Study on Functional Strategies of Three Different Companies

Total Page:16

File Type:pdf, Size:1020Kb

Study on Functional Strategies of Three Different Companies STRATEGIC MANAGEMENT STUDY ON FUNCTIONAL STRATEGIES OF THREE DIFFERENT COMPANIES SUBMITTED BY PRADNYA S WAKODE ROLL NO. 1515059 M.COM (BUSINESS MANAGEMENT) [Semester 1] MULUND COLLEGE OF COMMERCE MULUND (W) – 400081. SUBMITTED TO UNIVERSITY OF MUMBAI ACADEMIC YEAR 2015-16 PROJECT GUIDE PROF. SAMEER VELANKAR DECLARATION I, Miss PRADNYA S WAKODE (Roll No. 1515059), of Mulund College of Commerce of M.Com (Business Management) (Part 1) [Semester 1], hereby declare, that I have completed my project titled, ‘Study on functional strategies of three different companies’ The information submitted herein is true and original to the best of my knowledge. ________________________ Signature of Student PRADNYA S WAKODE MULUND COLLEGE OF COMMERCE, MULUND (W)-400 081. CERTIFICATE This is to certify that, Ms. PRADNYA S WAKODE, of M.Com Business Management Semester 1(2015-2016) has successfully completed the project of Strategic management on study of functional strategies of three different companies under the guidance of Prof. SAMEER VELANKAR. ______________________________ Principal [Dr. Parvathi Venkatesh] ______________________________ Course Coordinator [ Prof .Shivaji Pawar] ________________________ ______ Internal Examiner [Prof Sameer Velankar] ______________________________ [ External Examiner] ACKNOWLEDGEMENT I, PRADNYA S. WAKODE,the student of Mulund College Of Commerce studying in first year Master Of Commerce in Buisness Management would like to express my sincere gratitude to Principal Dr. Mrs PARVATHI VENKATESH for her constant encouragement and support during thecompletion of this project. I also take this opportunity to thank our co- ordinator prof .SHIVAJI PAWAR. I extend my heartiest thanks to Prof. SAMEER VELANKAR for enlightening my path.without his advice this project was impossible I also feel grateful and elated in expressing my indebtedness to my parents, my friends and all those who have directly or indirectly helped me in accomplishing this research. Objective Of Study To study the strategic management and its process To highlight the organisational frame strategies in all functional areas To study functional strategies of companies INDEX CHAPTER PARTICULARS PAGE NO. NO. 1 Introduction to Recruitment & Factors affecting Recruitment 6 2 Sources of Recruitment 9 3 Internal sources of recruitment 10 4 Advantages 11 5 Disadvantages 12 6 External Sources of Recruitment & its methods 13 7 Advantages 15 8 Disadvantages 16 9 Introduction to Selection 17 10 Selection procedure & steps 18 11 Advantages & Disadvantages of Selection 19 12 Introduction to Indian Tobacco Co. ( Products & Brands ) 21 13 History of ITC 23 14 Need, Objective & Scope of the study 27 15 Recruitment & Selection practices at ITC 28 16 Data analysis & Interpretation 31 17 Questionnaire 35 18 Findings & suggestions 38 19 Bibliography 39 20 Webliography 40 INTRODUCTION MEANING AND DEFINITION : The word strategy has derived from the greek word ‘Strategos’. Strategic management is the continuous planning, monitoring, analysis and assessment of all that is necessary for an organization to meet its goals and objectives. Strategic management can also be defined as a bundle of decisions and acts which a manager undertakes and which decides the result of the firm’s performance. The manager must have a thorough knowledge and analysis of the general and competitive organizational environment so as to take right decisions. They should conduct a SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats), i.e., they should make best possible utilization of strengths, minimize the organizational weaknesses, make use of arising opportunities from the business environment and shouldn’t ignore the threats. Strategic management is nothing but planning for both predictable as well as unfeasible contingencies. It is applicable to both small as well as large organizations as even the smallest organization face competition and, by formulating and implementing appropriate strategies, they can attain sustainable competitive advantage.It is a way in which strategists set the objectives and proceed about attaining them. It deals with making and implementing decisions about future direction of an organization. It helps us to identify the direction in which an organization is moving. Strategic management is a continuous process that evaluates and controls the business and the industries in which an organization is involved; evaluates its competitors and sets goals and strategies to meet all existing and potential competitors; and then reevaluates strategies on a regular basis to determine how it has been implemented and whether it was successful or does it needs replacementOrganization exist for a purpose. The mission is articulated in a broadly defined but enduring statement of purpose that identifies the scope of an organization’s operations and its offerings to affected groups and entities. Most organizations of a significant size or stature have developed a formal mission statement. Strategy refers to top management’s plans to develop and sustain competitive advantage—a state whereby a firm’s successful strategies cannot be easily duplicated by its competitors. STRATEGIC MANAGEMENT PROCESS Strategic management process has following four steps: 1. Environmental Scanning - Environmental scanning refers to a process of collecting, scrutinizing and providing information for strategic purposes. It helps in analyzing the internal and external factors influencing an organization. External Analysis: Analyze the opportunities and threats, or constraints, that exist in the organization’s external environment, including industry and forces in the external environment. Internal Analysis: Analyze the organization’s strengths and weaknesses in its internal environment. Consider the context of managerial ethics and corporate social responsibility . 2. Strategy Formulation- Strategy formulation is the process of deciding best course of action for accomplishing organizational objectives and hence achieving organizational purpose. After conducting environment scanning, managers formulate corporate, business and functional strategies. 3. Strategy Implementation - Strategy implementation implies making the strategy work as intended or putting the organization’s chosen strategy into action. Strategy implementation includes designing the organization’s structure, distributing resources, developing decision making process, and managing human resources. 4. Strategy Evaluation- Strategy evaluation is the final step of strategy management process. The key strategy evaluation activities are: appraising internal and external factors that are the root of present strategies, measuring performance, and taking remedial / corrective actions. Evaluation makes sure that the organizational strategy as well as it’s implementation meets the organizational objectives The Advantages of Strategic Management Discharges Responsibility Many organizations undertake a strategic management process in order to discharge their responsibilities. There is an expectation from shareholders, stakeholders and the general community at large, that a well-managed organization has a strategic management process that guides its future success. Allows an Objective Assessment Strategic management provides a discipline that allows the senior management team to take a step back from the day-to-day business and think about the future of the organization. Without this discipline, the organization can become solely consumed with working through the next issue or problem without consideration to the larger picture, longer-term trends and associated operational and environmental alignment. Provides a Framework for Decision-Making It is not possible for senior management to know all the operational decisions staff make on a day-to-day basis. The cumulative effect of these day-today decisions, can have a significant impact on the success of the organization. Providing a framework within which staff can make these day-to-day decisions helps better focus their efforts on those activities that will best support the organization's success. Facilitates Measurement of Progress Establishing performance measures that are aligned with the strategy and provide timely and meaningful information is critical to breaking through the excessive “information noise”. It helps ensure timely, informed strategic decisions to be made. Strategy sets the direction and enables an organization to align its objectives and performance measures. These objectives and performance measures allow meaningful information to be provided to decision-makers regarding the organization’s progress through such vehicles as scorecards and dashboards. Enhances Strategic Agility (Innovation) An organization is deemed to have “Strategic Agility” when it can successfully capitalize upon opportunities resulting from unanticipated and significant change. When formulated appropriately, strategy can improve the ability of the organization to respond effectively to significant change. Organizational strategy is both formulated and formed. Disadvantages of Strategic Management Complex Process Strategic management involves continuous assessments of critical components, such as external and internal environments, short-term and long-term objectives, organizational structure, and strategic control. The external factor, which is the poor economy, changes the internal environment, which is the number of people employed. Then, a company may need to review objectives and make necessary
Recommended publications
  • Proquest Dissertations
    REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • EN-Google Hacks.Pdf
    Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52.
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • Google Search Techniques
    Google Search Techniques Google Search Techniques Disclaimer: Using Google to search the Internet will locate resources that are available to the public. While these resources are good for some purposes, serious research and academic work often requires access to databases, articles and books that, if they are available online, are only accessible by subscription. Fortunately, the UMass Library subscribes to most of these services. To access these resources online, go to the UMass Library Web site (library.umass.edu). For the best possible help finding information on any topic, talk to a reference librarian in person. They can help you find the resources you need and can teach you some fantastic techniques for doing your own searches. For a complete guide to Google’s features go to http://www.google.com/help/ Simple Search Strategies Google keeps the specifics of its page-ranking techniques secret, but here are a few things we know about what makes pages appear at the top of your search: - your search terms appears in the title of the web page - your search terms appear in links that lead to that page - your search terms appear in the content of the page (especially in headers) When you choose the search terms you enter into Google, think about the titles you would expect to see on these pages or that you would see in links to these pages. The more well-known your search target, the more easy it will be to find. Obscure topics or topics that share terms with more common topics will take more work to find.
    [Show full text]
  • Regulation and Emancipation in Cyberspace by Zhu Chenwei *
    Volume 1, Issue 4,December 2004 In Code, We Trust? Regulation and Emancipation in Cyberspace * By Zhu Chenwei Abstract Code is one of the regulatory modalities as identified by Lawrence Lessig. It is proposed that, in cyberspace, code should not only regulate but also emancipate. However, the emancipatory dimension of code has long been neglected since law and market are increasingly operating in a normative vacuum. The emancipatory approach is also supported by the practice of digital commons, which is to liberate cyberspace from various constraints. DOI: 10.2966/scrip.010404.585 © Zhu Chenwei 2004. This work is licensed through SCRIPT-ed Open Licence (SOL) . * ZHU Chenwei, LL.B. (SISU, Shanghai), LLM in Innovation, Technology and the Law (Edinburgh). He is currently a member on the team of iCommons China. The Author is thankful to Mr. Andres Guadamuz, who always provides rich inspiration and great food for thought. This article is impossible without some fruitful discussions with Gerard Porter, David Possee, Isaac Mao, Sun Tian, Chen Wan, Michael Chen and Zheng Yang. The author is also indebted to the anonymous reviewers providing invaluable comments on this paper. He is solely responsible for any mistake in it. (2004) 1:4 SCRIPT-ed 586 Ronald Dworkin: Lawrence Lessig: We live in and by the law. It makes us We live life in real space, subject to what we are: citizens and employees the effects of code. We live ordinary and doctors and spouses and people lives, subject to the effects of code. who own things. It is sword, shield, We live social and political lives, and menace [....] We are subjects of subject to the effects of code.
    [Show full text]
  • Digital Memories: Exploring Critical Issues
    Edited by Anna Maj & Daniel Riha Digital Memories Exploring Critical Issues Critical Issues Series Editors Dr Robert Fisher Dr Nancy Billias Advisory Board Dr Alejandro Cervantes-Carson Dr Peter Mario Kreuter Professor Margaret Chatterjee Martin McGoldrick Dr Wayne Cristaudo Revd Stephen Morris Mira Crouch Professor John Parry Dr Phil Fitzsimmons Paul Reynolds Professor Asa Kasher Professor Peter Twohig O w e n K e l l y Professor S Ram Vemuri Revd Dr Kenneth Wilson, O.B.E A Critical Issues research and publications project. http://www.inter-disciplinary.net/critical-issues/ The C y b e r Hub ‘Digital Memories’ Digital Memories: Exploring Critical Issues Edited by Anna Maj and Daniel Riha Inter-Disciplinary Press Oxford, United Kingdom © Inter-Disciplinary Press 2009 http://www.inter-disciplinary.net/publishing/id-press/ The Inter-Disciplinary Press is part of Inter-Disciplinary.Net – a global network for research and publishing. The Inter-Disciplinary Press aims to promote and encourage the kind of work which is collaborative, innovative, imaginative, and which provides an exemplar for inter-disciplinary and multi- disciplinary publishing. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of Inter-Disciplinary Press. Inter-Disciplinary Press, Priory House, 149B Wroslyn Road, Freeland, Oxfordshire. OX29 8HR, United Kingdom. +44 (0)1993 882087 British Library Cataloguing in Publication Data. A catalogue record for this book is available from the British Library. ISBN: 978-1-84888-004-7 First published in the United Kingdom in eBook format in 2009.
    [Show full text]
  • College Voice Vol. 26 No. 21
    Connecticut College Digital Commons @ Connecticut College 2002-2003 Student Newspapers 5-2-2003 College Voice Vol. 26 No. 21 Connecticut College Follow this and additional works at: https://digitalcommons.conncoll.edu/ccnews_2002_2003 Recommended Citation Connecticut College, "College Voice Vol. 26 No. 21" (2003). 2002-2003. 9. https://digitalcommons.conncoll.edu/ccnews_2002_2003/9 This Newspaper is brought to you for free and open access by the Student Newspapers at Digital Commons @ Connecticut College. It has been accepted for inclusion in 2002-2003 by an authorized administrator of Digital Commons @ Connecticut College. For more information, please contact [email protected]. The views expressed in this paper are solely those of the author. - .- - ---------..,. First Class U.S. Postage PAID Pennit#35 New London, cr PUBUSHED WEEKLY BY THE STUDENTS OF CONNECTICUT COLLEGE VOLUME XXVI • NUMBER 21 FRIDAY, M4Y 2, 2003 CONNECTICUT COlLEGB, NEW LONDON, CT INSIDE: Campbell Leaves to Assume New Deanship SPECIAL By JAMIE ROGERS The College Voice presents spe- Campbell's decision. "We are NEWS EDITOR thrilled that he and his family have cial News, A&E and Sports pro- chosen to join us at Assumption files of graduating seniors. Conway Campbell, Director of College," said Nancy Crimmin, cur- Residential Life and Housing, rent Associate Dean of Students, announced his resignation last week, who will be the Dean of Campus accepting the position of Associate Life next year and work closely with Dean of Students and Director of Campbell. "We are looking forward Residential Life at Assumption to his new ideas, fresh sense of Kurt Brown '03 passed the gavel on 10Rick Gropper '04 Thrusday night.
    [Show full text]
  • Becker, G. F., Ponschock, R. L. & Wilson, A. (2017
    Becker, G. F., Ponschock, R. L. & Wilson, A. (2017). A conceptual model of personal privacy considerations in a transformative media eco-system. Journal of Strategic and International Studies, XII(2), 19-28. ISSN: 2326-3636. Presented at Spring International Multidisciplinary Academic Conference, Orlando, Florida, March 2017. A CONCEPTUAL MODEL OF PERSONAL PRIVACY CONSIDERATIONS IN A TRANSFORMATIVE MEDIA ECO-SYSTEM Anthony Wilson, Nyack College, New York Gerard F. Becker, Nyack College, New York Richard. L. Ponschock, Northern Arizona University, Arizona; Nyack College, New York ABSTRACT This research introduces a conceptual model for exploring and understanding various aspects of what this study terms, “Unconscious Permission? Utility vs. Price of surrendered privacy”. Through an initial meta-analytic approach of existent research, current events, and emerging trends, it was concluded that the impact on personal and professional privacy related to a rapidly transformative media eco-system is akin to exploring the “tip of an iceberg”. The emerging ramifications are compounding at an exponential velocity and must be fully grasped before its momentum becomes untenable to harness. As a follow-on to a book published by several of the authors herein (Ponschock & Becker, 2016), this conceptual model has emerged as another facet of the originally constituted longitudinal study related to the overall impact of digitization on society. This initial exploratory study into the far reaching impacts of personal privacy considerations requires consistent, rapid and in-depth follow-on discovery in order to fully grasp the depth of this “iceberg”. Keywords: ToS; IoT; “Click Wrap”; Social Media, Software Contracts; DIGIPERSON; Surveillance Capitalism; Digital Bread Crumbs©, Digital Exhaust, Big Data 1.
    [Show full text]
  • Google Hacks by Tara Calishain, Rael Dornfest Publisher : O'reilly Pub
    Google Hacks By Tara Calishain, Rael Dornfest Publisher : O'Reilly Pub Date : February 2003 ISBN : 0-596-00447-8 Preface Search engines for large collections of data preceded the World Wide Web by decades. There were those massive library catalogs, hand -typed with painstaking precision on index cards and eventually, to varying degrees, automated. There were the large data collections of professional information companies such as Dialog and LexisNexis. Then there are the still-extant private, expensive medical, real estate, and legal search services. Those data collections were not always easy to search, but with a little finesse and a lot of patience, it was always possible to search them thoroughly. Information was grouped according to established ontologies, data preformatted according to particular guidelines. Then came the Web. Information on the Web—as anyone knows who's ever looked at half-a-dozen web pages knows—is not all formatted the same way. Nor is it necessarily particularly accurate. Nor up to date. Nor spellchecked. Nonetheless, search engines cropped up, trying to make sense of the rapidly-increasing index of information online. Eventually, special syntaxes were added for searching common parts of the average web page (such as title or URL). Search engines evolved rapidly, trying to encompass all the nuances of the billions of documents online, and they still continue to evolve today. Google™ threw its hat into the ring in 1998. The second incarnation of a search engine service known as BackRub, the name "Google" was a play on the word "googol," a one followed by a hundred zeros.
    [Show full text]
  • TEAM Ling 01 599305 Ffirs.Qxd 7/15/05 6:50 PM Page I
    TEAM LinG 01_599305_ffirs.qxd 7/15/05 6:50 PM Page i Google™ Search & Rescue FOR DUMmIES‰ 01_599305_ffirs.qxd 7/15/05 6:50 PM Page ii 01_599305_ffirs.qxd 7/15/05 6:50 PM Page iii Google™ Search & Rescue FOR DUMmIES‰ by Brad Hill 01_599305_ffirs.qxd 7/15/05 6:50 PM Page iv GoogleTM Search & Rescue For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • Google Hacking
    SeminarSeminar OnOn Google Hacking Presented By Subahankar Dam Dept. of Electrical Engineering 7th Semester Introduction What is Hacking? What is Google? A Historical View Google Inc. Year: 1954 4th Sept. 1998 Name: Milton Sirotta Name: Sergey Brin, Larry Page Location: USA Location: Mountain View,California Anatomy: Property of Google Search Case sensitivity: Stopwords: Query Word Limit: What’s more to Google than Searching the Web? Integrated Calculator Link: www.google.com Book Search: Link: www.books.google.com Currency Conversion: Link: www.google.com Image Search: Link: www.image.google.com What’s more to Google than Searching the Web? Local Search: Link: www.google.com Movies: Link: www.google.com Music Search: Link: www.google.com Q & A: Link: www.google.com Web Page Translation: Link: www.google.com/language_tools Web Page Translation: Link: www.google.com/language_tools Google Boolean Operators AND or (+): OR or ( | ): NOT or (-): Using Wildcard: Preferences: Preferences: ADVANCED SEARCH OPERATORS: Intitle, Allintitle: Syntax: intitle: search_term Inurl, Allinurl: Syntax: inurl: search_term Intext, allintext: Syntax: intext: search_term Filetype: Syntax: filetype: extension search_term ADVANCED SEARCH OPERATORS: define: Syntax: define: search_term related: Syntax: related: url info: Syntax: info: url cache: Phonebook: Syntax: phonebook: name location Create Your Own Google Search Engine! Link: http://google.com/coop/cse/ NewestNewest Launch!!Launch!! Googlism: Link: www.googlism.com Google Calender Link: www.google.com/calender/ Questions? “Comments” [email protected] Links and References: www.google.com/apis www.google.com/remove.html http://johnny.ihackstuff.com/ “Google Hacking for Penetration Tester” by Johnny Long. “Google Hacking” by Ankit Fadia. www.i-hacked.com/content/view/23/42/ “ETHICAL HACKING” BY ThankThank Ankit Fadia YouYou .
    [Show full text]
  • Digital Environments
    Urte Undine Frömming, Steffen Köhn, Samantha Fox, Mike Terry (eds.) Digital Environments Media Studies Urte Undine Frömming, Steffen Köhn, Samantha Fox, Mike Terry (eds.) Digital Environments Ethnographic Perspectives across Global Online and Offline Spaces The printed version of this book is available thanks to the support of Freie Uni- versität Berlin, Department of Political and Social Sciences, Reserach Area Visual and Media Anthropology. An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched. KU is a collaborative ini- tiative designed to make high quality books Open Access for the public good. The Open Access ISBN for this book is 978-3-8394-3497-0 This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 (BY-NC-ND). which means that the text may be used for non-commercial purposes, provided credit is given to the author. For details go to http://creativecommons.org/licenses/by-nc-nd/3.0/. Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Natio- nalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de All rights reserved. No part of this book may be reprinted or reproduced or uti- lized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any infor- mation storage or retrieval system, without permission in writing from
    [Show full text]