Forensics Journal

Total Page:16

File Type:pdf, Size:1020Kb

Forensics Journal STEVENSON UNIVERSITY FORENSICS JOURNAL A SCHOLARLY REVIEW VOLUME 6, 2015 STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 6 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Leaf Susan Shlala FORENSICS JOURNAL After publishing the Stevenson University Forensics Journal annually for five years, it was time to try out something new. The Journal is still full of interesting articles touching many disciplines within the vast field we call Forensic Studies, and the articles are still fully student researched and written. However, this year we doubled the word limit requirement for the submissions. As a result, authors were given room to explore their subject matters a bit deeper, offer more extensive analysis and offer the reader a more thorough perspective on the topics Also new this year is an “Ask the Experts” column. The column is a feature that will give the reader perspective on a topic related to Forensic Studies by asking an expert to address common questions in his or her field. The experts will rotate to address different areas of Forensic Studies each year. Readers are encouraged to submit questions via email to [email protected]. I look forward to your participation in this aspect of the Journal. Once again, I offer my congratulations to the students from the Stevenson University Masters in Forensics program whose articles were selected for publication this year. Publication in the Journal is a highly competitive process and involves a tremendous commitment on the part of the author and editors. As always, the results are proof of the talent and dedication of our students. Carolyn Hess Johnson, Esquire Editor and Publisher 1 FORENSICS JOURNAL TABLE OF CONTENTS INTRODUCTION RECENT TRENDS OF ENFORCEMENT AND CAROLYN JOHNSON COMPLIANCE WITH THE FOREIGN COR- 1 36 RUPT PRACTICES ACT WILLIAM OLSEN ASK THE FORENSIC EXPERT: MICHAEL ROBINSON 4 DISRUPTING TERRORIST FINANCING: INTERAGENCY COLLABORATION, DATA 42 ANALYSIS, AND PREDICTIVE TOOLS REGULATIONS FOR OFF-BALANCE-SHEET ANDREA LYNCH PYON FINANCING PRODUCE RISKY FINANCIAL 6 STATEMENTS CRYSTAL ABRAHAM ERADICATING ELDER FINANCIAL ABUSE 52 CHERYL A. PANATTONI PROACTIVE DATA ANALYSIS TO PREVENT AND DETECT FRAUD IN SMALL BUSINESSES DATA ANALYSIS AND RELIABILITY 11 ROBERT E. BATES IN PREDICTING FRAUD 57 JOSEPH T. HARRIS, CIA, CFE TERRORISM IN CYBERSPACE: IS THE U.S. READY FOR A VIRTUAL 9/11? MEDICAID AND MEDICARE FRAUD, 19 KERA N. VALENTI WASTE AND ABUSE 65 LINDSAY M. WHEATLEY SECURITY IN THE CLOUD 25 JONATHAN MAY AFFINITY FRAUD: IDENTIFICATION AND PROSECUTION 30 CHRISTINE KREKE 3 STEVENSON UNIVERSITY Ask the Forensic Expert: Michael Robinson MICHAEL ROBINSON or later than what is displayed to the user. As a result, a file can be hidden and made to look like it was installed a long time ago, e.g., Michael Robinson is a computer forensic when the operating system was originally installed. On the surface, examiner and cyber threat analyst for a large timestomping may look efficient, but most file systems store dozens international company. He has performed of artifacts associated with each file, and when timestamps computer and cell phone exploitation and are analyzed across all of this metadata, timestomping typically analysis for customers in both the U.S. stands out. Intelligence Community and the private sector. Michael has performed computer forensic WHEN I NEED TO DISCARD MY CURRENT SMART PHONE examinations for the FBI’s Investigative Analysis Unit, where he FOR A NEW ONE, WHAT SHOULD I DO TO ENSURE THAT assisted special agents with counter-intelligence and criminal cases. MY OLD DATA HAS BEEN DELETED? Michael is the former CIO of the U.S. Department of Defense’s Business Transformation Agency, where he oversaw all information When discarding a smartphone, one of the safest ways to ensure technology and information assurance operations for the agency, that old user data, such as text messages, call logs, or Internet including overseeing all incident response and forensic investigations. history, is deleted is to complete a three-part process. This includes: 1. enabling encryption on the phone, 2. disabling cloud backups, Michael is the Program Coordinator and an Adjunct Professor and then 3. performing a factory reset of the phone. Resetting the for Stevenson University’s Master of Science in Cyber Forensics. smartphone will delete the encryption key and render the old user At Stevenson, he was the recipient of the Rose Dawson Award data unrecoverable. For older feature, i.e. dumb phones, the phone in 2013. He teaches courses in mobile device forensics, intrusion should be physically destroyed to ensure the chips holding data are analysis, and cyber warfare. Michael holds a Bachelor of Science in non-usable. This may mean destroying more than just the screen and Chemical Engineering, a Master of Science in Information Assurance, keyboard, which are often repairable. a Master of Science in Forensic Studies (concentrating on computer forensics), and a graduate certificate in Applied Intelligence. HOW DIFFICULT IS IT TO DELETE MY INTERNET HISTORY ASSOCIATED WITH MY BROWSER? Michael has presented at numerous national and international conferences including DEF CON, the DoD Cyber Crime By default, Internet browsers such as Google Chrome, Microsoft Conference, InfoSec World, and the BCISS Conference on Internet Explorer, and Mozilla Firefox, cache user activity on the Intelligence Analysis. He has authored over a dozen journal articles computer. This is done to make visiting websites more efficient. and a book on disaster recovery planning for nonprofit organizations. The browser will not need to re-download content, when a web page is visited subsequently. User’s can delete their browsers’ caches and IS IT REALLY POSSIBLE FOR A COMPUTER FORENSIC cookies; however, until the files are overwritten with new data, the EXAMINER TO RECOVER DELETED FILES? Internet history can be recovered. Additionally, most computers will also store fragments of data with Internet history in other operating It depends. When a user deletes a file, the pointers to the file are system files, such as temp files and swap files, to improve system deleted and the file system is told that it can re-use the storage space, efficiency. Most computers are connected to Local Area Networks, when it is needed. The file, itself, will still reside on the disk until it which employ firewalls and other security devices. These network is overwritten. During a computer forensic examination, it is possible devices, which a user cannot access directly, will frequently record to recover the deleted file until the old content is overwritten. It is portions of Internet activity. This information is retained for a time also likely that a portion of the file may be overwritten, rather than period determined by the administrators. the entire file, which will result in a fragment of the original file being recovered. COMPUTER FORENSICS OFTEN INVOLVES ANALYZING HARD DRIVES FROM COMPUTERS. WHAT OTHER DATA WHAT IS TIMESTOMPING AND HOW EFFECTIVE IS IT? IS ANALYZED AND IS IT CONSIDERED FORENSICALLY When files are saved to digital media, such as a hard drive or USB SOUND? flash drive, the file system stores data, which describes the file. This metadata includes filenames, timestamps, and other information. Digital forensics, which is broader than computer forensics, frequently Timestomping is a form of obfuscation, where a person or piece involves removing hard drives from computers and analyzing the of malicious software changes the timestamps associated with a file. contents stored on them. This is frequently referred to as “dead box” Timestomping may give the appearance of a file being created earlier forensics. In addition to this type of analysis, forensic examiners will 4 FORENSICS JOURNAL capture and analyze the contents of RAM in a running computer to gather running processes, passwords, and other volatile data, network traffic captured by firewalls, routers, and intrusion detection systems, mobile phones, and system backups. Provided the procedure to capture and analyze this data is appropriately documented and meets certain industry standards, these techniques are forensically sound. WHAT IS THE DISTINCTION BETWEEN A “SMART” PHONE AND A “DUMB” PHONE? “Smart phone” is the term used for mobile phones which can do more than just make phone calls and send text messages. They have more memory, better screens, more robust processors, have the ability to surf the web, download/run apps, and establish VPN connections. They function like computers, which can make phone calls. Android and Apple phones fall into this class. Dumb phones can perform only basic functions, such as making calls and sending text messages. A few of them have some built-in apps such as alarm clocks and calculators. These phones are smaller, have low-end processors, typically cannot surf the Internet, and do not allow the user to download/run third-party apps. Example: the cheap $10 phone you can buy at the grocery store. The terms “smart phone” and “feature phone” are real terms and are actually used in the industry. However, the industry has moved away from using the term “dumb” phone and went to “feature” phone. WILL HAVING A PASSWORD ON MY MOBILE PHONE PROTECT IT FROM HAVING THE DATA ACCESSED? Many people use passwords to lock the keyboard and screen on dumb phones. Dumb phones allow a user to lock their phones to avoid the so-called “butt dialing” or to prevent a stranger from picking up the phone and scrolling through it. The passcode typically does not lock the data port on the phone. Therefore, in many, but not all situations, a mobile device forensic tool can be used to conduct an acquisition of the locked phone, which will recover the user data from the phone. On smart phones, the password may or may not protect the phone and its data from being accessed.
Recommended publications
  • Barry Minkow
    Barry Minkow Barry Jay Minkow (born March 17, 1967) is a former businessman, pastor and convicted felon. While still in high school, he founded ZZZZ Best (pronounced Zee Best), which appeared to be an immensely successful carpet-cleaning and restoration company. However, it was actually a front to attract investment for a massive Ponzi scheme. It collapsed in 1987, costing investors and lenders $100 million—one of the largest investment frauds ever perpetrated by a single person, as well as one of the largest accounting frauds in history. The scheme is often used as a case study of accounting fraud. After being released from jail, Minkow became a preacher and a fraud investigator, and spoke at schools about ethics. This all came to an end in 2011, when he admitted to helping deliberately drive down the stock price of homebuilder Lennar and was ordered back to prison. At first, Minkow struggled to meet basic expenses. Two banks closed his business account because California law didn't allow minors to sign binding contracts, including checks. He was also plagued by customer complaints and demands for payment from suppliers. At times, he found it difficult even to meet payroll. Faced with a shortage of operating capital, he financed his business via check kiting, stealing and selling his grandmother's jewelry, staging break-ins at his offices, and running up fraudulent credit card charges. After that, Minkow branched into the "insurance restoration" business. With the help of Tom Padgett, an insurance claims adjuster, Minkow forged numerous documents claiming that ZZZZ Best was involved in numerous restoration projects for Padgett's company.
    [Show full text]
  • Gary Zeune: [00:00:00] Every Fraud That We Talk About Is a Situation Where Really Smart ​ ​ People to Do Really Stupid Stuff
    Gary Zeune: [00:00:00] Every fraud that we talk about is a situation where really smart ​ ​ people to do really stupid stuff. Peter Margaritis: [00:00:17] Welcome to Change Your Mindset Podcast, formerly ​ ​ known as Improv is No Joke, where it's all about believing that strong communication skills are the best way in delivering your technical accounting knowledge and growing your business. An effective way of building stronger communication skills is by embracing the principles of applied improvisation. Peter Margaritis: [00:00:37] Your host is Peter Margaritis, CPA, a.k.a. The Accidental ​ ​ Accountant. And he will interview financial professionals and business leaders to find their secret in building stronger relationships with their clients, customers, associates, and peers, all the while growing their businesses. So, let's start the show. Peter Margaritis: [00:01:04] Welcome to Episode 21. My guest today is Gary Zeune, ​ ​ CPA. And his consulting practice provide CPAs, attorneys, and executives with hands-on experience in fraud, auditing, and corporate strategy performance improvement. Prior to forming his consulting practice, Gary was an Assistant Vice President of Corporate Finance at the Ohio Company, a Columbus, Ohio investment banking firm. Peter Margaritis: [00:01:30] He also spent more than five years in treasury and ​ ​ Finance at Wendy's International where he was responsible for mergers and acquisitions, financial and SEC reporting, and corporate finance. Gary has the only speaker bureau in the country specializing in white-collar criminals, The Pros and The Cons. His 40 plus ex-con speakers tell their stories of how and why they embezzled, took kickbacks, and cooked the books to the tune of $2.7 billion.
    [Show full text]
  • Multilevel Marketing Diffusion and the Risk of Pyramid Scheme Activity: the Ac Se of Fortune Hi‐Tech Marketing in Montana Stacie A
    Hamline University DigitalCommons@Hamline School of Business All Faculty Scholarship School of Business Spring 2015 Multilevel Marketing Diffusion and the Risk of Pyramid Scheme Activity: The aC se of Fortune Hi‐Tech Marketing in Montana Stacie A. Bosley Hamline University, [email protected] Kim McKeage Hamline University, [email protected] Follow this and additional works at: http://digitalcommons.hamline.edu/hsb_faculty Part of the Economics Commons, Marketing Commons, and the Public Policy Commons Recommended Citation Bosley, Stacie A. and McKeage, Kim, "Multilevel Marketing Diffusion and the Risk of Pyramid Scheme Activity: The asC e of Fortune Hi‐Tech Marketing in Montana" (2015). School of Business All Faculty Scholarship. Paper 2. http://digitalcommons.hamline.edu/hsb_faculty/2 This is the author's submitted copy before peer reviewed edits. The final, definitive version of this document can be found online at Journal of Public Policy & Marketing published by the American Marketing Association. Copyright restrictions apply. doi: 10.1509/jppm.13.086 This Article is brought to you for free and open access by the School of Business at DigitalCommons@Hamline. It has been accepted for inclusion in School of Business All Faculty Scholarship by an authorized administrator of DigitalCommons@Hamline. For more information, please contact [email protected]. 1 July 14, 2014 Stacie Bosley and Kim K. McKeage Forthcoming in the Journal of Public Policy and Marketing Multilevel marketing diffusion and the risk of pyramid scheme activity: The case of Fortune Hi-Tech Marketing in Montana Abstract While statisticians have simulated the expected rate of growth in pyramid schemes, this research examines actual data on the spread of an alleged pyramid scheme in Montana.
    [Show full text]
  • Redacted Complaint
    Case 4:20-cv-00311-SDJ Document 60 Filed 06/24/21 Page 1 of 76 PageID #: 1944 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS SHERMAN DIVISION HOLLIS M. GREENLAW, TODD F. ETTER, CARA D. OBERT, BENJAMIN L. WISSINK, UMT HOLDINGS, L.P., UDF HOLDINGS, L.P., UNITED DEVELOPMENT FUNDING, L.P., UNITED DEVELOPMENT FUNDING III, L.P., UNITED DEVELOPMENT FUNDING IV, UNITED DEVELOPMENT FUNDING INCOME FUND V, UNITED MORTGAGE TRUST, and UNITED DEVELOPMENT FUNDING LAND OPPORTUNITY FUND, L.P., Plaintiffs, v. No. _____________________ DAVID KLIMEK, JAMES NICHOLAS BUNCH, JURY DEMANDED CHRISTINE L. EDSON, a/k/a Christy Edson, and DOES 1-10, Defendants. COMPLAINT AND JURY DEMAND Case 4:20-cv-00311-SDJ Document 60 Filed 06/24/21 Page 2 of 76 PageID #: 1945 TABLE OF CONTENTS SUMMARY ................................................................................................................................... 1 SUBJECT MATTER JURISDICTION ......................................................................................... 9 VENUE .......................................................................................................................................... 9 PLAINTIFFS .................................................................................................................................. 9 DEFENDANTS ............................................................................................................................ 13 RELEVANT PERSONS AND ENTITIES .................................................................................
    [Show full text]
  • 30+ EXPERT CONFERENCE SPEAKERS If You Can't Tell Who
    10356 Wellington Bvld, Suite D Expert Powell, OH 43065 Conference 614-761-8911 www.TheProsAndTheCons.com Speakers [email protected] 30+ EXPERT CONFERENCE SPEAKERS If you can’t tell who fooled Internationally Recognized Cheryl’s Bookkeeper their CPAs… Security Expert Ben Wright Stole $400,000 Purchasing Mgr Past Exec Dir Tenn Board CFE Chrissie Powers Went to Prison of Accountancy NEW Finds Fraud Pulitzer Prize Winner Ex-CPA Did Time White Collar Criminal Gov’t Fraud and Abuse Expert for Ponzi Scheme Who Became a CPA …then your members can’t. Bookkeeper White Collar Criminal Walt Stole $345,000 Pavlo Writes Forbes Column Accounting ZZZZ Best CFO Ex-KPMG Partner Forgery Expert Mark Morze Insider Trading Investigates CPA Infamous Crazy Former NASBA Chair Malpractice Eddie Fraud CFO Gaylen Hansen Kathy Bazoian Phelps NEW - Google Expert Gary Zeune CPA Ponzi Scheme Garrett Wasny Managing Director Attorney and Author Retail Fraud Expert Fraud Expert Bookkeeper Thief Peter Goldmann Bank CEO Paul Allen Ex-CPA Ex-County Commits $2.7 Billion Fraud Auditor Kay Rogers Global Fraud Expert Drexel Burham Banker Dan Elder Fraud Expert Mortgage Fraudster Bubalo Insider Trading Jerome Mayne David Kessler WHICH EXPERT DO YOU NEED???? CON Scott London Ex-CPA Ex-Big 4 Partner Insider Trading Nov 2015 Scott London was a regional audit partner for KPMG with 500 people Scott London reporting to him. London explains how he signed and complied with the firm’s ethics policies for 25 years. He declined a friend’s request for help. Read WSJ Profile Then, as is often the case, started a slow slide down the ethical slippery slope.
    [Show full text]
  • Forensics Journal
    process analysts and technicians undergo to obtain various work-related credentials based on qualifying education, experience, etc. Not all accrediting bodies require analysts or technicians to obtain specific certifications. In this paper, the term forensic science service provider may be used interchangeably with science service provider is defined as “having at least one full-time analyst, however named, who examines physical evidence in criminal and/or investigative matters and provides reports or opinion testimony with respect to such evidence in United States courts of law” (National Science and Technology Council 3). Understanding Fraud: From the Basics to Analysis By Lauren Rose Harry Markopolos was once an obscure financial analyst, a number-crunching fraud investigator from Boston. His career at a Boston investment firm focused on analyzing the trading strategies and revenue streams of exceptionally-performing compa- nies in order to replicate and/or produce superior results (Kroft). His obscurity ended after he uncovered Bernard Madoff’s 65 billion dollar Ponzi scheme. Madoff, former chairman of the NASDAQ stock exchange, was highly respected in the stock market industry. In fact, he was one of the most powerful men on Wall Street. Markopolos’ investigation lasted over eight years and his conclusion was that Madoff was committing fraud. Through mathematics, Markopolos was able to prove that Madoff was scamming investors out of millions of dollars. Over time, the relationship of mathematically analyzing financial data to the frequen- cy of discovered fraud has become more evident. This is due to increased awareness and knowledge of fraudsters’ motivations and opportunities, advancements in technology, improved education of and increased demand for professional fraud examiners and forensic accountants, and the overall higher occurrence of fraud.
    [Show full text]
  • Minkow -- Press Release 01-21-14
    NEWS RELEASE OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California United States Attorney Laura E. Duffy Assistant U. S. Attorney Mark W. Pletcher (619) 546-9714 For Immediate Release FORMER INMATE TURNED PASTOR BARRY MINKOW PLEADS GUILTY TO BILKING CONGREGATION NEWS RELEASE SUMMARY – January 22, 2014 United States Attorney Laura E. Duffy announced today that former convict, turned fraud investigator and pastor, Barry Minkow, admitted embezzling and defrauding the San Diego Community Bible Church (“SDCBC”) and its congregation out of more than $3 million. Minkow, who is currently in custody after his conviction on unrelated securities fraud charges, entered a guilty plea today in federal court in San Diego before the Honorable William Gallo, United States Magistrate Judge. As part of his guilty plea, Minkow admitted to a litany of improper conduct, including opening unauthorized bank accounts on behalf of the SDCBC, forging signatures on SDCBC checks, using funds drawn on legitimate church accounts for his personal benefit, and charging unauthorized personal 1 expenses on church credit cards. In addition, Minkow confessed to diverting SDCBC member donations for his own benefit and embezzling money intended as church donations. In all, Minkow admitted purloining – and concealing from the IRS – at least $3 million from SDCBC’s parishioners and lenders. As described in court documents, Minkow’s conduct continued for over a decade. U.S. Attorney Laura E. Duffy remarked: “Barry Minkow is again convicted of fraud, this time for stealing money from the parishioners of San Diego Community Bible Church. With our law enforcement partners, we stand vigilant against those who cheat and steal without regard to the consequences wrought on their victims and their communities.” The U.S.
    [Show full text]
  • 1 of 93 1 2 3 4 5 6 7 8 a B C D E F G First Name Last Name City State Zip Country Willie Gobabis Omahe Ke 9000 NAMIBIA Z
    A B C D E F G 1 First Name Last Name City State Zip Country Petition Comment Willie Gobabis Omahe 9000 NAMIBIA 2 ke zohaib jhelum 49600 PAKISTAN truth of mlm companies 3 4 Armando AZ 85257 USA 5 Yesenia CA 90063 USA Jayasankar Chennai Tamil 600034 INDIA Dear President, I am from India. Kindly ban the MLM companies nadu like AMWAY which is making false claim and cheating people of India.We people of India see you as a Different from other President's who ruled US> we see you next to Abraham Linkcon,JFK. we all hope that you will bring a Amendentment in the Senete to BAN MLM COMPANY AMWAY. 6 LONNIE & LACOMBE ALBER T4L 2N5 CANADA MERLO TA 7 SULZLE Londell & Jodie LACOMBE ALBER T4L 1P4 CANADA Sulzle TA 8 Petitions for Regulation of Multi-Level Marketing – PUBLIC 1 of 93 Gathered on http://www.pyramidschemealert.org A B C D E F G Dahya Des Plaines IL 60018 USA Government must take strong actions against all the pyramid and so called MLM schemes.common people fall for ir as they are pitched well and are very deceptive.For people awareness past records and investigations should be made to run again on TV and other medias. have been financially hurt by Amway/Quixtar,and finally left it.FTc especially should investigate the support systems so called motivational organisations associated with the Amway like BWW,LTD,WWDB,network21 and so on..who litterly sucks money out of the members by selling cds,videos,meetings,books and whatever they can.I humbly asks a Congressional Investigation of the FTC and SEC regarding enforcement of laws against Pyramid Selling Schemes, Multi-level Marketing Scams, Ponzi Investment Frauds, Bogus "Motivational organisations" and "Work from Home" Schemes.
    [Show full text]
  • Documento Protegido Pela Leide Direito Autoral
    1 UNIVERSIDADE CANDIDO MENDES / AVM PÓS-GRADUAÇÃO LATO SENSU A EXPANSÃO DO MARKETING MULTINÍVEL NO BRASIL Daniel Nunes de Mello e Alvim ORIENTADOR: Prof. Mario Luiz Rio de Janeiro 2017 DOCUMENTO PROTEGIDO PELA LEIDE DIREITO AUTORAL 2 UNIVERSIDADE CANDIDO MENDES / AVM PÓS-GRADUAÇÃO LATO SENSU A EXPANSÃO DO MARKETING MULTINÍVEL NO BRASIL Apresentação de monografia à AVM como requisito parcial para obtenção do grau de especialista em Gestão Empresarial. Por: Daniel Nunes de Mello e Alvim Rio de Janeiro 2017 3 AGRADECIMENTOS Aos amigos e parentes, por tudo que fizeram e fazem por mim, além dos novos colegas que fiz durante o curso. 4 DEDICATÓRIA Dedica-se ao pai, mãe, amigo, cônjuge, familiar, filho etc. 5 RESUMO Marketing multinível, também conhecido como marketing de rede, é um sistema de marketing caracterizado pela formação de uma rede de contatos através da indicação de novos associados, por parte dos antigos. Ou seja, trata-se de uma estratégia empresarial de distribuição de bens e serviços, onde a divulgação dos produtos se dá pela indicação “boca a boca” feita por distribuidores independentes. Por esse trabalho, tais distribuidores recebem bônus, que seriam utilizados nas campanhas de propaganda tradicional. Além da indicação dos produtos, os distribuidores tem a possibilidade de indicar novos distribuidores, criando assim uma rede de escoamento de produtos. De acordo com Will Marks “O marketing de rede é um sistema de distribuição, ou forma de marketing, que movimenta bens e/ou serviços do fabricante para o consumidor por meio de uma ‘rede’ de contratantes independentes”. O sistema de Marketing Multinível possui várias nomenclaturas utilizadas pelo mercado, entre elas podemos encontrar: * Marketing de Rede (MR) * Marketing Multinível (MMN) * Multi Level Marketing (MLM) * Network Marketing (NM) 6 METODOLOGIA A metodologia a ser aplicada foi a pesquisa bibliográfica.
    [Show full text]
  • Universidad Nacional De San Agustín De Arequipa Facultad De Ciencias Histórico Sociales Escuela Profesional De Sociología
    UNIVERSIDAD NACIONAL DE SAN AGUSTÍN DE AREQUIPA FACULTAD DE CIENCIAS HISTÓRICO SOCIALES ESCUELA PROFESIONAL DE SOCIOLOGÍA TESIS RELACIÓN ENTRE CAPACIDAD DE NEGOCIACIÓN Y GRADO DE ÉXITO EN LAS REDES EMPRESARIALES MULTINIVEL DE LOS NETWORKERS EN AREQUIPA METROPOLITANA, 2018 Tesis presentada por el Bachiller: DANI FRANKLIN ZAPANA VILCA Para optar el Título Profesional de: Licenciado en Sociología Asesor: Dr. Eliseo Zeballos Zeballos AREQUIPA – PERÚ 2018 I DEDICATORIA A mis padres, con amor. II AGRADECIMIENTOS Estoy muy agradecido con los networkers, quienes con su entusiasmo, generosidad y tremenda disposición apoyaron brindando información y conectándonos con otros distribuidores de la industria multinivel. Quiero reconocer el asesoramiento del Soc. Eliseo Zeballos, quien ha sido el asesor de la presente tesis, por su contribución en este proyecto. También un agradecimiento especial a todas las demás personas que colaboraron en algún sentido, porque todo suma, con esta investigación. III RESUMEN La presente investigación ofrece una perspectiva centrada en el estudio de las relaciones entre la capacidad de negociación y el grado de éxito en las redes empresariales multinivel, teniendo como propósito determinar la relación entre estas categorías. Realizado entre los networkers de Arequipa Metropolitana en el 2018, este estudio es transversal no experimental y cuantitativo, que ha contado con una muestra probabilística de 378 casos seleccionados mediante un procedimiento aleatorio simple, y ha requerido el uso de un cuestionario estructurado como instrumento de medición. Los resultados evidencian la estrecha vinculación entre la capacidad de negociación y el grado de éxito en las redes empresariales multinivel, y más aún, al profundizar en la capacidad de negociación, esta asociación es más intensa en una de sus dimensiones: en la habilidad para generar alternativas.
    [Show full text]
  • Publication Encase Legal Journal
    LAW Guidance Software is the leader in digital investigation solutions. EnCase® Enterprise is used by numerous government agencies and 65 of the Fortune 100. Market-leading solutions EnCase® eDiscovery, EnCase® Cybersecurity, and EnCase® Analytics help organizations respond to e-discovery requests, security incidents, and emerging internal and external threats. EnCase® Legal Journal 5th Edition Official Legal Citation: EnCase L.J. (2014) .Copyright © 2014 Guidance Software Inc ,All rights reserved. No part of this book may be reproduced, stored, or transmitted by any means—whether auditory, graphic mechanical, or electronic—without written permission of both publisher and author, except in the case of brief excerpts used .in critical articles and reviews. Unauthorized reproduction of any part of this work is illegal and is punishable by law ISBN: 978-1-4834-0915-3 (sc) ISBN: 978-1-4834-0914-6 (e) Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do .not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them The information provided herein is general information only and does not constitute legal or other professional advice or any opinion of Guidance Software, Inc. or its contributing authors. For this reason, it is recommended that you seek the .advice of a lawyer who can advise you on the specific legal issues that may be applicable to your business concerns Any people depicted in stock imagery provided by Thinkstock are models, and .such images are being used for illustrative purposes only .Certain stock imagery © Thinkstock Lulu Publishing Services rev. date: 3/24/2014 Acknowledgements Guidance Software Editorial Board • Victor T.
    [Show full text]
  • 2014-Ibm-Annual-Report.Pdf
    2014 IBM Annual Report 2014 IBM Annual Report A Letter from the Chairman 1 Dear IBM Investor: The cover of our report to you last year asked: “What will we make of this moment?” This was the critical and urgent decision that we — and our clients — faced. Would we seize upon the major shifts that are reordering our industry and opening up vast new applications of information technology? In my letter, I described our answer: • IBM would help transform industries and professions with data. • We would remake enterprise IT for the era of cloud. • We would reimagine work by helping clients build systems of engagement, underpinned by the imperative of security. At the same time, we would address significant challenges in some of our businesses, principally hardware. We knew we faced a critical year of transformation. It proved to be just that. The work of transforming IBM continues, and much remains to be done. But I am pleased to report that we made significant progress and built momentum in 2014. In this letter I will describe what we have done, and continue to do, to transform and differentiate your company and to position ourselves for leadership in the new era now taking shape. 2 VIRGINIA M. ROMETTY Chairman, President and Chief Executive Officer A Letter from the Chairman 3 Continuing to move to higher value Information technology is one of the most dynamic, fast- changing and fiercely competitive industries in the world, characterized by relentless cycles of innovation and commoditization. Our choice is clear: We pursue a model of high-value innovation, rather than commodity technology, products and services.
    [Show full text]