.

Thursday, November 28, 2019

Property Notes Essay Example

Property Notes Essay TORRENS TITLE * System of title by registration rather than registration by title (Breskvar v Wall (1971) 126 CLR 376. * Indefeasibility- The registered proprietor holds the title free of all unregistered interests. S42 Real Property Act 1900 (NSW). * Registration of a void instrument confers immediate indefeasibility in the absence of fraud (Frazer v Walker [1967]] 1 AC 569. * Sir Garfield Barwick sitting on the Privy Council in Frazer v Walker described it as: â€Å"a convenient description of the immunity from attack by adverse claim to the land or interest in respect of which he is registered, which a registered proprietor enjoys† EXCEPTIONS TO INDEFEASABILITY * FRAUD- in the case of fraud a proprietor can be removed from the register. Fraud is not notice, it is dishonesty or moral turpitude (Assets v Mere Roihi [1905] AC 176 â€Å"Fraud must be brought home to the person whose registered interest in sought to be impeached, or to his or her agents acting within their authority. † Fraud must take place before registration. Anything that takes place after is subject to an in personam claim. EXPRESS EXCEPTIONS- Leases- s42(1)(d) RPA- less than 3 years * Easements- s 42(1)(a1) * IN PERSONAM- The registered proprietor is subject to unregistered interests that they have created, such as contracts, trusts and estoppel. (Barry v Heider (1914) 19 CLR 197 Bahr v Nicolay (1988) 164 CLR 603 * In 1979 the Bahrs obtained a licence of Crown Land in Western Australia. On the building of commercial premises the Bahr’s could transform the licence into a Crown Grant and so become the proprietors of the property. Th e Bahr’s sold to Nicolay. Nicolay was resell the property to them at the end of the 3 years. * During the 3 year term Nicolay sold the property to the Thompson’s. * The contract between Nicolay and the Thompsons contained an acknowledgment of the agreement between Nicolay and the Bahr’s (Clause 4 of the contract. * After the Thompsons’s became registered as proprietors they commenced negotiations for the resale of the property in accordance with their agreement with Nicolay but later refused to transfer the property. The Thompson’s argued that they had mere notice of the Bahr’s interest and so were not obliged to resell and were not guilty of statutory fraud. * Mason and Dawson JJ. Fraud, a â€Å"dishonest repudiation of a prior interest which the registered proprietor has acknowledged or agreed to recognize as the basis for obtaining title. * Wilson and Toohey JJ. No statutory fraud – in any case it occurred after registration. Cond uct does give rise to a constructive trust. * Brennan J collateral contract and constructive trust. We will write a custom essay sample on Property Notes specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Property Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Property Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The Torrens Assurance Fund * Section 129 of the RPA gives a remedy to a person for loss or damage against the Torrens Assurance Fund in respect of an interest in land, suffered as a result of the operation of the RPA, where the loss or damage arise from: * the registration of some other person as proprietor of the land or an interest in the land (s 129(1) (b));    * the person having been deprived of the land or an interest in the land through fraud (s129(1)(e)). VOLUNTEERS King v Smail [1958] VR 273- doctrine of indefeasibility only protects bona fide purchasers. Volunteers not covered. Bogdanovic v Koteff (1988) 12 NSWLR 472 – NSW volunteers covered Mrs B looked after Mr K on the basis of a promise that she would be given an interest in the house which would allow her to stay for life. Son inherited house. Breskvar v Wall applied no distinction is made between volunteers and purchasers hence indefeasibility is given to the son SHORT TERM LEASES Under 42(1)(d) of the Real Property Act, a registered interest is subject to a short-term lease if: * The term of the lease is less than 3 years including any options, * The tenant is in possession or entitled to immediate possession, * The registered proprietor before he or she became registered as proprietor had notice against which he or she was not protected: OVERRIDING STATUTES Pratten v Warringah Shire Council (1969) 90 WN (NSW) (Pt 1) 134, Barry v Heider (1914) 19 CLR 197 Barry was the registered proprietor of Torrens land. He had signed a document of transfer under which he agreed to transfer his interest in the land to Schmidt for consideration of ? 1,200. * The transfer stated that this had been paid, but Barry’s evidence was that he had received nothing. He claimed that he thought he was signing a contract, not a transfer and that the agreed sale price was ? 4,000. * Evidence was brought that the witness to Barry’s signature, a solicitor named Peterson, was n ot present when Barry signed. The Certificate of Title not given to Schmidt because the land had been subdivided and a new CT was to be issued nor had the documents been registered because they were waiting on the final subdivision. Barry signed a letter authorising the RG to deliver the new CT to Schmidt when it issued. * Using the letter and signed Transfer as evidence of his title to the land Schmidt created mortgages over the property to Heider and Gale. PRIORITY DISPUTES Registered v Registered Under s 36(9) priority between registered interests is determined by the order of registration, not by the date of execution. Order of registration is determined by the order of lodgment in â€Å"registrable form:† 36 (5) * â€Å"nemo dat quo non habet† Registered v Unregistered * Although equitable interests are recognized under Torrens title they are somewhat fragile in a priority dispute. They may be extinguished by registered interests unless they have been protected by the lodgment of a caveat, or they exist as an exception to indefeasibility. Unregistered v Unregistered * Since unregistered interests are generally thought to be in the nature of equitable interests priority is generally determined by the application of the principles used in deciding priority disputes between competing equitable interests over old system land. It involves the search for the best equity (Rice v Rice). THREE STEP PROCESS * Look at the conduct of the holder of the first interest and decide whether they have done anything that should result in their interest being postponed. The major thing to look for is conduct that may mislead the later comer into thinking that there is no earlier interest in existence; * If the holder of the first interest has committed some act or omission that has had this effect then look at the conduct of the second holder. First look to see if they have notice of the earlier interests. If they do they cannot take priority. If they don’t then you need to see who has the better equity by weighing up the conduct of both. * If the equities are equal first in time will prevail. POSTPONING CONDUCT * not taking care of documents creating the right * taking too long to bring an action to protect a right * not speaking up to give notice of your claim of an interest * Making misleading statements * Otherwise misleading the second comer into thinking that you no longer have an interest MERE EQUITY * Latec Investments Ltd v Hotel Terrigal Pty Ltd (in liquidation) 113 CLR 265 THE RULE IN WALSH V LONSDALE * â€Å"Equity regards as done that which ought to be done† RULE IN LYSAGHT V EDWARDS The general principle of this rule is that in the absence of express agreement between the vendor and purchaser the vendor becomes a trustee of the property for the purchaser once there is a valid and binding contract between the parties. * This is known as the ‘doctrine of conversion’. The rule in Hunt v Luck [1902] 1 Ch â€Å".. possession of the tenant is notice that he has some interest in the land, and that a purchaser having notice of that fact is bound, according to the ordinary rule, either to enquire what the interest is, or to give effect to it, whatever it may be. † CONSTRUCTIVE NOTICE * S 164 Conveyancing Act 1919 NSW The kind of enquiries that a purchaser ought reasonably to make depend on current good practices. This means that a purchaser should at least undertake 2 types of enquiries: * The purchaser has a duty to physically inspect the land (Barnhart v Greenshields, Hunt v Luck), and, * The purchaser should search the documents of title and the register. CAVEATS S74F RPA- Lodgment of caveats against dealings, possessory applications, plans and applications for cancellation of easements or extinguishment of restrictive covenants. A caveat may be lodged: * Where a person claims to be entitled to a legal or equitable estate or interest in the land; * Where the registered proprietor has lost the certificate of title and fears an improper dealing with the land; * To prevent the granting of a possessory application;. * To prevent the improper exercise by a mortgagee of a power of sale; * By the Registrar-General to protect interest of a person under a legal disability or on behalf of the Queen Rule in Person-to-Person Finances Pty Ltd v Sharari [1984] 1 NSWLR 745 [I]t s the settled practice of competent solicitors acting for second or subsequent mortgagees, to ensure either the prompt registration of the mortgage or lodgement of a caveat ACTION| LEGAL EFFECT – TORRENS TITLE| Negotiation| None unless doctrines such as estoppel apply| Exchange of Contracts| Purchaser receives equitable interest providing contract is enforceable Lysaght v Edwards (1876)| Settlement (completion) and payment of Consideration| P urchaser receives approved form of transfer. Until registration interest is still equitable but may be deemed legal if s43A applies| Registration| Purchaser receives indefeasible title under s 42, RPA and is protected against notice of prior interests under s43. Voidness is â€Å"cured† by registration| S43A REQUIREMENTS * The person receiving the dealing should have possession of the certificate of title or be in a position to compel its production. (Court of Appeal in J H Just Holdings v Bank of NSW) * It must be immediately registrable in the sense that no intermediate dealings need to be registered before it. The person claiming the protection of the section should have dealt with the registered proprietor. Jonray (Sydney) Pty Ltd v Partridge Bros Pty Ltd (1969) 89 WN (Pt 1) 568 establishes that a transfer by direction fulfils this requirement. * IAC(Finance)PtyLtd v Courtenay-S43A results in a deemed legal estate’ SAMPLE CHECKLIST – TORRENS TITLE 1. What form of title is the land held under? Look for words such as â€Å"registered proprietor† or â€Å"held under the Real Property Act 1900 NSW† to establish that the land is Torrens title. 2. Ascertain the status of the interests. Which are registered and which remain unregistered (these, at best, will be equitable BUT an unregistered interest is not always equitable). Remember that a registered interest will generally defeat an unregistered interest. 3. Determine whether the registered interests are susceptible to any of the exceptions to indefeasibility? Make a list of all that might be relevant and have definitions of them available: * fraud (dishonesty, trickery, scheming) * in personam (dishonesty, unconscionability, binding contracts, constructive trust etc) ****REMEMBER, ONLY THE CONDUCT OF THE REGISTERED PROPRIETOR IS RELEVANT FOR THESE EXCEPTIONS*****   * short term leases (s 42(1)(d), * overriding statutes etc. 4. Are there any equitable / unregistered interests? There are a variety of ways in which these can be created: * by writing in accordance with sec 23C and 54A Conveyancing Act; * where a previously registered interest has been wrongfully removed from the register, eg through fraud or the im proper exercise of a mortgagee power of sale; * through the application of the law of part performance; * by the application of the doctrine of estoppel; by the application of the doctrine of constructive trusts. 5. Can the holders of the equitable interests use s 43A Real Property Act. This will deem their interest to be legal. 6. Apply the priority rules. In descending order of importance the interests are: * registered * unregistered but falling within sec 43A * unregistered (equitable) with the better equity, or, where the equities are equal, the interest created first in time. * unregistered (equitable). * mere equities CO-OWNERSHIP Two main types of co-ownership -Joint tenancy -Tenancy in common JOINT TENANCY Each joint tenant is â€Å"wholly entitled to the whole† as a ‘collective unity’ or a ‘composite person’. 4 Unities * Unity of Possession * Unity of Interest * Unity of Title * Unity of Time UNITY OF POSSESSION * The land is not physically divided. * Each tenant holds a physically undivided share of the land. * Each co-owner is entitled to possession of the whole of the land. This is called ‘unity of possession’ and it applies irrespective of the shares in which the property is held (eg one tenant holding ? and the other holding ? ). UNITY OF INTEREST * This follows from the proposition that each joint tenant is ‘wholly entitled to the whole’. The interest held by each joint tenant is necessarily the same in extent nature and duration. UNITY OF TITLE * This means that each joint tenant must derive his or her title from the same document (transfer or deed) or act (adverse possession). * A joint tenant can dispose of their share (notionally) of the land but only during their lifetime UNITY OF TIME * This requires that the interests of all joint tenants vest at the same time. A transfer of land to A B when they reach 18 years of age, will create a tenancy in common since there is no unity of time The Right of Survivorship * The other distinction feature of joint tenancies is the right of survivorship or the jus accrescendi * The essence of this principle is that when one joint tenant dies the whole of his or her interest automatically passes to the surviving joint tenants until only one is left. * This is unaffected by any contrary provision in a will. Wright v Gibbons (1949) 78 CLR 313 The Principle Of Forfeiture Rasmanis v Jurewitsch (1969) 70 SR NSW- Man kills wife†¦ will not receive her share of the tenancy. CONVEYANCING ACT 1919 SECT 35 – If both die at same time it will be presumed that the younger survives the older. * Hickman v Peacey [1945] AC 304. joint tenancy can be severed in 6 ways: 1. By a unilateral act by a joint tenant acting on his or her own share; 2. By a mutual agreement between the joint tenants; 3. By a course of dealing between the joint tenants; 4. By court order, most commonly under the Family Law Act; 5. In cases of unlawful killing; . On the bankruptcy of one joint tenant an involuntary severance will occur. S97 RPA- sever by transfer TENANCY IN COMMON There are 2 major differences between a tenancy in common and a joint tenancy: * There is no right of survivorship between tenants in common, and * Only unity of possession is required * There are 2 ways in which a tenancy in common will come to an end. These are: * When all the tenants in common transfe r their interest to one of the tenants; * Where the land is sold or partitioned under s 66G Conveyancing Act. Equity always preferred the tenancy in common because it represented certainty and fairness. * The parties would be treated in equity as if they were tenants in common in 3 situations: * Where co-owners contributed different amounts to the purchase price * Where co-owners advance money on mortgage; * In the case of partnership assets. IF EQUAL CONTRIBUTION THE LAW PRESUMES A JOINT TENANCY PARTITION AND SALE OF LAND In special circumstances court can order Under Div 6 Part 4 Conveyancing Act (sections 66F – 66I)

Sunday, November 24, 2019

Comparing crime myths and facts

Comparing crime myths and facts There is little consensus about the definition of "crime". The media advertises crime by what acts are reacted to by the police and courts whereas a lawyer sees crime as acts that have been defined as crimes by the written law. A myth can be defined as a belief or story that has been associated with an occurrence, so, crime myths are beliefs about crime not supported by appropriate statistics or research. Therefore, crime facts are what criminal acts are actually happening revealed by evidence. Juvenile crime myths are to be used in this essay to compare and contrast crime myths and facts in four discussions by focusing particularly on juvenile crime.This report begins by examining the developments and motivations of myths produced by the media and the government and then secondly contrasting this with the developments and motivations of crime facts produced from various measures to show resemblances in accuracy.Map of violent crimes in 2006 in Chicago community...Next, as a result f rom the above analysis, it will be argued that majority of juvenile crime is non-violent, dispelling the media created myth that all juvenile crime is violent. Lastly, drawing on statistics, it will be proven that juvenile crime is not on the rise regardless of the sudden focus in juvenile crime today by the media. It is concluded that juvenile crime rates are relatively stable and the best way to get a comprehensive outlook on crime is through statistical research rather than succumbing to the medias 'representations' of crime.The first point of discussion is that the media is a huge perpetuator of crime myths and fallacies creating trend stories because sensationalism sells. The media and other contributing factors such as the government select our crime problems for us and focus our attention on social issues (Kappeler, 2003). Newspapers, television, radio and the Internet together...

Thursday, November 21, 2019

The Russian Revolution Essay Example | Topics and Well Written Essays - 750 words

The Russian Revolution - Essay Example Why did the revolution occur and what was the result? This is what this paper is going to focus on. The kind of revolution envisaged by Marx and Engels was to be as a result of workers consciousness or bourgeois intelligentsia. In many countries workers started forming trade unions to fight against employers and the government so as to pass labor legislations that improve their conditions. However, for Beeler and Clark the Russian revolution was â€Å"a natural and inevitable outcome of development of ideas among revolutionary socialist intelligentsia.†1 For them, socialist movements such as the trade unions are not enough to get the kind of social democracy needed otherwise the proletariats attempts would fail just like the first revolution that removed tsar from office did not work. The mistake that socialists such as Alexander Kensky made after seizing power in Russia was failure to confiscate large landholdings and give it to peasants who had fought hard to free themselves from exploitation.2 These leaders were not intelligent enough to lead a revolution like Lenin. In other words, Beeler and Clark would say they lacked revolutionary professionalism thus not revolutionary social democrats. ... The food shortage experienced in 1917 due to the war led to violent street demonstrations and an unplanned uprising occurred and in March 12, 1917 the Duma took over leadership and declared a provisional government.3 This government emphasized equality before the law, freedom of religion, speech and assembly as well as the rights of unions to organize and strike but it shared power with Petrograd soviet of workers and soldiers leading to a state of anarchy.4 The government was also unable to remove Russia from the war thus giving an opportunity to Lenin to wage his campaigns and attract huge masses of people. The provisional government rule was not successful since the leaders lacked leadership skills. For a revolution to be successful it has to be led by professional revolutionaries and not trade unionists or socialist intellectuals. It needs radical revolutionary leaders like Lenin and Trotsky who are always preoccupied with social democratic activities. Lenin called for â€Å"dis ciplined workers who are controlled by small, dedicated elite of intellectual and professional revolutionaries† as opposed to masses.5 The group was referred as Bolsheviks and though they failed in their first attempt to seize power from the provisional government, the army skills of Trotsky and support of soldiers and workers tired of the war made the second attempt to be successful. The Bolshevik majority declared all power for the soviets and Lenin as head of government thus displacing the provisional government.6 However, to end the war he had to sign the Treaty of Brest-Litorsk thus ceding Russian territories to central powers. Civil war ensued thereafter but the

Wednesday, November 20, 2019

Significant life changing moment Essay Example | Topics and Well Written Essays - 2000 words

Significant life changing moment - Essay Example e, entire fate gets changed from even very small changes in life, in this discussion I would tell you what turning points my life took and how I changed my self entirely. I was born in a lower class family with so many problems and I saw my parents fighting all the time with no mercy, both of my parents were quite opposite to each other and they had no match, still I wonder why God made such a terrible match, but now I realize that it all happened because God was willing me to get birth from that couple, I was never comfortable as a child, though I was the only one to take birth and had no one around except my parents, as a kid I never gained attention of my parents because of numerous reasons, firstly my father who was a sports person, used to have very less earning and what ever he used to earn he never gave it to me and my mother, this was the first clash between my parents, secondly my mother also had to do part time jobs in order to support me and herself, so there was no way to get individual attention from either of my parents, life was never easy for me, I still remember when I used to walk and visualize all the happenings of my life at an ea rly age, I tried my level best to bring my parents closer but was failed each time, may be because they were also never comfortable with each other and also they never thought of sacrificing their lives for me and one day they both got apart forever, I was five when they got divorced, it was decided that I would live with my mother as my father was never willing to keep me and that is what exactly happened, â€Å"Modern childhood is often portrayed in terms of enhanced democratic relationships between parents and children, with the assumption that childrens negotiating power has increased over time†(Jensen, 1: 2003). My father was a strange person and he was said to be psychotic by my mother in which she was quite true, my father remarried to his old time friend who was a nurse at some hospital but he was again a

Sunday, November 17, 2019

Accounting analysis Essay Example | Topics and Well Written Essays - 750 words

Accounting analysis - Essay Example For other transactions substance and form diverge and the choice of treatment can give different results due to non-recognition of an asset or a liability even though benefits or obligations result.Full disclosure is not enough:all transactions must be accounted for correctly,with full disclosure of related details as necessary to give the user of accounts a full understanding of the transactions.The interaction of the framework with other standards is also an important issue. Whichever rules are the more specific should be applied, given that IAS's should be consistent with the framework. Leasing provides a good example: straight forward lease which fall squarely within the terms of IAS 17 should be accounted for without any need to refer to the framework, but where there terms are more complex, or the lease is only one element in a large series of transactions, then the framework comes into play. In addition, the framework implicitly requires that its general principle of substance over form should apply in the application of other existing rules.How does the frame work enforce the substance over from rule Its main method is to define the elements of financial substance and therefore to give rules for their recognition. The key considerations are weather a transaction has given rise to new assets and liabilities.A liability is a present obligation of the enterprise arising from past events, the settlement of which is expected to result in an outflow from the enterprise of resources embodying economic benefits. (http://www.iasplus.com/standard/framewk.htm) Identification of those who have risks related to an asset will generally indicate who has the benefits and hence who has the asset. if an entity is in certain circumstances unable to avoid an outflow of benefits, this will provide evidence that it has liability. The definitions given in IASC framework of income and expenses are not as imp as assets and liabilities. This is because income and expenses are described in terms of changes in assets and liabilities, i.e. they are secondary definitions Income is increases in economic beniufit5s during the accounting period in form of inflows or enhancements of assets or decreases of liabilities that result in decrease in equity, other than those relating to contributions from equity participations. Expenses are decreases in economic benefits during the accounting period in the form of outflows or depletion of assets or increases of liabilities that results in decrease in equity, other than those relating to distributions to equity participants. (http://www.iasplus.com/standard/framewk.htm) The real importance then is the way the Framework defines assets and liabilities regardless of the legal status. It is not sufficient, however, that the asset or liabilities fulfils the above definition; it must also satisfy recognition criteria in order to be shown in an entity's accounts

Friday, November 15, 2019

Factors Influencing the Technical Defensive Measures on Spyw

Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl Factors Influencing the Technical Defensive Measures on Spyw Factors Influencing the Technical Defensive Measures on Spyw 1.0 INTRODUCTION 1.1 PROJECT OUTLINE The title of the project chosen by the author is â€Å"Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices† which simply means that the author analyzes the topic through an empirical study. The study focuses on the factors that influence Technical Defensive Measures on Spyware in Computers and mobile devices. Computers and mobile devices are widely used; they are used to access the internet, while everyone wants to acquire the internet in todays world. While technology advances, so are the criminal activities on the technology. When talking about computer crime, the first thing that comes to mind is spyware. Spyware is so big of a crime that millions of dollars are lost annually due to it. Hackers use spyware to still private information from the users like credit card information and so on. Although spyware has been here for a long time, it is computer crime with no legal consequence. Users have little or no knowledge about what spyware is and what it can do to them and their machines (computers and mobile devises). Even though virus has been around longer than spyware, but spyware is beginning to make its mark with computer security breaches. Spyware can collect personal data from a users computer. If not taken care of spyware can cause delayed processing of many of your applications. Below are the brief descriptions of each chapter: Chapter one: Introduction This chapter provides a brief overview of the project. It provides the reader with the background information about spyware and the problem statement. The research questions, limitations and methodology are also discussed in this chapter. Chapter two: Literature Review This chapter mainly deals with the pertinent literature of the spyware and discussion on the various types of spyware effect and the comparison between the mobile spyware and the computer spyware. Lastly, the chapter will also discuss about the factors enhancing spyware growth. Chapter three: Research Framework and Hypotheses Development In this chapter, the author is going to propose the research framework/model and hypotheses to explore the users perception about privacy, self efficiency, security, legal framework, spyware knowledge and self-efficiency, trust and cost. Chapter four: Research Methodology This chapter will describe the research design that is used during the research. The chapter will discuss the overall research process. The chapter will also include information on data collection, sampling plan and questionnaire development. Chapter five: Data Analysis and Findings This chapter will outline the data collected through questionnaire and interviews by making use of the appropriate software and analysis of the study. The chapter will also provide discussion of the research findings. Chapter six: Conclusion and Recommendation This chapter will discuss about the result of the previous chapter the contribution of the study to the body knowledge. Conclusion along with future enhancement will also be discussed in the chapter. This chapter concludes the research. 1.2 INTRODUCTION This chapter is meant to give the user/reader helpful idea and an insight to the whole research. Most readers will like to get a grasp of the main ideas of a research paper before actually proceeding to read the whole research. This chapter clearly states the primary objective of the research and the main problem which is been researched. The backgrounds and nature of the study are also highlight the purpose of the research. Several books and journals have been read by the author so as to have foundation knowledge on the concept of spyware. Spyware is a significant problem to most computer users today. The term â€Å"spyware† describes a new class of computer software. This software tracks users activities online or offline, provides targeted advertising, and engage in other types of activities that the user does not desire or the user may describe as invasive to them. Analysis suggests that these types of programs may reside on up to 90 percent (%) of all the computers connected to the internet (EarthLink 2005). Frequently, programs bundle spyware with freeware or shareware, though it can also arrive via email, instant messages or web downloads. While the magnitude of the spyware problem is well documented, even do recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike viruses and other malicious code, users wont even know that spyware is installed in their systems. This is because some spywares cannot be detected by most anti-viruses and anti spyware that we have today. Anecdotal evidence suggests, and our study confirms, that some users are willing to install spyware when the desired application is of perceived high utility and a comparable product without spyware is not available or known to the user (Michelle Delio, 2004). The authors goal in this study is to understand the factors and users decision making process that leads to technical defensive measures. During installation, users are presented with notices such as software agreements, terms of service (TOS), end user licensing agreements (EULA), and security warnings. Based on information in these notices, users should, in theory, be able to make a decision about whether to install the software and evaluate the potential consequences of that decision. However, there is a general perception that these notices are ineffective and users often dont even read the software agreement, terms of service, end user licensing or security warnings. One software provider included a $1000 cash prize offer in the EULA that was displayed during each software installation, yet the prize was only claimed after 4 months and 3,000 downloads of the software (PC PitStop 2005). 1.3 BACKGROUND STUDY Spyware has existed at least since the late 1980s when some Keyloggers where discovered in some university computers. â€Å"The word spyware was first used in publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsofts business model† (Shanmuga 2005). Over the years, there has been a steady growth in the use of spyware by online attackers and criminals to execute crime against individual, companies and organisations. In the span of just few years, spyware has become the internets most popular download. During the years, the anti-spyware was developed to tackle this problem. The anti-spyware was meant to find, detect and remove the spyware. But even with the development of anti-spyware, spyware still continues to grow every day. One of the factors that aid this growth is the lack of standard definition of spyware. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). Different anti-spyware companies and organizations use different definition which makes even difficult for the users of computers and mobile dont even know what spyware is, as such how can they know the threat of it and the harm it those to their devices 1.4 PROBLEM STATEMENT The problem statement of this research study is â€Å"does the hypothesized factors influence and positively affects the users attitude towards spyware?† Even do spyware has been here for over two decades, it still does not have a standard definition. This makes it harder for users to understand what spyware is and how it affects their system, and how deep is the level of impact (Norbert 2007). Past studies have been done to study the development of spyware and its growth, how it affects the businesses, privacy and other personal informations of the users, and disrupts the performance of the users machine, and the factors that influence the growth. While the magnitude of the spyware problem is well documented, these studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. Unlike virus and other malicious codes, users often have the choice to whether they want to install this spyware or not. This situation often arises as a result of users not reading the software agreement, term of service or the end user licensing agreements. While other users install it with other programs without knowing. Nonetheless, only very few studies focus specifically on the factors influencing the Technical Defensive Measures on Spyware in Computers and mobile devices, and most of them were carried out in the United States of America USA. Addressing this problem is a very big issue, because users dont want to spend two to five minutes of their time to read the terms of service. The software producers often put in a lot of information in the terms of service there by making the user not read because it is too lengthy. 1.5 RESEARCH QUESTIONS With reference to the Problem statement, the author suggested the following questions: What are the factors influencing Technical Defensive Measures on Spyware among users? What are the theoretical models used and extended in previous research studies of spyware? What are the users reactions towards spyware? How will the research result affect the Factors Influencing the Technical Defensive Measures on Spyware on computers and mobile devices? 1.6 RESEARCH OBJECTIVES With reference to the research questions, the author developed the following research objectives for the study: To identify the factors influencing Technical Defensive Measures on Spyware among users. To study and discuss the theoretical models used and extended in previous research studies of spyware. To better understand the users reaction towards spyware. To discuss the empirical result and the suggestion to promote and reduce the growth of spyware. 1.7 NATURE OF STUDY The author is studying about the Factors Influencing the Technical Defensive Measures on Spyware in both mobile devices and computers, and he will generate some questionnaires which he will use to gather information from the general public. This study was design in such a way that the author and other practitioners will answer questions based on their perspective view. The conceptual model was based on extensive literature review of various theoretical models that is aligned with the technological, network, economical, business and some other dimension. The conceptual model is then converted into research model for validation and testing using data collected from the general public and some network specialist. 1.8 SIGNIFICANCE OF STUDY This study presents two main implications, the theoretical contribution and the practical contribution. The developed model in this study consists of six constructs; they are spyware knowledge, perceived privacy control, security effect, self efficiency, legal framework, and trustworthiness and trust in vendors. This model is tested empirically to explain what will lead the users to take technical defensive measures. In practical contribution, the result of this study will also benefit the software vendors, the users of computers and mobile devices, and any other institution will be able to apply the key factors obtained from this research to meet their institutional, organizational or personal needs. This study will benefit in term of providing the users point of view and it will also contribute to administration decisions as the finding of the research help direct them to the area of focus. The findings will make the contribution in term of creating an understanding on the factors influencing technical defensive measures. 1.9 METHODOLOGY OVERVIEW This research is design in such a way that it was divided in two adopted steps. The steps are the pre-test study and the main study. The pre-test study was the study that was done in the early stages of the research. This involves the literature reviewing of type of spyware, impact of spyware, how spyware affects the machine and so on. The pre-test was conducted to gain a greater understanding about spyware. The pre-test study helps in understanding the topic there by producing the main research questions. The main study will be conducted based on a survey, a questionnaires conducted among users, corporations and some top school in Malaysia. The questionnaire will be use to collect data on some of the identified problems. The collected data will then be analyzed using the appropriate statistic tools. 1.10 CONCLUSION In conclusion, this chapter introduces the research to the reader by bringing out the background of spyware, the primary objective of the research, also stating the main questions of the research. It also discusses the methodology in summary. In short, this chapter will provides the reader will hopeful idea about the research. The following chapters will further provide the literature review on the Factors Influencing the Technical Defensive Measures on Spyware in our machines and devices. 2.0 LITERATURE REVIEW 2.1 INTRODUCTION This chapter will provide an in-depth detail on spyware as well as the types of spyware. The chapter will also bring out all the possible definitions of spyware, the overview of spyware. The chapter will bring out the possible ways in which spyware operates and it will talk a little about the target victims of the spyware. The chapter also talks about mobile device spyware and how it is different of compute spyware. The chapter will also analyze the infection methods of spyware and so on. 2.2 DEFINITION It is not easy to bring out a standard definition on spyware, which makes it much harder to understand. But the author will bring out all the definitions he can find and also propose/bring his own definition based on his understanding of the spyware. In the definition of spyware, two particular issues must be included for the definition to be complete. But research shows that users only stick to either one of the two when defining spyware. This two issues are always been contested by the users. The two particular issues contested are the range of software behaviour and the degree of user consent that is desirable. Firstly, some users prefer the narrow definition which focuses on the monitoring (Surveillance) aspects of spyware and its ability to steal, communicate and store information about users and their behavior. Others prefer the broad definition that includes adware, toolbars, search tools, hijackers and dialers. Definitions for spyware also include hacker tools for remote access and administration, key logging and cracking passwords. Second, there is limited agreement on the lawfulnessof spyware that engages in behavior such as targeting advertisements, installing programs on user machines and collecting click stream data. Users consider a wide range of programs that present spyware-like functionality unacceptable. To complicate the definition, certain software behaviors are acceptable in some contexts but not others. Furthermore, there is concern over user notice and consentrequired during an installation process. The practice of bundlingsoftware, which merges spyware with unrelated programs, also heightens this concern. Jerry Berman, President of the Center for Democracy and Technology (CDT), explained in testimony to the Subcommittee on Communications of the Senate Commerce, Science, and Transportation Committee in March 2004 that â€Å"The term has been applied to software ranging from keystroke loggers that capture every key typed on a particular computer; to advertising applications that track users web browsing; to programs that hijack users system settings.† (CDT 2004) He noted that what these various types of software programs â€Å"have in common is a lack of transparency and an absence of respect for users ability to control their own computers and Internet connections† (CDT 2004). The author will also like to propose his definition of spyware based on his understanding of the matter. Spyware is a program that is installed in the machine with or without the permission of the user, and it can monitor the activities of the user, steal valuable information from the user and send to a third party and disturb/regulate the functionality of the machine like speed, stability and internet access efficiency. 2.3 OVERVIEW 2.3.1 Types of spyware Basically any software that can be installed in the users machine which is used to obtains information from their computer or mobile device without their knowledge can be termed as a spyware. There are many types of spyware that are doing the rounds on the Internet, but in technical terms, you can classify them into two broad categories namely, Domestic Spyware and Commercial Spyware (UpickReviews 2007). 2.3.1.1 Domestic spyware Domestic spyware is software that is usually purchased and installed by computer owners to monitor the Internet behaviour on their computer networks. Employers usually use this software to monitor employee online activities. Some family members use domestic spyware to monitor other family members, while parents and guardians often use this kind of software to monitor the activities of their children online. Some people use this kind of softwares to spy on their friends and girl friend. In America, many couples often install this kind of software on their partners mobile phone in other to monitor their call. This usually happens when one party thinks the other is cheating on them. A third party can also install domestic spyware without the knowledge of the computer owner on their machine or mobile device. Law enforcement officials have often used domestic spyware to monitor suspected criminal activity and criminals have used domestic spyware to siphon personal information from private computers in order to steal assets (TopTenReviews 2003). Domestic spyware is one of the most common spyware used on mobile devices. This is done to monitor the activity of the target victim i.e calls and SMS. 2.3.1.2 Commercial spyware. These types of software systems are often used by third parties to monitor and record the browsing behaviour of the user. The main purpose of it is to monitor the online habits of the user and sell the gathered information to anyone who might be interested. It is often online businesses that buy the information and use it to hit the user with targeted advertising, i.e. advertisements that relate to your usual Internet browsing habits. Advertisers often use commercial spyware simply because it is far simpler, economical and faster than collecting information through legal means such as contests, questionnaires, registration surveys and the likes. It is also because information gathered by spyware is far more reliable because users often dont cooperate when it comes to filling questionnaire sincerely, while some may accept to do it but they will not give true information when it comes to their private things. Since it represents the users true browsing behaviour, the advertisers go for it. You may take your pick while filling out an online registration form, but you just cannot cheat a spyware because it simply monitors and records all your activities. In the past marketers had to bribe their way to learn the users preferences through contests, registration surveys and the like. Those methods of gaining the users personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse There are many types of spyware that are classified under commercial spyware. They are: Browser hijackers, adware, Malware, dialers, Trojans and viruses, Worms, etc. 2.3.1.2.1 Adware Adware is the most common type of spyware available. They are cookies which hide on your computer waiting for you to go online. The cookies often get into your computer through popup that you open. Once the adware detects that youre connected to the Internet it starts sending you popup, pop-over, pop-under ads, and some sort of advertisement for anything from airline tickets to porn site membership. Not only that but even information on your viewing habits is tracked and stored. This data is then sold on to marketing companies who will be sending you more junk email and popup ads (Spam-site 2006). 2.3.1.2.2 Dealers Software that gets installed on your computer that has the ability to make phone calls from your computer, though a phone-connected modem, without your knowledge. These programs will connect to other computers, through your phone line, which are usually porn sites. These numbers are pay per minute call though, so you get charged for the amount of time your computer is connected to it. ile dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to their victims. It is mostly used by porn sites. They can also be classified as hijackers (Abrams 2009). 2.3.1.2.3 Malware Malware is malicious software designed specifically to damage users machine. But Malware is typically not self-replicating or designed for PC-to-PC distribution (Pareto 2009). 2.3.1.2.4 Trojan Trojan is a program that contains hidden functionality, often posing as useful applications yet performing Spyware or Adware functions and facilitates unauthorized access to the users computer system. The term ‘Trojan horse was found from the mythical wooden horse that carried hidden Greek soldiers into Troy (Pareto 2009). 2.3.1.2.5 Worm Worms are self-replicating, fast-spreading Internet threats that are more like viruses than Spyware. They differ from viruses in that they can replace entire files on the host computer. Both viruses and worms attempt to spread to as many computers as possible, using e-mail, the Internet, and file-sharing networks as methods of distribution (Pareto 2009). 2.4 OPERATIONS OF SPYWARE The usual method for a spyware to operate is to run secretly in the background of the users computers (McCardle 2003). The reason behind this concealing of processes is commonly argued as that it would hardly be acceptable, e.g., if free file-sharing software kept stopping to ask the user if they are ready to fetch a new banner or a pop-up window (Townsend 2003). Therefore, the client/server routine of spyware is normally executed in the background. In practice, there would be nothing wrong with spyware running in the background provided that the users know that it is happening, what data is being transmitted, and that they have agreed to the process as part of the conditions for obtaining the freeware. However, most users are unaware that they have software on their computers that tracks and reports information on their Internet usage to a third party. Typically, a spyware program secretly gathers user information and spreads it without the users knowledge of it. Once installed, the spyware monitors, e.g., user activity on the Internet and transmits that information in the background to third parties, such as advertising companies. In reality, spyware run constantly, even when their carrier program, e.g., a file-sharing tool, has been terminated. A more or less legal grey area is utilized by the spyware actors, since in most program licenses they specify that information may be gathered for corporate purposes. However, the usual model is to collect more information than they have asked for (Townsend 2003). Besides this, most license agreements are been formulated in such a way that the reader finds it extensively hard for users to understand. 2.5 SPYWARE INFECTION METHOD Spyware infects its victims through many different ways. The most common of these ways include drive-by download, P2P wrecks havoc, free software download, social engineering and vulnerability route. 2.5.1 Drive-by downloads This is a program that is automatically downloaded to users computer, often without the users knowledge. The download may be initiated when the user visits a website or by another application. Drive by downloads can also be initiated by Mouse Over downloads, requiring a user to run the mouse over a malicious Pop-up ad or malicious pop-up window. Another scenario is when the user visits a website that pops up a window with a message like in order to properly view this website you must install this program. The FTP / HTTP Get request will initiate the download of the software onto the client machine. Installation will be performed by the user and during this installation they will be asked permission to install the malware as well as the software. Internet Explorer uses ActiveX controls for installing legitimate plug-ins like Flash, to enhance the browsers functionality and provide interactive programs for Internet Explorer. When misused, it provides a means for installing spyware such as dialers, browser hijackers, and other types of malware. ActiveX programs can automatically download to a users computer, often without users knowledge. It can be invoked from web pages through the use of a scripting language or directly with an HTML OBJECT tag. On execution by a web browser, it has full access to the Windows operating system and does not run in a â€Å"sandbox. Depending on browser security settings, the browser application may display a security warning to either stop or continue the installation. The warning may not offer a proper description of the program, and usually is misleading or could be masked by other deceptive dialog boxes. Sometimes â€Å"No† is not taken for an answer, and repeated attempts are made to get the user to approve and download the application. ActiveX controls can be signed or unsigned. Signed ActiveX controls are automatically installed while browsing the web, and are used by spyware applications. A signed ActiveX control only verifies that the code or control was from the signer and that it has not been altered; however, it may still be malicious (Shanmuga 2005). 2.5.2 P2P Wrecks Havoc Most of the spyware comes bundled with other popular programs that are that are free, also through most of the peer-to-peer networks like Kazaa, Bearshare, Limewire among others. They install malware in the machine as part of the P2P installation process. The P2P application may not function if these components are not installed. These â€Å"free† versions generate ad revenue for their publishers, causing pop-ups and sending information to affiliate networks for data aggregation or data mining. Applications such as Cydoor, New.net, TopText, SaveNow, Webhancer, VX2, CommonName, GetNet/ClearSearch, IncrediFind and OnFlow are among the few applications that are installed this way and may serve up ad banners and ad messages, or track your Internet surfing habits. Unfortunately, the makers of the host programs try not to advertise their programs hidden payloads. Reading the licensing agreement (carefully) during installation will often reveal embedded licenses for the piggybacking adware (Shanmuga 2005). 2.5.3 Software free web download Some of the softwares that they claim is free in the internet, when you download and install them, at the same time you will be installing a secondary program. This secondary program is a spyware. It will monitor your activity and report to a third party or a central database. If the user notices the spyware and deletes it, but didnt delete the software, whenever the system online, the software will download the spyware application and install it again. This kind of infection often occurs when the use fails to read the license agreement. In other cases, the license agreement is twisted in such a way that the user will not understand it (Shanmuga 2005). 2.5.4 Social engineering Sometimes when users browse the web, they may receive offers for corrective programs or special plug-ins that may be described as necessary for viewing the site. These voluntary but covert and unintentional installations are one source of spyware. Some of these offers are made to appear like a Windows alert from Microsoft or an anti-spyware application to tricks users into downloading and installing them (Shanmuga 2005). 2.5.5 Security holes in internet explorer Another method of infection is by exploring the security holes in internet explorer. Internet Explorer has had multiple security vulnerabilities, some of which are disclosed by Microsoft with downloadable updates and patches. Some spyware applications take advantage of these holes and install Trojan droppers, which redirect the browser to portal sites. CoolWebSearch (one of the most notorious pests in recent times) and many other spyware are known to take advantage of Internet Explorer security holes. KeenValue, and InternetOptimizer are examples that use Trojan downloader (Shanmuga 2005). 2.6 MOBILE DEVICE SPYWARE Since 2004, spyware has been observed to spread among mobile devices through Bluetooth, infrared, and other forms of connections like wireless network. According to F-Secure, the number of spyware known to target mobile devices are approximate 100 (Hypponen, 2006), as of then. However, others like (Dagon, Martin, and Starner, 2004) believed that spyware will inevitably grow into a serious problem in the future. There had already been some complex, blended spyware threats on mobile devices. Within a few years, mobile spyware have grown in sophistication in a way reminiscent of 20 years of PC spyware evolution. Unfortunately, mobile devices ware not designed for security and they have limited defenses against continually evolving attacks. Mobile devices are attractive targets for several reasons (Hypponen, 2006a). This is because mobile devices have progressed far in term of hardware and communication. Mobile phones have grown from simple organizer/ communication device to a mini computer with their own operating system (like palm, windows mobile, google phone and so on) that can download and install applications. Another reason for the mobile device attack is because they are well connected. They are capable of internet access for Web browsing, facebooking , emailing, charting and applications similar to those in the PCs. They can also communicate by cellular, IEEE 802.11 wireless LAN, short range communication like Bluetooth and infrared for shorter range communication, and multimedia messaging service (MMS). Another reason for mobile spyware attack is the size of the target population. Such large target population is attractive for the spyware and malware writers who want to maximize their impact. 2.6.1 Differences to computer spyware There are three important difference of mobile device security compared to personal computer security (Becher and Freiling 2008). A first difference is the inherent possibility for Spyware to generate costs for the user and revenue to the Spyware author. This problem existed previousl

Wednesday, November 13, 2019

Globalization and the International Monetary Community Essay -- Econom

Executive Summary Our world is steadily shrinking. Technology is building bridges over the barriers of distance, language, and culture. It’s a process called globalization, and it is changing the way we live. Financial institutions haven’t been immune to the effects of this change. In fact, the international nature of financial institutions makes them particularly vulnerable to change. This paper addresses three issues caused by the globalization of the international monetary community. First this paper examines the success of the Euro, and the implications for the formation of a global currency. Then this paper looks at the issue of devaluation, and by comparing successful and unsuccessful devaluations tries to determine what factors make a devaluation work. Finally this paper will look at the trend toward dollarization, and whether or not dollarization is the best solution for struggling economies. This paper contends that the power of globalization is forcing the international monetary community to address these issues. The success of the Euro makes a global currency seem like a logical step in the evolution of currency, even though sentimental attachment to national currency would make a global currency unpopular. Devaluation of national currency is only effective for nation with substantial foreign investment and high technology exports. Dollarization solves many problems for struggling economies in the short term, but at some point these nations should consider joining a Multi-Lateral Monetary Union. These changes and more are reforming the way we think about money. While some of the solutions proposed here will only become feasible years in the future, some of the problems discussed affect us t... ...Peiers, Bettina. â€Å"Dollarization in Developing Countries: Rational Remedy or Domestic Dilemma?†. Contemporary Economic Policy. Jul96, Vol. 14 Issue 3, p30. Meyer, L.H. "The Euro in the International Financial System." Federal Reserve Bank of Minneapolis, Vol. 25-27, Issue 2, p58. O'Mara, Richard. â€Å"Argentina's deep, empty pockets†. Christian Science Monitor. 4/2/2002, Vol. 94 Issue 89, p9. â€Å"Ring in the New†. Economist. 1/5/2002 Vol. 362 Issue 8254, p22. Schulmeister, Stephan. â€Å"Globalization Without Global Money: The Double Role of the Dollar as National Currency and World Currency†. Journal of Post Keynesian Economics, Spring2000, Vol. 22 Issue 3, p365. â€Å"The Myth of Eurocreep†. Economist. 1/5/2002, Vol. 362 Issue 8254, p43. von Furstenberg, George. â€Å"A Case Against U.S. Dollarization.† Challenge. Jul/Aug2000, Vol. 43 Issue 4, p108.

Sunday, November 10, 2019

Annie Dillard “The Chase”

In Annie Dillard’s autobiography â€Å"The Chase†, she emphasizes and uses great detail in her different writing techniques to make the scenes in the story feel more alive or realistic. The attention of detail can be seen with her intense use of transitions and active descriptions in the actual chase scene. Dillard also uses tone and language of the characters to make the story feel more like actual real time events. In the first paragraph of â€Å"The Chase†, the narrator of the story a seven year old girl is informing the audience about the game of football.She says â€Å"It was all or nothing† (Dillard 121). Basically stating that in football you have got to give all of your effort and not hesitate at all if you want to make the tackle and stop the offense. This do or die attitude is reflected later in the story during the chase scene. It is also the climax of the story. Being that a bunch of kids are together unsupervised, there is going to be some tro uble. That is exactly what happens next. The children are all gathered during a winter snowy day making snowballs next to a street throwing them at passing cars. Its wide black door opened; a man got out of it running. He didn’t even close the car door. † This kind of unexpected thrill we can all relate to. Dillard adds even more by putting in the little details that make the reader feel the anger of this man and the feeling of we’re caught by the children that we have all felt as a kid is described in that same quote. By using these details in the story the reader can put themselves into the shoes of the characters.Dillard uses lots of active descriptions that are very real throughout the chase scene. She uses actual street names like Edgerton Avenue, Lloyd Street, Willard and Lang. This use of actual real names of streets makes the story. The reader can almost get lost in the chase itself with Dillard’s use of rapid transitions like up, around, under, th rough, down some, across, smashed. After the chase is over and the children are caught the reader feels tired

Friday, November 8, 2019

Does Internet Good Outweigh the Bad †Argumentative Essay Brief Summary

Does Internet Good Outweigh the Bad – Argumentative Essay Brief Summary Free Online Research Papers Does Internet Good Outweigh the Bad Argumentative Essay Brief Summary Internet becomes more and more popular. Every child which is able to read use it and almost everyone has it at home. But is internet the blessing or the curse? Even if you do not have much time, having internet, you can contact with your friends very quickly. E-mails replace letters and instead tame taking meetings you can talk with people by messengers like gadu-gadu or skype. You can also meet some new friends or even the love of your life. It is really comfortable to use your account without going to a bank, standing in queues and all that stress. Internet is the best and the quickest way of acquiring information. What is more you can make there some shopping or have access to libraries or other sources. In the other hand some relationships made on-line can be dangerous, especially for children, who are naive. Internet is a very popular source of illegal mp3 and distributed without permission films. It is often that during searching some information you run into porno films or catch viruses. In addition not always you can get reliable information. Some of your data can be stolen and used by hackers. Whatever we say about it, internet is to popular to stop people using it. I think it is really good invention but as if with everything, human can use it in bad aims. Research Papers on Does Internet Good Outweigh the Bad - Argumentative Essay Brief SummaryAnalysis of Ebay Expanding into AsiaHarry Potter and the Deathly Hallows EssayThe Project Managment Office SystemOpen Architechture a white paperPETSTEL analysis of IndiaComparison: Letter from Birmingham and CritoWhere Wild and West MeetThe Effects of Illegal ImmigrationStandardized TestingNever Been Kicked Out of a Place This Nice

Wednesday, November 6, 2019

One Florida Education essays

One Florida Education essays Governor Jeb Bushs One Florida Initiative has come into action and there have been many opposing opinions towards this plan since The Board of Regents approved it. Some might say the plan has split Florida in two. Many Florida citizens who support One Florida argue towards opposing positions to give the plan a chance. These supporters believe this state needs a change because of the numerous problems within our school system. Opposing sides argue that they might consider part of, which is the plan that grants schools money towards scholarships and mentoring but their position is that affirmative action is not a problem. Supporter of One Florida Initiative believe that the plan could not have come about any later than it did because we needed some action done fast. While opposers believe that this plan was voted on too fast and the governor didnt give citizens enough information or time to do anything about it. The initiative to help diversity among college admissions was a well thought out plan supporters argue. They believe One Florida will work if we give it some time. Once we get used to the plan we will see how well it is working we while will learn more about. Supporters are sure that this plan will improve the way Florida works and that we will influence other states to do the same. Bushs plan would replace the states affirmative-action policies, which have been used with mixed success, in university admissions(Porter 1). Opposers of One Florida ask what is he replacing it with? He is not replacing it, he has just eliminated it and this is a form of equivocation. Citizens who oppose the governors plan argue that Affirmative action has only been around for 30 years. Its too soon to get rid of it(Kennedy A1+). Affirmative action was a plan that opposing sides did not want to do away with, and they believe that this plan is not as beneficial as a ...

Sunday, November 3, 2019

Can Porters Value Chain Help Us Identify the Source(s) if Tesco's Essay

Can Porters Value Chain Help Us Identify the Source(s) if Tesco's Competitive Advantage - Essay Example With more than 240,000 employees, Tesco operates 164 and 2715 in USA and UK respectively (Annual Report, 2011). Tesco is widely known, as it always thrives to constantly communicate its brand message to potential customers, as a company that ‘creates value for customers to earn their lifetime loyalty’. Tesco’s Value Chain Analysis The primary aim of Value Chain analysis is to find sources of a company’s competitive advantages. In order to do this, company can be divided in to several activities so that the strategically relevant activities become evident (Bischoff, 2011, p. 3). More specifically, value is an extremely important concept to strategic management and marketing as well. Porter’s Value Chain proposes an organizational system composed of systematic transformation process with inputs and outputs to a distinct stage. Customers perceive and measure value in consideration of money they are willing to pay. If the marketer can make a difference b etween the total cost and the value which in turn equal to that of product’s price, he can generate profit. ... The support activities include administrative infrastructure management, HRM, IT, procurement etc. When it comes to the Value Chain Analysis of Tesco, it can be observed that the company has taken measures to ensure delivering of maximum values to its customers. As depicted below, Tesco’s seven strategies explained in its Annual Report, 2011 exhibit its focus on consumer choice. It is giving greater emphasis on green-retailing. As a global business, it is trying to make a difference in how effectively it can tackle the climate change issues (Annual Report, 2011, p. 15). Both these and its online home delivery system, which was reckoned as highly successful (Child, 2002, p. 135) are major inbound logistics that contribute to its values offers to the customers and profits it proposes to generate as well. In both its home and foreign markets, Tesco operates through a replenishment systems and distribute its goods in its own brands. Moreover, the company thrives on innovation. As far as outbound logistics are concerned, the company is highly successful in going global. As Child (2002, p. 135) noted, Tesco is very successful in delivering fastest organic growth of any retailer in the world. Its non-food business has grown by 18 % in 2000. Tesco was not simply globalizing its business, but rather, it thought of a strategy ‘Think Global, Act Local’ by which it positively approached to understanding of responsiveness of cultural vagaries as well as attitudes of foreign customers (Griffith, p. 4). Tesco in UK has emerged as part of routine, and therefore, it not just seized opportunities but rather it became part of a country where it launched its store and people too became part of it. This has eventually contributed greater to