Monday, December 30, 2019

Demographic Diversity And Cultural Diversity - 1700 Words

DEMOGRAPHIC AND CULTURAL DIVERSITY GOPI KRISHNA CHALLA RIVIER UNIVERSITY Demographic and Cultural Diversity ABSTRACT The research is concerning Organizational Behavior which includes unusual types of Organizations with dissimilar types of public behaviors. Among that Demographic Diversity and Cultural Diversity of an Organization is extremely significant to turn into a triumphant organization or company in the marketplace Especially the Demographic and Cultural Diversity show the in good physical shape relationship with all kinds of Employees in special positions like Managers, Accountants, and Engineers etc. exclusive of any intolerance among them similar to age, gender, race, religion, and physical abilities. Understanding how these personality figure Organizational behavior is significant. The long-term accomplishment of whichever trade calls for a miscellaneous remains of capacity that preserve convey unmarked ideas, perspectives and views to their work. The challenge that assortment poses, consequently, is enable your manager to take advantage of on the mixture of genders, cultural backgrounds, ages and lifestyles to act in response to trade opportunities more quickly and imaginatively. With the developing social, cultural, and political norms, as well as changing demographics, migration patterns and globalization have had an impact on the piece of music of the people. This still impacts the commerce practices which make them to stay pace with the alteringShow MoreRelatedDemographic Characteristics and Cultural Diversity1392 Words   |  6 Pagesorder for groups and teams to become high performance groups and teams. Every group or team leader must be aware of the demographic characteristics and the cultural diversity of the team in order to become effective. Groups and Teams There are many factors that affect a teams performance; from leadership and communication, to demographic characteristics and cultural diversity. Each impacts the team in its own way. With out these major factors being forced upon a team or group individuals willRead MoreHigh Performance Team Essay1157 Words   |  5 PagesIn this paper I will discuss how a team/group can become a high-performance team/group, examine the demographic characteristics and culture diversity and the impact on the team/group behavior. I will also describe how demographic characteristics and cultural diversity contribute to or detract from high-performance groups or teams. What is a team/group? A team/group is a group of people who form together to complete a mutual goal such as a presentation, paper, discussing a topic or creating aRead MoreHigh-Performance Teams1225 Words   |  5 PagesAbstract The purpose of this paper is to explain how a group can become a high-performance team. The purpose is also to examine the impact of demographic characteristics and cultural diversity on group behavior. This paper will illustrate how demographic characteristics and cultural diversity contribute to or detract from high-performance teams. High-Performance Teams A high-level of performance makes up the basis for groups and teams today. High-performance is a major focus for many organizationsRead MoreCultural Change Initiative - Timely, A Non Profit Organization1430 Words   |  6 PagesCultural Change Initiative – Timely, a Non-Profit Organization The organization I would like to lead in a cultural change is a non-profit I have been a volunteer at for over a year. In order to respect the privacy of this non-profit, I will refer to them by the name of Timely. In my time spent at Timely, I have noticed lack of diversity in the board members, employees, and volunteers. The non-profit works towards helping those from a diverse background and demographic. Therefore, I have thoughtRead MoreCultural Change Initiative : Timely, A Non Profit Organization1517 Words   |  7 Pages Cultural Change Initiative Mary Ann Damian March 27, 2016 Managing Diversity Professor Tamara Von George, PhD Granite State College Cultural Change Initiative – Timely, a Non-Profit Organization The organization I would like to lead in a cultural change is a non-profit I have been a volunteer at for over a year. In order to respect the privacy of this non-profit, I will refer to them by the name of Timely. In my time spent at Timely, I have noticed lack of diversity in the board membersRead More High Performance Team Essay1586 Words   |  7 PagesHigh-Performance Team Abstract This paper will explain how a group within an organization becomes a high-performance team. It will also examine the impact of demographic characteristics and cultural diversity on group behavior. The paper will try to describe how demographic characteristics and cultural diversity contribute to, or detract from high-performance teams. Introduction There are a number of elements that are necessary for the creation of any team. These include: two or moreRead MoreDiversity And Cultural Diversity1198 Words   |  5 PagesBetancourt, Green, Carrillo Ananeh-Firempong (2003) cultural competence refers to understanding the importance of social and cultural influences that a minority group may have as an inherent trait. The authors also affirmed that a cultural competent system acknowledges, integrates and incorporates the relevance of culture, evaluation of cross-cultural relations, , and adaptation of services to meet culturally unique needs(pg.294). Diversity and cultural competence are two main concepts that are essentialRead MoreSouth Kore A Dramatic Change Of Multiculturalism816 Words   |  4 Pagesin South Korea captures this cultural phenomenon by showing racial diversity. For instances, several educational TV programs - e.g., Non-Summit (JTBC, 2014 - ), Global Talk Show (KBS, 2006-2010), Love in Asia (KBS, 2005 - ) - invite foreigners who currently live in South Korea in the show discussions for the purpose of reducing prejudices to different culture and achieving multiculturalism. On the contrary to an increase in foreign images in these shows, racial diversity is hardly found in soap operaRead MoreA Letter From District Administrator1569 Words   |  7 Pagescommitment, we have formed a Strategic Diversity Planning team that consists of district and school administrators. The team reflected on the district mission, vision, student demographics, and performance data. Our extensive reflection revealed the need for im provement in educating each student. In response to the change in our student population and performance, the planning team volunteered countless hours of their time to create this Strategic Diversity Plan. This strategic plan will ensureRead MoreHow Cultural Diversity Is Changing The Workforce. In Today’S1196 Words   |  5 PagesHow Cultural Diversity Is Changing the Workforce In today’s society there are many culturally diverse people in the workforce. Most organizations can no longer make the assumption that every employee has similar beliefs or expectations. When entering into the global marketplace, people are considered one of the most valuable resources to an organization’s success. A well-managed culturally diverse workforce has the potential to thrive if managed correctly; or if mismanaged, there can be devastating

Sunday, December 22, 2019

Code Of Ethics And Ethics - 1252 Words

In five years, changes that coincide with the projected 100% growth require the following revisions, starting with the code of ethics, issue identification and ideas affecting software architecture department will drive the upgraded growth. Achieving amplified productivity, and a restructured business model that outfits future profits. Correspondingly, meeting the focus on ethical and professional business objectives that satisfies stakeholders and organizational needs. Code of Ethics Adhering to professional ethics will strengthen the organization’s pursuit in compliance, marketing, and risk mitigation constructing guidelines for employees and stakeholders to follow. In facing the much-needed attention to the company and staff†¦show more content†¦Compliance begins the expansion to the consumer market once enforced. One of the ultimate goals of the 21st century is to understand the consumer market, catering to the target buyer. Which points towards the second core ethic, I will protect customer and employee rights and foster trust with honesty. Affecting organizational marketing in an efficient manner to improve trust between consumer. Making the revised code of ethics valuable for attracting unconvinced customers and reinforcing risk as the second line of defense in support functions. With Business being the first line of defense, risk mitigation is the second line of defense that protects areas like the market, investment, operational and credit risk. Warranting the need for the next code of ethic, I will take action regarding product and service risks that affect our customers and the organization. Risk management creates a significant incorporation of capabilities able to identifying problems across all departments. Issues Affecting the Software Architecture Department Current challenge resolutions with the company and software architecture department demand a sketch of the outlined requirements, software processes, technology changes, professional processes, and management influence. To identify current trends and exercising solutions that maximize a scalable platform. By establishing a solid foundation that will result in

Friday, December 13, 2019

Common Criteria for Deciding Whether to Buy or Build Free Essays

Common criteria for deciding whether to buy or build a software solution would be to take a look at the System Development Life Cycle; Planning, Analysis, Design, and Implementation. Planning or initiation include a business problem, request for proposal, request for quote, and proposal/quote ie. first go/no go decision. We will write a custom essay sample on Common Criteria for Deciding Whether to Buy or Build or any similar topic only for you Order Now Analysis or logistics of implementation include business requirements, technical requirements, and data requirements, and GAP analysis which helps a company compare actual performance with potential performance. Design includes logical/physical, technical specs, process flow/data flow, system architecture, data design, screen layouts, and navigation map/flow. Once these criteria are examined and the complexity is determined, a decision can then be made to buy or build a software solution. Implementation is turning it into a working system that has been tested and put into use including documentation, training procedures, support capabilities, and associated updates. A manager’s selection for off-the-shelf software can be established by deciding if the criteria of cost, functionality, vendor support, viability of vendor, flexibility, documentation, response time, and ease of installation will be greater and a smoother transition than producing an in-house software solution. The two most important aspects of purchasing an off-the-shelf software are vendor support and vendor viability. If a manager chose to produce in-house software, the support is a constant in that the programmers who created the software are available at any time, and know the ‘in’s and out’s of the software’, whereas if there is no vendor support from the purchased software you are taking a gamble which may prove unwise, and the credibility of the manager is no longer. Cost, functionality, flexibility, and documentation are criteria that depends primarily on the specific situation, ie. budget, and needs. Discuss the four phases involved in managing a project. Compare and contrast these phases with the SDLC. Explain any differences. Managing projects of all shapes and sizes requires a fluid, nonlinear framework that has applications across all essential elements of project planning. The four-phase process that suggests how to allow for readjustment between the phases are initiate, plan, execute, and evaluate. Initiate, this first project management phase, the preliminary work is done to clarify the problem or opportunity and how a solution would look. All interested parties are consulted and the project scope – what is in and what is out – is clarified as well as initial costs and timelines. Plan, determines whether the proposed project will be of real benefit to the organization. If it is, the project is approved and more detailed planning starts. Business benefits, project objectives, requirements, governance, scope and project management methods are agreed. The Project Manager draws up the detailed project schedule and task and budget allocations. Execute, project stakeholders are interviewed to ascertain the detailed requirements, possible solutions are discussed and decided upon. Next, the solution is designed, built and finally implemented. Project management activities in this phase also include managing the project budget and schedule, reporting project progress, communicating with stakeholders and responding to project risks, issues and proposed changes. Evaluate, The purpose of this final phase is to determine whether the project was a success and what was learned can be gleaned and applied to future projects ie. , did the project deliver on time, within budget and to scope and quality requirements? Comparing the four phases in managing a project; initiate, plan, execute, evaluate with the SDLC phases; Plan, Analysis, Design and Implement one will see many cross similarities; each describing approaches to a variety of tasks or activities that take place during the process. After each phase is finished, it proceeds to the next one; reviews may occur before moving to the next phase which allows for the possibility of changes. Reviews may also be employed to ensure that the phase is indeed complete; and is ready to progress to the next phase. Explain the three primary project identification and selection phase activities. Who should make the decisions about project approval in a business organization? What information is important to the decision? Project identification and selection consists of three primary activities: identifying potential development projects, classifying and ranking projects, and selecting projects for development. Identifying potential development projects is a process that can be performed by a key member in top management, a steering committee, the head of a requesting committee, the development group or IS manager. Projects by top management reflect broader needs of the organization since there is an understanding of overall business. Projects identified by a top management or steering committee are referred to as coming from a top-down source. Projects designed by individual mangers or the IS group are more focused on the needs rather than a broader scope; projects stemming from managers, or business units are referred to as a bottom-up source. Top-down and bottom-up initiatives are used in identifying and selecting projects, it will vary on the scope and needs of the project. Classifying and ranking projects can be performed by top management, a steering committee, business units, or the IS development group. The project requirements will vary by the organization administering it, one group may choose to meet monthly, whereas another chooses to meet quarterly. Meetings typically consist of reviewing ongoing projects as well as new project requests. Selecting projects for development is the final activity in the project identification and selection phase. Since the criteria for a project can change at any time, numerous factors must be considered when selecting a project; perceived needs of the organization, existing systems and ongoing projects, resource availability, evaluation criteria, current business conditions, and perspectives of the decision makers. Projects can be accepted or rejected which means funding is allocated or the project will no longer be considered for development. A project can be returned to the original requesters who are told to develop or purchase the requested system themselves. Also, the requesters of a project may be asked to modify or resubmit their request after making suggested changes or clarifications. Due to the process of incremental commitment a selected project does not necessarily result in a working product. After each subsequent SDLC activity, the members of the project team will reassess the project. This reassessment will entail a more detailed understanding of the system’s costs, benefits, and risks to determine if the project was a worthy as it was thought to be. How should a project team determine system requirements? What are common sources of requirements? What are the limitations for each? In addition, discuss four types of documents that would be helpful in determining future system requirements. During requirements and determination analysts gather information on what the system should do from as many sources as possible. Sources include users of the current system, reports, forms, and procedures. All of the requirements are carefully documented and made ready for structuring. Structuring includes taking the system requirements during determination and ordering them into tables, diagrams, and other formats that make it easier to translate into technical systems specifications. Some examples of requirement determination include, impertinence, impartiality, relaxing of constraints, attention to details, and reframing. Impertinence is questioning everything. Are all transactions processed the same way? Could anyone be charged something other than standard price? Will employees be allowed or encouraged to work for more than one department? Impartiality is finding the best solution to a business problem or opportunity. All issues must be considered to try to find the best organizational solution. Relaxing of constraints, assuming anything is possible and eliminates the infeasible. Organizations change and all policies and rules should be evaluated. Attention to details, everything must fit into place. If one element is out of place, the whole system will fail. Reframing, looking at the process in a new way. It is easy to assume the project will be the same or similar, but this assumption can lead to failed systems. Constantly challenging yourself will prove beneficial in this process. Specific examples to be gathered at the requirements determination phase are, the business objectives that drive what and how work is done, the information people need to do their jobs, the data handled within the organization to support the jobs, when, how, and by whom or what the data are moved, transformed and stored, the sequence and other dependencies among different data-handling activities, the rules governing how data are handled and processed, policies and guidelines that describe the nature of the business, the market, and the environment in which it operates, and key events affecting data values and when these events occur. It is important that the scope of the system not become to large and expansive that analysis paralysis not occur, this can become costly and time consuming, and can lead to an abundance of work. To deter this from happening analysts must focus on the system in need not the system in place. Documents that are helpful in determining future system requirements are administering written questionnaires ie. surveys to discover issues and requirements, business documents ie. iscover reported issues, policies, rules, and concrete examples, and conducting written interviews with open-ended and close-ended questions. Also directly observing users an give a more objective and accurate review. Read the following online article and discuss two ways to justify IT budgets. How would you explain your IT budget to your CFO? To justify an IT budget is to provide a quality ROI on any new initiative. If the CFO can’t understand the needs of various departments then the only way to their pocketboo k is to present them with a bottom line return on their investment. In the case of procuring an IT budget, executives are often less than forthcoming because of the lack of information they receive from department heads. CEO’s respond most favorably to requests for IT budgets which are cost justified with a simple ROI business case. The business case needs to specifically show how potential costs associated with liability, may be minimized by implementing a sound IT infrastructure. The potential liabilities, such as loss of production and/or loss of reputation are translated into actual dollars in the ROI. A good business case or a good investment analysis will also measure the probabilities of different ROI outcomes. An investment analysis is the examination and assessment of economic and market trends, earnings prospects, earnings ratios, and various other indicators and factors to determine suitable investment strategies. Explaining the IT budget to the CFO you should first examine core needs ie. bandwidth, Internet, phone and staff, and plan to manage them on a minimal investment. Explore reducing excess capacity in the server room, renegotiate vendor contracts and rethink software licenses. Assuring the CFO that you have taken all necessary steps in limiting the IT budget will prove that you have taken all necessary steps to ensure a minimal budget while providing an the required IT services. Revisit past assumptions, you may have a contract that replaces hardware every two years, which could be an unnecessary budget item, and could in return be replaced every four years. Show the CFO how improvements have helped customer experience and saved money. Give him/her a friendly remember that not investing in things that could be and important aspect to IT when the economy turns around can come back to bite you. IT’s value is determined by the relationship between what the organization will pay, ie. cost, and what it will get back ie. benefits. The larger the amount of benefit in relation to cost, the greater the value of the IT project. How to cite Common Criteria for Deciding Whether to Buy or Build, Essay examples

Thursday, December 5, 2019

Digital Forensic Investigation Of USB Flash Drive- Free sample

Question: Discuss about a Report on Digital Forensic Investigation of USB Flash Drive? Answer: Introduction The aim of the report is to analyze a particular scenario based on digital forensics and the various investigation tools and techniques utilized for forensically analyzing the evidence items found in the particular situation. The scenario involves a crime scene committed by an ex-employee who was selling the organizations customer details such as bank account numbers, credit card details and other confidential information (Ali 2012). However, a USB flash drive that belongs to the man contains evidence that he used the credit card details of those customers to become a vendor of an individual website that required, at least, fifty credit card details for vendor ship approval. The report carries out a detail forensic investigation of the digital image of a USB flash drive for evidence relating to the above mentioned incident items. In this report, the above case has been investigated using digital forensic imager tool Encase software. It also involves description of the facts about the data hiding methods discovered during investigation of the case. The process also tries to identify the evidence found and their individual purposes. Analysis Some well-known forensic tools and techniques can be applied for processing the digital image of the USB flash drive and some relevant files, and evidence items can be recovered (Solomon et al. 2011). As many theories and pieces of evidence suggest, there are significant possibilities for hiding data in USB hard drives. Data hiding can be achieved using the concept of clusters. Digital forms of data hiding techniques include watermarking, cryptography or steganography. These are most commonly referred to as non-physical data hiding approach. Nevertheless, there is also another approach known as the physical aspect of data hiding. However, the case study states that neither cryptography nor steganography have been used in the data hiding process (Karlsson 2012). Hence, it can be told that physical data hiding has been followed in the present study to hide the customers financial details such as credit cards details, bank account details and other confidential information referred to in the case study. It takes advantage of the physical characteristics of the digital storage for the hiding purpose. Report of the Emails, Picture and Account Number The email IDs found from the investigation has been used for conversation among the suspects. The two emails are relevant with the case. Specific date and time that those emails were active have been identified. Date Time Action Evidence Found Notes 15/01/2016 1:00 pm Looking for email ID owners avendor12@gmail.com ccstolen_gov@dptfrd.co.uk Date Time Action Evidence Found Notes 15/01/2016 12:00 pm Examination of pictures found It is one sample among the 50 cards provided to the website by the ex-employee. Date Time Action Evidence Found Notes 15/01/2016 1:00pm The case is loaded into Encase for verification. Bank account number 00-11-22 12345678 USB drives most commonly function as data carriers and, therefore, can be very efficiently utilized for transporting business related data out of the organization (Sencar and Memon 2012). There are two alternative approaches to connect a USB device to the companys computer where the customer database resides. The first method is relatively straightforward, which involves a USB cable connected to the computers USB port. On the other hand, the second alternative technique is to utilize a USB hub. In the case of data hiding, the second approach is to be followed using USB hub. To hide the data, the different devices (USB stick acting as the data carrier, USB mouse and the USB hub) are combined to form a single appliance (Roy and Jain 2012). This method shows as if only the USB mouse is connected to the computer, when in fact, the internally hidden hub and USB stick goes unsuspected and can secretly store data using the mouse. Apart from hiding data, this technique can also be used to spread malware items. Solomon et al. (2011) stated that combination of data hiding and malware with the utilization of a USB stick can be applied as a hidden malware infected data carrier to transport data out of the organization. Data hiding technique It can be assumed that the attacker utilized a USB mouse to protect a USB data carrier (USB stick and USB hub combined) inside it. To fit the connected parts in the limited space inside the mouse, the size of the USB hub can be reduced by only keeping the PCB (printed circuit board) hub chip and the cable components. After that, the striping of USB stick is to be performed (Kruse and Heiser 2010). After stripping the stick (removal of the outer casing), a small PCB along with the memory chip and other necessary components are left. Apart from that, to incorporate adequate room inside the mouse case, the size of PCBs can be further reduced and ultimately the PCB and USB cable are connected inside the mouse with the process of soldering or with help if a connector (Hoog 2011). After carefully stripping the components, it is necessary to modify the USB hub so as to put the two PCBs (hub PCB and mouse PCB) together on top of each other. It is a crucial step to execute as it can block the internal LED rays in case the mouse uses LED color. For this purpose, the adjustment of USB hub PCB with the mouse PCB is performed very carefully (Rahman and Khan 2015). The next step is to wire the mouse hardware for connecting the USB port to the USB hub. The parts or components are then put together with the aid of soldering the wires. When this process is complete, the mouse can be connected to the computer and can be used to perform standard functions. This method allows any data stored in the USB stick to be hidden inside the mouse. NTFS (new technology file system) facilitates with potential opportunities for hiding data. However, according to ACPO (2010), USB flash memory devices does not write data into the same location more than once. As flash memories are non-volatile in nature, and flash translation layer (FTL) protocol is responsible for providing an access transparency between the user of a flash drive and the system itself. Encase Forensics is a software tool used for forensic analysis purposes. This particular case can be analyzed using this imager tool that recovers the basic USB history for investigation (Nelson, Phillips and Steuart 2015). The USBSTOR reveals the brand, vendor and a serial number of the USB. Other than that, the Mounted Devices key is found to get information about the drive letter. Imaging the USB drive is, therefore, the particular forensic investigation methodology adopted to parse the information. It can be effectively utilized for proving that the USB flash drive was connected to the organizations computer, by matching the drive letter and the time and date of USB drive insertion, along with the serial number or PID. To retrieve this information a detail forensic analysis was performed on the USB flash storage device using accurate forensic analysis tools (Sansurooah et al. 2013). Evidence analysis and examination are the next steps that involve interpreting the recovered data. After obtaining the forensic image, Encase Forensics is applied on the disk view: The exact number of used nodes is retrieved which in turn provides information about the type of partition being employed in the device. This is because the disk view of Encase does not contain any direct blocks on the inode tables (Lee 2014). Common program for recovering data in this manner necessitates a thorough examination of the inode structure including the direct blocks. Thereby, this tool is mainly utilized for the purpose of recovering deleted, damaged or erased information kept on Ext2 / Ext3 partitions of USB flash storage drives. Forensic Analysis using FTK Imager The items found using this tool are a bank account number, two email addresses, a photograph of a credit card and a particular website text. This is mounted with an FTK imager to enable PCI File Recovery (Kamble, Jain and Deshpande 2015). The following command is followed: File Image Mounting. After that, the steps to be performed are shown in the snapshots below: Thereafter, the PC Inspector File Recovery Window is activated and Open Unit is chosen: The disk created by FTK imager is then selected and Find Logical Unit is chosen. Next, the latest option is selected. After this step, a list of file is displayed to be recovered with this tool. Hence, mainly text files and image file have been found using this tool. The process applied for hiding the data has been discussed in detail above. Disk imaging is a digital forensic technique that uses specific imager software. Encase and FTK both are familiar imager tools in this field (Hoog and Strzempka 2011). However, for this case, FTK imager is used for analyzing the USB flash drive found in the ex-employee's jacket pocket. According to the ACPO (Association of Chief Police Officers) digital evidence analysis, data can be hidden using other tools except steganography or encryption. It can be referred to as generic data hiding technique. Other alternative methods are discussed in the below paragraph. Knowing how data is being hidden in the USB flash drive file system structure essentially enables useful means to find that data. For this reason, various forensic analysis tools are used. However, besides steganography, encryption, or any other similar types of data hiding techniques, there are forensic analysis measures that can be applied to generic methods also (Roy and Jain 2012). For example, using FS, slacker, USB hub and stick combination with USB mouse / USB keyboard / USB printer can also be achieved to hide data. Finding hidden data is becoming quire complex with passing days as the number of anti-forensic tools and techniques are increasing. However, concerning the present case study, it is much easier to strip the components of a USB hub and a USB stick to fit the PCBs together so as to enable them to function in the desired manner. After that, they can be easily incorporated in a USB mouse and can be kept secretly hidden in the internal part of the mouse. Following whic h, anyone handling the mouse would in no way suspect the present of the USB hub and stick inside of it. Alternative technique The data hiding process discussed above was based on utilizing a USB mouse for data hiding (Dezfouli et al. 2012). However, there are possible alternative variations that can be implemented to perform a similar job as data hiding. Combining a USB stick and an USB hub for data transport can also be achieved using a USB keyboard. USB keyboards are usually equipped with USB hubs built internally. Therefore, the job can easily be performed even without the need for an extra USB hub. Metasploits Slacker is a useful tool for data hiding purposes that can be applied onto an USB flash drive having to operate on an FAT (file allocation table) or NTFS / new technology file system (Casey 2011). The slack space on a USB drive can be effectively utilized to hide data to make it inaccessible and unreachable. Slacker is a useful tool for such activities. The method adopted by Metaspoilts slacker depends on fragmenting the data into numerous segments and distributing the fragmented data across the USB drives slack space. Therefore, slacker utilizes the slack space o a hard disk by file splitting and slack space hiding. This process makes it more difficult for the forensic analysis tools to trace the hidden files and folders. In addition to that, there can be other alternative tools and techniques. However, Vacca (2012) states that extensive knowledge of the characteristics and structural specifications of hard drives or more precisely, USB drives can be helpful in figuring out the exact process used for hiding those particular data. Moreover, the implications also suggest that the type and characteristics of the area, the nature of disk activity after that information has been already written on the disk also hold significant impact on the overall approach of forensic analysis as the degree of persistence of the hidden data is influenced. Conclusion The various data hiding techniques that could have been applied for the purpose of hiding those data and information are discussed in this paper. The possible approaches to hide data using a USB flash drive, a USB stick and USB hub combined, acting as a data carrier have also been analyzed in this paper. It can be said that the employee could have used an of the above mentioned techniques for hiding data in the USB drive. For example, MetaSpolits slacker could have been used for hiding data in the slack space. Besides, there is a possibility that other types of data hiding techniques were applied. However, using some particular forensic analysis tools and methods, the digital image of the concerned USB flash drive has been captured for performing the forensic activities. The forensic imager tools such as FTK or Encase are usually applied for this purpose. However, for this particular study, the FTK imager has been chosen to analyze the image of the USB hard drive. References ACPO, 2012.ACPO Good Practice Guide for Digital Evidence. [online] Available at: https://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf [Accessed 10 Jan. 2016]. Ali, K.M., 2012, July. Digital Forensics Best Practices and Managerial Implications. InComputational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on(pp. 196-199). IEEE. Casey, E., 2011.Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press. Dezfouli, F.N., Dehghantanha, A., Mahmoud, R., Sani, N.F.B.M. and Bin Shamsuddin, S., 2012, June. Volatile memory acquisition using backup for forensic investigation. InCyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 186-189). IEEE. Hoog, A. and Strzempka, K., 2011.iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices. Elsevier. Hoog, A., 2011.Android forensics: investigation, analysis and mobile security for Google Android. Elsevier. Kamble, D.R., Jain, N. and Deshpande, S., 2015. Cybercrimes Solutions using Digital Forensic Tools.International Journal of Wireless and Microwave Technologies (IJWMT),5(6), p.11. Karlsson, K.J., 2012. Android anti-forensics at the operating system level. Kruse II, W.G. and Heiser, J.G., 2010.Computer forensics: incident response essentials. Pearson Education. Lee, J., 2014, October. Cyber incident forensics as a forward lean security. InInformation and Communication Technology Convergence (ICTC), 2014 International Conference on(pp. 872-873). IEEE. Nelson, B., Phillips, A. and Steuart, C., 2015.Guide to computer forensics and investigations. Cengage Learning. Rahman, S. and Khan, M.N.A., 2015. Review of Live Forensic Analysis Techniques.International Journal of Hybrid Information Technology,8(2), pp.379-388. Roy, T. and Jain, A., 2012. Windows registry forensics: an imperative step in tracking data theft via USB devices.IJCSIT) International Journal of Computer Science and Information Technologies,3, pp.4427-4433. Sansurooah, K., Hope, H., Almutairi, H., Alnazawi, F. and Jiang, Y., 2013. An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices. Sencar, H.T. and Memon, N. eds., 2012.Digital image forensics: There is more to a picture than meets the eye. Springer Science Business Media. Solomon, M.G., Rudolph, K., Tittel, E., Broom, N. and Barrett, D., 2011.Computer forensics jumpstart. John Wiley Sons. Vacca, J.R., 2012.Computer and information security handbook. Newnes.