Saturday, December 28, 2019

Essay about Personal Experience Volunteering at Victim...

I chose to volunteer at Victim Support (VS) because it is a 38 year old charity organization that gives free and confidential support to victims of things like burglary, assault, sexual assault, domestic violence, fraud, robbery, etc., as well as anyone else who has been affected by crime in England and Wales. VS was set up because victims of crimes were often overlooked in a justice system that focused more on the criminal than those affected (Elias, 1993). Evidence suggests that community well-being is best served when the needs of crime victims, information, truth telling, empowerment, and restitution, which are typically neglected, are met (Zehr, 2002). VS tries to meet the victims needs when the government’s heath or legal†¦show more content†¦The consequences of being a victim of crime can be very distressing, and the support worker is required to cater for each person according to the crime experienced. Victims may experience feelings of depression, anxiety, fear, despair, or even suicide after such events. Recent theoretical developments concerning stress/support matching showed that the three recommendations that bear the most significance to the support of victims, are: 1. The study life events as a single combined measures of life-event stress: 2. The provision of meticulous attention to the effectiveness of the specific types of social support depending on the life event that caused the stress, and thirdly, to recognise the event-specific effects, and explore psychological consequences (Kaniasty Norris, 1992). Rather than looking into the history of a victim, the emotional support provided by VS resembles solution-focused therapies, focusing solely on the emotional consequences of a crime. If the client requires more than VS can provide VS can advocate for more counselling or other services. VS tries to represent hope to victims that, though someone hurt them, there are others willing to help them, and so repair their view of humanity. I, as a VS volunteer, try to exemplify these ideals and values when with victims. I have trained to help victims assimilate aShow MoreRelatedAn Understanding Of Gender Perception, Gender, And Gender Essay1582 Words   |  7 Pagesresearch will be conducted with a non-governmental organization serving women victims of gender biased violence, and women who find themselves in a deep state of precariousness as runaway young women and unwed mothers called the Moroccan Women’s Protection Center (MWPC). Founded in May 2003, the MWPC is a small, and independent organization in Southwest Coastal Morocco committed to helping and supporting women victims of moral, socio-economical, psychological and physical violence. Contacts withRead MoreVictims Of Fear : The Social Psychology Of Repression1702 Words   |  7 Pagesnot only leaves a physical and psychological mark, but creates an altered reality that the victim must now adjust to. The authors of Victims of Fear: The Social Psycholog y of Repression, argue that â€Å"Like all experiences of trauma, the torture experience needs to be worked through in the context in which it occurred by reconstructing and reliving it in all its horror and thereby coming to terms with its personal and social meaning† (Salimovich,80). Alternatively, in The Illness of Exile, author CarolineRead MoreCommunity Service as a Graduation Requirement1680 Words   |  7 Pagescommunity. Not only will the students become more aware of the activities that occur in their community, but they will also have a greater sense of self. Each student has his own reason for volunteering. Many volunteer for the joy of helping others, and some volunteer to seek career opportunities. Simply volunteering at a place that is related to the career one is interested in will help him determine whether that career is suited for him. Bill Jensen, Superintendent of Curriculum for Bartholomew ConsolidatedRead More Mellsy’s Outline for Research Paper1560 Words   |  7 PagesMellsy’s Outline for Research Paper Have you ever thought about volunteering your time to a local charity or community organization? There are many different reasons for you to start volunteering your services: To help others, to learn about an activity or organization that interests you, to beat boredom if you find yourself sitting around the house feeling totally bored, volunteering in an activity you enjoy can be a great way to change things, to overcome a loss you have experienced one ofRead MoreThe Day Of Action Compassion1682 Words   |  7 Pagesâ€Å"Social Psychology† through Coursera, having always thought of myself as a compassionate person I had to stretch out past those boundaries to do something extra to make a real impact, amongst some of my other acts I’d organised to offer my time volunteering at an aged care facility. Since I had no useful qualifications I would spend time with some of the residence, talking and listening to their stories sad to see how lonely these people where with out family, almost forgot about it gave me a greatRead MoreSmeet Shah. Engl 1100-25. For: Lynda Daneliuk. April 10Th,1675 Words   |  7 Pagescounselling the victims of Spousal Abuse Spousal abuse is a problem which exists in many societies around the world. Violence that occurs in any relationship which is romantic in nature and in which one partner seeks to dominate the other partner is called the spousal abuse. This type of abuse occurs in husband-wife relationship, relationship between the partners who are dating each other, with common law spouses and same sex relationships. There are certain ways in which one can be a victim of this abuseRead MoreThe Organization s Goal At The Thrift Store1396 Words   |  6 Pagesprovided with the opportunity to volunteer at the Thrift store. The organization’s goal is to provide a way for people in the society to purchase donated clothes, toys, books, and household furniture’s at extremely low prices enable to produce funds to support many other ministries, programs, services including food banks, shelters, children s camps, addiction treatment accommodations and charities for the community’s most vu lnerable citizens. Their mission is to not only meet human needs but also drivenRead MoreAnalysis Of The Loser By Joseph Carver1325 Words   |  6 PagesBeing in a toxic relationship can be one of the cruelest things that a human can endure. Speaking from experience â€Å"The Loser† is a real and terrible person to be in a relationship with. It slowly sneaks up on you like a thief in the night just waiting to catch the person at their weakest moment and trap them in the virtuous cycle of abuse. â€Å"The Loser† has many different ways of trapping their victim in a relationship and have zero intentions of letting them leave. This article is going into ways ofRead MoreExtended Essay Draft5082 Words   |  21 Pageson decision making, specifically pertaining to one’s willingness to donate to charity. The theory presented through this analysis on empathy is the human’s inability to empathize with more than one victim at a time. Therefore the human motivati on to donate is inversely effected by the number of victims represented by a charity. First the paper will explore empathy, or the capacity to psychologically share the same feelings as another individual. Through this exploration empathy will be further analyzedRead MoreMy Personal Culture : Ralph Waldo Emerson910 Words   |  4 PagesMy Personal Culture (question) What to choose? Everyday, we have the choice to choose who we want to be. Daily, we have the option of reflecting upon yesterday and growing from our mistakes, to change our future. We are all sculpted by our virtues and personal culture. Discovering our personal culture is like growing and breathing. We all do it but many don’t take the time to think about and appreciate it. As Ralph Waldo Emerson, the famous Transcendentalist writer once said, â€Å"What is a weed? A plant

Friday, December 20, 2019

Frederick Douglas and Benjamin Franklin Two Great Men

Frederick Douglass vs. Benjamin Franklin Benjamin Franklin had an easier route to success than Frederick Douglass in my opinion. Franklin was provided with a school and came from a nice family while Douglass on the other hand had to deal with slavery and other issues. The goals or the things that Benjamin Franklin did were for the whole world or the economy but the majority of the things that Douglass did deal with black people, slavery, and black rights. Those two came from totally different environments with different roadblocks but they both found a way to be successful in their own way. Frederick Douglass has an autobiography called â€Å"Narrative of the life of Frederick Douglass† basically telling his life story. He starts off†¦show more content†¦He is his father’s fifteenth child and he is the youngest son. His father had him put into grammar school when he was only eight years old because he liked to read. He said â€Å"my father intending to devote me as the Tithe of his sons to the services of the church† (Franklin 252). This is part of a tradition where they give their tenth part of his income to the church and that happen to be Benjamin Franklin. Franklin moved around a lot either because of a new job to help the family or there was a conflict with someone else in the family. Although he went to school and grammar school, he was still feeding himself knowledge by reading as much as he could. He says â€Å"from a child I was fond of reading and all the little money that came into my hands was ever laid out in books† (Franklin 254). When he was twelve he had to go work for his brother until he was twenty one, during that time he decided that he was going to become a vegetarian. He had degrees from two different universities, they were Yale and Harvard. Then he started writing to get put in his brother’s newspapers he was printing but he would not let people know who the author was. His writings kept gettin g approved but one got his brother thrown into jail for not revealing the author of a political piece. After that he bounced around to different printing businesses working and trying to get his own business so he could print whatever he liked, he then died before he could finish hisShow MoreRelatedFrederick Douglass and Benjamin Franklin1483 Words   |  6 Pages Frederick Douglass and Benjamin Franklin American success history recognizes the contributions made by two of its renowned leaders. The two are regarded as heroes despite the obvious differences between them abound. The two figures are regarded with comparable amounts of reverence even though they lived their lives in different ways. Nevertheless, both Benjamin Franklin and Fredrick Douglas gained their status through treading pathway of hard work. This paper, therefore, seeks to discuss the experiencesRead MoreAlpha Facts Essay3153 Words   |  13 PagesNiagara movement, with later led to the NAACP. 8. Alpha Phi Alpha Fraternity, Inc.   Member and former Washington, D.C mayor Marion Barry was the first chairman of the SNCC. 9. Seven Alpha men represented the United States at the politically-charged 1936 Summer Olympics: Jesse Owens, Ralph Metcalfe, Frederick Pollard, Jr., Cornelius Johnson, Archibald Williams, Dave Albritton, and John Woodruff.    10. After the attack on Pearl Harbor in 1941 and the nations entry into World War II, Alpha PhiRead MoreAmerican Spirit Volume I3787 Words   |  16 PagesSalvation in America (1584) 26 The Planting of English America, 1500-1733 28 A. Precarious Beginnings in Virginia 28 1. The Starving Time (1609) -.28 2. Governor William Berkeley Reports (1671) 29 B. The Mix of Cultures in English America 31 1. The Great Indian Uprising (1622) 31 2. A West Indian Planter Reflects on Slavery in Barbados (1673) 32 VVI Contents 3 4 3- A Missionary Denounces the Treatment of the Indians in South Carolina (1708) 34 C. Religious Strife in Maryland 35 1. The Intolerant ActRead MoreBibliographic Essay on African American History6221 Words   |  25 PagesBibliographic Essay on African American History Introduction In the essay â€Å"On the Evolution of Scholarship in Afro- American History† the eminent historian John Hope Franklin declared â€Å"Every generation has the opportunity to write its own history, and indeed it is obliged to do so.†1 The social and political revolutions of 1960s have made fulfilling such a responsibility less daunting than ever. Invaluable references, including Darlene Clark Hine, ed. Black Women inRead MorePre-Columbian Period9302 Words   |  38 Pagesearthen mounds for burial, residential and ceremonial purposes. These included Archaic, Woodland period (Adena and Hopewell cultures), and Mississippian period Pre-Columbian cultures dating from roughly 3000 BC to the 16th century AD, and living in the Great Lakes region, the Ohio River region, and the Mississippi River region. Mound builder cultures can be divided into roughly three eras: Archaic era Poverty Point in what is now Louisiana is perhaps the most prominent example of early archaicRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesan Urban World †¢ Howard Spodek 53 3 Women in the Twentieth-Century World Bonnie G. Smith 83 4 The Gendering of Human Rights in the International Systems of Law in the Twentieth Century †¢ Jean H. Quataert 116 5 The Impact of the Two World Wars in a Century of Violence †¢ John H. Morrow Jr. 161 6 Locating the United States in Twentieth-Century World History †¢ Carl J. Guarneri 213 7 The Technopolitics of Cold War: Toward a Transregional Perspective †¢ Gabrielle HechtRead MoreAbc System26363 Words   |  106 Pagesactivity-based method and contrast the two 4. Explain activity-based management (ABM) 5. Describe how ABC/M is used in manufacturing companies, service companies, and governmental organizations 6. Use an activity-based approach to analyze customer proï ¬ tability 7. Identify key factors for successful ABC/M implementation PART I Beware of little expenses. A small leak will sink a great ship. Benjamin Franklin This chapter has a lot to do with implementing the spirit of Benjamin Franklin’s observation—in costRead MoreLibrary Management204752 Words   |  820 Pages . . 302 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 The Content Models . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Maslow’s Hierarchy of Needs . . . . . . . . . . . . . . . . . . . 305 Herzberg’s Two-Factor Theory of Motivation . . . . . . . . 307 McClelland’s Need Theory . . . . . . . . . . . . . . . . . . . . . . 310 The Process Models . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 Adams’s Equity Theory . . . . . . . . . . . . . . Read MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pageshis or her product or service purchase, he or she tells six other potential buyers. In contrast, a dissatisfied consumer infor ms 25 other potential buyers. That is the leverage of quality in shaping consumer sentiment, which is vital in powering the two-thirds of the American economy that is consumer-driven. Therefore, as companies again go back to the business basics, this is a reminder of the most fundamental of those basics: Company managers need to recognize that a business’s income comes fromRead MoreProject Mgmt296381 Words   |  1186 PagesKeepers, Katherine Knox, Dat Nguyen, Lacey McNeely and Amanda Bosworth. Mary Gray deserves special credit for editing and working under tight deadlines on earlier editions. Special thanks go to Pinyarat Sirisomboonsuk for her help in preparing the last two editions. Finally, we want to extend our thanks to all the people at McGraw-Hill/Irwin for their efforts and support. First, we would like to thank Dick Hercher for continuing to champion and provide editorial direction and guidance, and Gail Korosa

Thursday, December 12, 2019

Project Development of Dick Smith Holdings Ltd †Free Samples

Question: Discuss about the Project Development of Dick Smith Holdings Ltd. Answer: Introduction: The current report is based on selecting the appropriate methods of decision makings. The case study of Dick Smith has been selected for the current project to determine the decline of the company. Dick Smith Holdings Ltd was until the year 2016 an Australian retail chain company that sold consumer electronic goods. The chain of the company expanded unsuccessfully in New Zealand with successful operations in other countries. The company was founded in Sydney during 1968 until the company was sold to the Woolworths Ltd. The operation of the company ceased in 2016 following its acquisition by Anchorage Capital Partners. Leadership Failures: The collapse in the leadership of Dick Smith meant that there was a shortfall to the creditors of more than $260 million. Changing consumer market: The primary reason that led to the collapse of the Dick Smith Holdings Ltd was the change in the consumer market. The electronic consumer market changed significantly at the competitive rate with significant amount of change in the consumer demand patterns (Kirzner, 2015). This reflected a failure in the vision of leadership as Dick Smith Holdings Ltd failed to study the consumer change in taste and preference with changing pattern of market forces. Higher cost of Store Network: Another reason that could be attributable to the collapse of Dick Smith Holdings Ltd is the higher cost of store network. The store network of Dick Smith Holdings Ltd was much larger in size than its competitors (Brenkert, 2017). This involved higher amount of cost base with considerable amount of exposure to and dependence of the fast moving computer products market. Falling shares in the market: The leadership failures were noticed when Dick Smith Holdings Ltd experienced a shrinking share and falling sales. The revenue of the Dick Smith Holdings Ltd was experiencing fall in revenue with lower margin of commercial sales. The leaders implemented the plans of expansion that required considerable amount of financial commitment (Bolman Deal, 2017). This led the company utilising all their cash flows and resources that were required in the commercial expansion of the company. Dick Smith Holdings Ltd increased and resulted in heavy commercial lending and bank borrowings. Failure in inventory management: A lack ofinventory management reflected a failure in the leadership. The decision relating inventory that were made by themanagement of Dick Smith Holdings Ltd were not considered to be appropriate in the current changing market of consumer behaviour (Northouse, 2018). The decisions of inventory that were made cannot be regarded as consistent with the consumer demand and this resulted the Dick Smith Holdings Ltd to unfortunately shoulder excessive amount of obsolete and inactive stock that required major write down. Expensive financing and poor sales: In the environment of falling sales Dick Smith Holdings Ltd employed the strategy of clearance sale that failed to generate sufficient amount of revenue or margin to alleviate the pressure of cash (Goleman, 2017). Furthermore, there were also the situation that reflected the inability in leadership to derive favourable terms of credit that created an impact on the level of stock.The management of the Dick Smith Holdings Ltd were failure in reflecting their ability to derive favourable terms of credit and product mix and appropriate store presentation. Loan demands: The leaders of the Dick Smith Holdings Ltd were burdened with the rising amount of loan. This resulted the company to shoulder the pressure of cash flow and contributed to decline of the company (Antonakis Day, 2017). The growing pressure of debts on the part of the company caused the breach of banking covenants that could not be further remedied. Management inability to purchase decisions: The role of the rebates from the suppliers, their influence on the management purchasing decision along with the ability to mask the reality of the earnings was clear (Fairhurst Connaughton 2014). During the year 2014-15 Dick Smith Holdings Ltd reported some earnings before interest and tax, and depreciation and amortization of around $72 million. Following the exclusion of rebates and advertising subsidies the reported adjusted figure stood $119 million EBITDA loss. Failure of the company: During the year 2016 on 4th January the value of the Dick Smith Holdings has declined by more than 80%. As they were listed on the ASX the holdings of the company fell drastically with company requesting for the cessation of the trading activities. Following the cessation of the Dick Smith Holdings Ltd the company was placed into the administration by its majority of the creditors (DuBrin, 2015). Additionally, the company was looking for the secured buyer for the stores with the company announcing cessation of all the stores across the Australian and New Zealand. Incorrect decision making by Chief Executive: A series of decisions that were made by the chief executive reflected poor ability of the chief in decision making process. The centre of attraction was the debt management facilities of the company as the banks that were organized by the management was without the approval of the board (Johnston Marshall, 2016). There was huge amount of rise was noticed in the inventory and reflected the failure of the management to transact with the rising inventory along with the quality of the inventory management and inventory purchase. The strategy of the chief executive to push towards the private level good also raised alarming level of bells among the management. There was a rising issue with the management of the finance. An assertion can be bought forward by stating that Dick Smith Holdings Ltd usually focused on the short term strategic objectives. On a conclusive note the failure of the Dick Smith can be attributed to the failure of the poor strategy, poor leadership and breach of trust that resulted in the decline of the company. Best practices to assess the situation of Dick Smith: Transparency in operations: The non-existence of effective regulations requires transparency of actions by the Dick Smith Holdings Ltd to address the problems of leadership failures. There is a need for appropriate corporate governance regulations for the Dick Smith Holdings Ltd to be addressed. The rules should be put in place to make sure that the Dick Smith Holdings Ltd meet their long term financial security of the company (Tourish, 2014). The external administrator of Dick Smith Holdings Ltd has issued an advice relating to the entitlements of the unsecured claims ahead of the secured creditors and at this point of time they are anticipated to be paid in full. There was also the instance of poor inventory management by the company. An alternative to the poor inventory management can be made by imposing the techniques of inventory control. The just in time inventory method works to reduce the volume of inventory that is held by the business in hand (Priest Gass, 2017). It is regarded as the risky techniques but an effective method of managing inventory. The inventory could be purchased just before prior to few days of distribution or sale as this will enable the items to arrive in time for use. The just in time method of inventory control would help in saving the inventory cost of holding for Dick Smith Holdings Ltd as the company would be able to keep their level of stock level of stock low and would eliminate the situation where absolute stock level (Johnston Marshall, 2016). As the alternative to the situation the management could consider researching the customer patter of purchase, seasonal demand and the reliable source of supplier to channel the transportation prior to implementation of the just in time in the business operations. This would help in minimizing the risk and screwing up the risks. Inventory management improves cash flow: A better inventory management would help in saving the fund and would additionally improve the cash flow in other ways. As an alternative decision making process the inventory management would help in affecting the cash flow management. It creates an impact on both the sales and expenditure with emphasis on cash management. Better flow of inventory would help the management in leading the better cash flow management (DuBrin, 2015). Having the solid inventory system would help in exactly knowing the amount of that is present in the inventory. Not only this would make sure that the company does not sales lose their sales but it would also help in planning ahead of the enough amount of cash flow. Conclusion: On a conclusive note the external administrators are required to strengthen the operations in order to make it clear that the industrial entitlement of the Dick Smith Holdings Ltd are adhered. The inventory management technique are considered to customizable portion of doing business. It is recommended that the companies should strive for removing the error of decision making from the inventory management process as much as possible. This would help in improving the decision making process and would enable the business in taking advantage of the inventory management techniques. Although an extensive amount research is required but it would systemize the process of ordering. Not only this would make it easy for making decision but would allow the management to make decision for appropriate cash management References Antonakis, J., Day, D. V. (Eds.). (2017).The nature of leadership. Sage publications. Bolman, L. G., Deal, T. E. (2017).Reframing organizations: Artistry, choice, and leadership. John Wiley Sons. Brenkert, G. G. (2017). Entrepreneurship, ethics, and the good society. InEntrepreneurship(pp. 85-128). Routledge. Drucker, P., (2014).Innovation and entrepreneurship. Routledge. DuBrin, A. J. (2015).Leadership: Research findings, practice, and skills. Nelson Education. Fairhurst, G. T., Connaughton, S. L. (2014). Leadership: A communicative perspective.Leadership,10(1), 7-35. Goleman, D. (2017).Leadership That Gets Results (Harvard Business Review Classics). Harvard Business Press. Johnston, M. W., Marshall, G. W. (2016).Sales force management: Leadership, innovation, technology. Routledge. Kirzner, I. M. (2015).Competition and entrepreneurship. University of Chicago press. Northouse, P. G. (2018).Leadership: Theory and practice. Sage publications. Priest, S., Gass, M. (2017).Effective Leadership in Adventure Programming, 3E. Human Kinetics. Tourish, D. (2014). Leadership, more or less? A processual, communication perspective on the role of agency in leadership theory.Leadership,10(1), 79-98.

Wednesday, December 4, 2019

Data Mining Security and Crime Data

Question: Discuss about the Data Mining Security and Crime Data. Answer: Introduction Data mining is referred to as an advanced technology that is widely used in different business organizations to extract hidden but predictive information from the data server. In order to make knowledge driven decisions data mining tools are needed to be used appropriately by the organizations. While implementing the data mining tools in different business organizations, different security measures are required to be considered by the researchers as the data stored in the data server are all very much sensitive. In case, data is hijacked by external users then that is considered as crime. In order to conduct the research the background of the problems, aim, objectives, a previous study, research methodologies and the collected data will be analyzed by the researchers. Data mining on the crime domain In order to aid the procedure of crime as well as criminal investigation, different crime control applications are developed. Certain extracted factors such as seriousness, frequency, duration are used to make comparison between the criminals by measuring the data accordingly. According to Ismail et al. (2013), a regional crime analysis program should be proposed to mitigate the challenges. While extracting data from the server, proper security measures are needed to be adapted to be adapted by the users as well as by the owners (Sood, Garg and Palta 2016). Particularly for crime data analysis, the data mining approach is undertaken as an algorithm. Depending on the profiles, that should be analyzed to determine the criminals and their crime, proper comparison is also conducted. For accelerating the crime solving process, many developers have used K-mean clustering crime pattern detector (Win, Tianfield and Mair 2014). Two-phase clustering algorithm or AK mode is also used by some de velopers to find out automatically similar case subsets from large dataset (Shea and Liu 2013). Role played by data processing technique In order to produce high quality data mining results, data processing technique is found to be very much useful. As, raw data are collected from different resources and get stored into database management system or data warehouse, thus those data are needed to be well processed for further important usage (Wang et al. 2015). The steps of data processing include data cleaning, data integration, data transformation and data reduction. Sagiroglu and Sinanc (2013) stated that in the initial phase, the missing data are collected and the noisy data are smoothened, unnecessary data is removed and the conflicting data are resolved. In the integration phase, the information are integrated together with normalization and transformation, to get better results regarding the data. Clustering method for crime domain Three main classification of partition clustering method are k-means, AK-means and the expectation maximization method. Depending on the mean values, the data clusters are segmented with the help of K-means. From the internal distance among the objects, the mean value is calculated (Ward and Peppard 2016). The steps of k-mean and AK-mean algorithms are completely separate from one another. Sood, Garg and Palta (2016) stated that, in order to find out the mean value, K-means algorithm acts as a base for the clustering algorithm; whereas, for automatically finding same subsets from a large data set, AK mode algorithm is widely used. Data mining as an active investigator for crime solving For serving the crime investigation appropriately, data mining provides active solutions to the users and service providers also. In order to detect crime data mining technology is used by different business organizations (Teller, Kock. and Gemunden 2014). For automatically associate objects into the crime records concept space clustering technique is used by the developers. In order to detect fraud different abnormal activities deviation detection technology is used. (Jaber et al. 2015). For detecting email spamming, classification approach and to perceive deceptive data in the criminal records string comparator has been widely used. Moreover, it can be said that security in data mining approach and detection of crime data are necessary to understand the challenges very easily. Data mining security measures According to Ismail et al. (2013), security is referred to as one of the major concern that is required to be considered by different business organizations, those are using data warehouse or normal database management system to store the confidential information. For the current business perspective, data theft is another major issue. In case of data mining approach, the security of data server is one of the major concerns. While extracting data from the storage areas with the help of data mining tools, proper authentication is required to be considered so that the unauthenticated users are failed to hijack private information. Once the data get theft is called cybercrime, because the hackers hacked the sensitive information from the storage area. Figure 1: Data processing (Source: Wang et al. 2015, pp. 310) Hypothesis H0: Security in data mining is needed be incorporated for the consumer security. H1: Security in data mining is not needed be incorporated for the consumer security. Research methodology Before the initiation of research, it is very much important to select suitable methodology for data mining security and crime data. The selection methodology deals with research philosophy, approach, research design and data collection method. Research philosophy Based on the category of the topic data mining security and crime data the researcher should adapt positivism research philosophy and not interpretivism. This particular philosophy helps to accomplish the research work by developing hypothesis, after considering previous studies. For this case, the researcher needs not to develop new frameworks and theories. This research work is focused on the need of security in data mining to reduce the range of cybercrime all over the world. Research design Three different types of research design approaches such as descriptive, explanatory and exploratory are used by researcher while developing academic research works. In this case, the researcher must consider descriptive research design and not explanatory and exploratory as it deals with previously mentioned research aim and issues very clearly. Research approach Two different types of research approaches such as deductive and inductive are used by the researchers while developing research proposal. Inductive approach is time taken and is conducted by using secondary data. In this case, the researcher needs to complete the research work within a specified time thus; the researcher needs to adapt deductive research approach. Data collection For different research works, two different kinds of data collection methods such as primary and secondary are found. The data those are collected from the similar field of study are referred to as primary data whereas; if the data are collected from various journals, Articles, books then that is known as secondary data collection approach. Based on the types and collection approaches, the data are divided into two different forms such as qualitative and quantitative data. Statistically analyzed data are quantitative data and the data those cannot be analyzed statistically are called qualitative data (Treiman 2014).For this research topic, both qualitative and quantitative data collection approaches will be used by the researcher. Quantitative data will be collected from different survey and qualitative data will be collected by conducting direct interviews with top-level management authorities of different business organizations that uses data mining technique to extract information from the data server. Sampling and Data analysis Sampling is referred to as a procedure where, a particular part from the entire population is selected under the study area of the research topic. Probability sampling and non-probability sampling these two types of sampling technologies are used by different researchers. For this case, Probability sampling technique will be used by the researcher. Time schedule development Before conducting the research, the researcher must consider appropriate time schedule that is provided in the following table. However, with the changing requirement some of the schedules might be changed during the progress period. The Research activities Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Proper understanding of the problem area of data mining security and crime data Literature review Research methodology Data collection Sampling and Data analysis Research findings Conclusion Conclusion From the overall discussion, it can be concluded that in order to identify the crime pattern. The usage of data mining technology is increasing at a rapid scale. Data mining tool is used to detect crime data but cannot be used to replace the risks from the core business area. Currently most of the medium to large organization uses the concept of data warehousing to store data with security. Technologies provide high range security measures but still due to certain lags in the organizational goal, the data stored in the database or data warehouse might be hacked and misused by the criminals. In order to mitigate these security relevant issues, the businesses should incorporate proper encryption keys, authentication approach at the same time. The encryption key will encrypt the data and thus only the authenticated users will be able to get the access of the data and none of the unauthenticated users will be able to access it. References Brown, J. and Stowers, E. (2013). Use of Data in Collections Work: An Exploratory Survey.Collection Management, 38(2), pp.143-162. Eaton, S. 2013. The Oxford handbook of empirical legal research. International Journal of Social Research Methodology, 16(6), pp.548-550. Ismail, M.N., Aborujilah, A., Musa, S. and Shahzad, A., 2013, January. Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. InProceedings of the 7th International Conference on Ubiquitous Information Management and Communication(p. 36). ACM. Jaber, A.N., Mohamad Fadli, Z., Ahmed, D., Ahmed, F.D. and Mazlina, A.M., 2015. Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing.Journal of Advanced Applied Sciences (JAAS),3(5), pp.152-158. Mackey, A., Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Masala, E., Servetti, A., Basso, S. and De Martin, J.C., 2014. Challenges and issues on collecting and analyzing large volumes of network data measurements. InNew Trends in Databases and Information Systems(pp. 203-212). Springer International Publishing. Pek, G., Lanzi, A., Srivastava, A., Balzarotti, D., Francillon, A. and Neumann, C., 2014, June. On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. InProceedings of the 9th ACM symposium on Information, computer and communications security(pp. 305-316). ACM. Sagiroglu, S. and Sinanc, D., 2013, May. Big data: A review. InCollaboration Technologies and Systems (CTS), 2013 International Conference on(pp. 42-47). IEEE. Shea, R. and Liu, J., 2013. Performance of virtual machines under networked denial of service attacks: Experiments and analysis.IEEE systems journal,7(2), pp.335-345. Sood, R., Garg, S. and Palta, P., 2016. A Novel Approach to Data Filtration against Packet Flooded Attacks in Cloud Service.Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org,6(5). Teller, J., Kock, A. and Gemnden, H.G., 2014. Risk management in project portfolios is more than managing project risks: A contingency perspective on risk management.Project Management Journal,45(4), pp.67-80. Treiman, D. J. (2014).Quantitative data analysis: Doing social research to test ideas. John Wiley Sons. Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, pp.308-319. Ward, J. and Peppard, J., 2016.The Strategic Management of Information Systems: Building a Digital Strategy. John Wiley Sons. Win, T.Y., Tianfield, H. and Mair, Q., 2014, December. Virtualization security combining mandatory access control and virtual machine introspection. InUtility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International Conference on(pp. 1004-1009). IEEE.