational benefits of ERP adoption by third-party logistics organisations in South Africa. Chew, E. K., Gottschalk, P. (2009).Information technology strategy and management: Best practices. Hershey: Information Science Reference. Cohen, E. B. (2012).Issues in informing science and information technology. Santa Rosa (California: Informing Science Press. Dringoli, A. (2016).Merger and Acquisition Strategies. Gleich, R., Kierans, G., Hasselbach, T. (2010).Value in due diligence: New risks, new mitigation. Farnham: Gower. Hassan, I., Ghauri, P. N. (2014).Evaluating companies for mergers and acquisitions. Humby, C., Hunt, T., Phillips, T. (2008).Scoring Points: How Tesco Continues to Win Customer Loyalty. London: Kogan Page. Information Resources Management Association. (2011).Enterprise information systems: Concepts, methodologies, tools and applications. Hershey: Business Science Reference. Karenfort, S. (2011).Synergy in mergers acquisitions: The role of business relatedness. Kimbrell, J., Ellis, M. L., East Carolina University. (2013).The impacts of Web 2.0, Web 3.0, and Web 4.0 technologies used in distance education. Greenville, N.C.: East Carolina University. Murugesan, S. (2010).Handbook of research on Web 2.0, 3.0, and X.0: Technologies, business, and social applications. Hershey, PA: Information Science Reference. Nelson, R., Joos, I. M., Wolf, D. M. (2013).Social media for nurses: Educating practitioners and patients in a networked world. Ozkan, C. B. (2010).Free and open source software for e-learning: Issues, successes, and challenges. Hershey PA: Information Science Reference. Sherman, A. J. (2011).Mergers acquisitions from A to Z. New York: American Management Association. Worster, A. J., Weirich, T. R., Andera, F. J. C. (2012).Maximizing Return on Investment Using ERP Applications. Somerset: Wiley. Zeidler, C. (2009).Mobile support in customer loyalty management: An architectural framework. Wiesbaden: Gabler Edition Wissenschaft.

Wednesday, December 4, 2019

Techniques for Detecting, Preventing or Mitigating DoS or Distributed DoS attacks

Introduction The internet has become part of the daily lives of people throughout the world. Some services such as banking, transportation, and healthcare are heavily dependent on it. According to Patrikakis, Masikos, and Zouraraki (2004), the internet is an intricate system of computers that are linked with the intention of creating an easy communication platform.Advertising We will write a custom research paper sample on Techniques for Detecting, Preventing or Mitigating DoS or Distributed DoS attacks specifically for you for only $16.05 $11/page Learn More The frequent use of the internet, like other systems, has been associated with problems, with the example being the Denial of Service (DoS) attacks (Patrikakis, Masikos, Zouraraki, 2004). Different researchers have looked at how these attacks occur and/or the available methods of detecting prevention and mitigation. According to Patrikakis, Masikos, and Zouraraki (2004), a Denial of Service attack occurs when individuals or groups of individuals attempt to block the provision of internet services by an internet company to its users. On the other hand, Distributed Denial of Services occurs when the threat originates from multiple sources (Patrikakis, Masikos, Zouraraki, 2004). This research paper reviews some of the documented methods of detecting, preventing, or mitigating Denial of Service (DoS) and Distributed Denial of Service (DDoS). Background The prevalence of DoS and DDOS attacks has constantly been on the increase with the increased number of internet users and number of people with skills being capable of initiating the same. The prevalence of these attacks has necessitated increased research, with a number of articles being available on the same. The techniques used are constantly changing to keep up with the pace at which the attackers are changing their own tactics. The articles selected for review in the research paper were those that featured the appropriate me thods that are currently in use. The attack on DoS and DDoS takes different shapes. Different researchers have described the examples of the attacks together with how they may be prevented. The individuals and groups involved in the development of these attack methods have constantly developed tactics of evading any method that is developed to counter them, and hence the need for new methods to retain the security of the internet and its users. These methods are discussed below. Techniques from the Articles This section looks at the findings from the different articles. Charalampos Patrikakis, Michalis Masikos, and Olga Zouraraki (2004) did the first article that describes the detection, prevention, and mitigation of the DoS and DDoS attacks. In this article, the researchers describe the meaning of the internet, DoS and DDoS, and/or how the attacks on DoS and DDoS occur (Patrikakis, Masikos, Zouraraki, 2004).Advertising Looking for research paper on communications media? Let' s see if we can help you! Get your first paper with 15% OFF Learn More They discuss the basic mechanisms in the development of the problem before proceeding to examine how they lead to the eventual collapse of services over the internet for a company. Some of the mechanisms in use for detecting, preventing, and mitigating the attacks are also discussed in the article. One preventive measure that is suggested in the article is the constant update of software in machines (Patrikakis, Masikos, Zouraraki, 2004). Attacks are described as often occurring in machines that are not frequently updated. According to Patrikakis, Masikos and Zouraraki (2004), the update of software allows machines to work against the malicious attacks with ease. The users are able to prevent the attacks effectively as the software prevents the possibility of participating in an attack without its prior knowledge, and hence an effective measure of prevention. Observations show that frequently updated ma chines are better protected. The second protection measure discussed in the article is the monitoring of any access to the computer, installation of security patches and firewalls, and the adoption of automatic detection systems for intrusion (Patrikakis, Masikos, Zouraraki, 2004). According to Patrikakis, Masikos, and Zouraraki (2004), this method causes reduced traffic for offenders, with the machine frequently reporting on its health to a network. The owners are also able to keep track of the machine performance, thus allowing them to make any necessary changes, and hence an effective method of prevention that allows a greater degree of prevention of DoS and DDoS attacks (Patrikakis, Masikos, Zouraraki, 2004). The detection measure that is discussed in the article is signature detection, which involves the detection of footprints or signatures that are associated with sources of malicious programs (Patrikakis, Masikos, Zouraraki, 2004). The programs matching this signature are denied access to the machine, thus leading to a reduction of attacks. The researchers confirm that the method is effective because it is reliable and easy to utilize, with a better outcome in the detection of attacks as compared to other methods (Patrikakis, Masikos, Zouraraki, 2004).Advertising We will write a custom research paper sample on Techniques for Detecting, Preventing or Mitigating DoS or Distributed DoS attacks specifically for you for only $16.05 $11/page Learn More Zargar Saman, James Joshi and David Tipper (2013) provide the other article that looks at DoS and DDoS attacks. This article also defines the Distributed Denial of Services. It states that they are attempts to disrupt legitimate users of the internet. Besides, it discusses the existing measures in the prevention and mitigation of the same. The first detection mechanism that is stated in the article is the trace back mechanism. According to Zargar, Joshi, and Tipper (2013), thi s mechanism involves the tracing of IP packets backward to the real sources instead of leading to the forged IO addresses. This mechanism allows for detection and tracing of the origin of attackers. It is effective in achieving this goal. According to Zargar, Joshi, and Tipper (2013), the two categories in which these mechanisms apply is the packet marking and/or through link testing. The second detection mechanism stated in the article is the use of network-based mechanisms (Zargar, Joshi, Tipper, 2013). In these mechanisms, the measures to detect the attacks and the attackers are deployed within the network with the application of routers (Zargar, Joshi, Tipper, 2013). In these detection mechanisms, the main example is the use of the route-based packet filtering strategy (Zargar, Joshi, Tipper, 2013). This measure is effective since it allows the detection of threats while still in the network. The users do not receive the attacks on their machines. The process of detection is automated and more effective. One of the measures that are used to prevent attacks from the malicious individuals is the Active Internet Traffic Filtering (Zargar, Joshi, Tipper, 2013). In this mechanism, the receiver of the services opts to deny traffic to all unrecognized connections while only accepting traffic that is owned by a predetermined network (Zargar, Joshi, Tipper, 2013). This means that receivers have control over what they can access and/or what gains access to their machines. This measure is effective in prevention of threats since most of the threats are from unrecognized sources. The third article looks at the results of a survey conducted on the defense mechanisms to counter DoS and DDoS. It looks specifically at the network-based mechanisms (Peng, Leckie, Ramamohanarao, 2006). One of the detection techniques discussed by Peng, Leckie, and Ramamohanarao (2006) is the MULTOPS scheme that was proposed by Gil and Poletto in 2001.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More In this technique, the evaluation of packet rate is done between a subnet and the host (Peng, Leckie, Ramamohanarao, 2006). The assumption is that the rate is always proportional. When a disproportion is noted, there is an indication of a likely DoS attack (Peng, Leckie, Ramamohanarao). This scheme is useful as it helps detect the possible threats before they cause significant damage. However, some of the attackers have found ways of confusing the process. The other detection technique that Peng, Leckie, and Ramamohanarao (2006) discuss in their article is the SYN detection that they stated to have originated from Wang and his colleagues in 2002. This detection method evaluates the ration of several factors, including SYN, FIN, and RST (Peng, Leckie, Ramamohanarao, 2006). This method is as effective as any other method of detecting attacks. Users in the past have often described it as effective. The opinion is that the use of this method in the detection of DoS attacks will be ad equate. The use of ratios of different packets according to Peng, Leckie and Ramamohanarao (2006) is effective in the end because many attacks are prevented based on their characteristics (Peng, Leckie, Ramamohanarao, 2006). The article also discusses some of the prevention measures that may be used for DoS and DDoS attacks. One of the prevention measures that are discussed is the Ingress/Egress filtering, which involves the filtering of traffic that is coming to the local network together with the one that is leaving the same network (Peng, Leckie, Ramamohanarao, 2006). In this method, the malicious codes that are involved in the attack are filtered before they make any changes to the local network. They result in the security of the network as a whole (Peng, Leckie, Ramamohanarao, 2006). This measure is effective in the prevention of attacks to DoS and DDoS. The fourth article was selected based on its relevant to the subject on DoS and DDoS attacks. In this article by John Vac ca (2002), the internet service providers (ISPs) are recognized as important contributors towards network security. Their collaboration with customers is recognized as important in this measure. The article states a number of measures to detect intrusion and DoS and DDoS attacks in networks. The example of a measure that is proposed in the detection of attacks is the use of special software (Vacca, 2002) such as anti-viruses and online software that can filter the threats to the network and its users. This measure is deemed useful. The next suggested measure is the use of intrusion detection systems (Vacca, 2002). In this particular detection measure, Vacca (2002) confirms that the ISP Company will be efficient in evaluating the magnitude of the threats and use the available resources to counter them. The main example provided is the use of measures such as the specified intrusion detection systems. The measure is effective. The last article looks at the prevention of DoS and DDoS a ttacks through cooperation between the ISPs and the companies that form the bulk of their customers (Work Together To Stop DoS Attacks, 2001). The article states that the attacks may be mitigated through cooperation between the ISPs since they can exchange information on the sources of these attacks and lead to a safer internet (Work Together To Stop DoS Attacks, 2001). The article cites some of the attacks that have occurred, including the damage that they had on the respective organizations. The other measure that is proposed is the cooperation between customers and the internet service providers. This collaboration is touted as an important way of mitigating the threats posed by these attacks (Work Together to Stop DoS Attacks, 2001). The author states that networks must evaluate the measures that work in the prevention of attacks, including the network architecture and data access systems (Work Together to Stop DoS Attacks, 2001). These are recognized as important measures in th e achievement of total internet security. The article does not mention some of the measures that are specific to the detection of DoS and DDoS attacks. However, it establishes cooperation as an important measure in their prevention. Conclusion The internet is an important tool in the daily lives of most individuals. There are institutions that are dependent on it for normal functioning. Developments in security have led to frequent DoS and DDoS attacks, with internet users paying the price. These attacks have necessitated the creation of measures that are aimed at prevention, detection, and mitigation of any threats as discussed in the research paper. Reference List Patrikakis, C., Masikos, M., Zouraraki, O. (2004). Distributed Denial of Service Attacks. The Internet Protocol Journal, 7(4), 1-13. Peng, T., Leckie, C., Ramamohanarao, K. (2006). Survey of Network-based Defence Mechanisms Countering the DoS and DDoS Problems. ACM Transactions on Computational Logic, 2(3), 1-46. Vacca , J. (2002). Partnering for protection: ISPs and their customers must work together for stronger network security. Web. Work Together To Stop DoS Attacks. (2001). Web. Zargar, T., Joshi, J., Tipper, D. (2013). Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys Tutorials. Web. This research paper on Techniques for Detecting, Preventing or Mitigating DoS or Distributed DoS attacks was written and submitted by user Sara L. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.