Evolution of Health Care Systems Paper

Evolution of Health Care Systems Paper

Name:

Tutor:

Institution:

Date:

Evolution of Health Care Systems Paper

Evaluation of the health care industry prior to introduction of information technology offers a significant insight on the changes that has occurred in this field. Assimilation of technology in various operations undertaken by health care practitioners such as nurses and physicians has called for a long process. In this case, these changes can be identified by assessing the situation as it was twenty years ago in terms of data handling and analysis in health care institutions. It is evident that evolution of health care systems over the years has promoted increased in effectiveness of delivering health services. This paper will focus on exploring the evolution of health care systems by comparing a current working environment in a health institution to the condition twenty years ago. It will also seek to identify two major events and technological advantages that led to current HCIS practices. Therefore, the paper will also discuss the evolution of health care systems, thereby proving examples of changes related to factors such as external event, error, or omission in scope of the product, value added change and risk response.

Twenty years ago, the patient’s information was recorded and stored using papers and filed, which were locked in a cabinet. This led to increased difficulties in retrieving patient health records. Two events have taken place since 1980s leading to significant changes in health care industry. One of them is a call that was made by former president George W. Bush in 2004, whereby he urged health practitioners to support implementation of Electronic Health Records. The other event that contributed to evolution of health care system involves the formulation of new legislations by Joint Commission for the Accreditation of Health Care Organizations (JCAHO) and Health Insurance Portability and Accountability Act (HIPAA). However, over the years, the health care system developed leading to establishment of conversion projects aimed at facilitating assimilation of Electronic medical record (EMR). This project focuses on providing computerized way that facilitates the accessibility of various records about the patients’ treatment. This conversion has also enabled storing of data electronically that is considered analogous to the traditional storage of information using paper files. Evolution of health care systems, which is attributed to this conversion, is aimed at increasing the efficiency of medical services and communication among the service providers, for the plan of healthcare management.

It is evident that twenty years ago, health care institutions incurred extra costs in management of patient’s health records. In these case, expenses incurred in management of these records included hiring more personnel to facilitate recording, storing and retrieving information. Moreover, the health care institutions incurred expenses through purchases of papers and files to record information for every new patient, who visited the hospital. These organizations had to create and maintain storage space of the cabinets and lockers where these files were stored. Nonetheless, after introduction of Electronic Health Records (EMR), organization no longer store information using papers. Instead, information is recorded by keying it into a system, which in-turn stores the information in databases that are secure and less expensive to maintain compared to paper files. Moreover, this has increased the effectiveness in the process retrieving patient’s records.

Before introduction of technology in the healthcare industry, there were increased numbers of errors in processes such as billing, and coding important patient’s claims. These errors have been eliminated by template-based documentation, which has been developed through integration technology in the process of capturing information from the patients (Goldstein & Groen, 2007). Adoption of technology in the health care field has involved redesigning of workflow, thereby facilitating productivity through usage of EMR by members of staff in their routine operations. Moreover, this effectiveness leads to elimination of durations of time consumed in accessing patients’ records from different department in the health care institution. Technology in health care institutions can also be attributed to installation of remote access, which exceeds the office and it eliminates physical retrieval of paper chart. Prior to introduction of EMR, the same patients’ records could not be accessed concurrently from different locations. Therefore, this was made possible by establishment of electronic health records, which has significantly increased performance among staff members.

Evolution of the health care system has led to establishment of a need to increase the level of compliance towards standards set by regulatory agencies in the health care industry (American Nurses Association, 2001). This evolution has led to increasing need for the institution to seek a mandate permission from the federal government in order to ensure that sharing of information, through the EMR among the health care providers has met the standards. However, the other external permission has been sought from patients concerning sharing of their information, and in this way, the standards will be met effectively. Moreover, implementers of the system have been ensuring that security measures are taken to reduce chances of compromises process of data transfer through the network involved.

Evolution of health care information system can be greatly attributed to elimination of errors and omissions during the process of undertaking various operations by staff as they offer health care services to patients, thereby increasing the quality of services offered to patients. Integration of information system with information technology has significantly reduced problems that result from errors and omission of information. Moreover, this can be attributed to injunction of EMR with application such as intelligent e prescribing, and improvement of patients’ safety, since this eliminates need to interpret handwriting. Years ago, prescribed medicine was checked against the list of medication, and this led to increased chances of omission. Moreover, there were chances of interaction that considered inappropriate before the prescriptions reaching pharmacy department.

Evolution of health care systems has also improved the quality of services delivered in physicians’ offices through critical implementation of the relevant medical practices with integration of information technology. Moreover, unlike before, the physicians are able to build protocols that are evidence based in relation to medical records from the patients and other department. This evolution has also facilitated retrieval of data for assessing performance of the practices related to patients’ health care services delivery. Furthermore, current health care systems have led to improved practices such as cost control through use of effective systems in the offices. In addition, there are cost saving information technology that creates other businesses of technology as a manual work (Wang & Middleton, 2003). Increased technological advancement in the health care field has also focused on value addition through change of response towards risk. Precisely, this involves the risk that results from the delays in the administration and omission of medication. Therefore, this leads to prevention of loss incurred due inadequate measures to reduce the risk subjected to patients.

References

American Nurses Association. (2001). Scope and Standards of Nursing Informatics Practice. Washington, DC: American Nurses Publishing

Goldstein, D., & Groen, P. (2007). Medical Informatics 20/20: Quality And Electronic Health Records Through Collaboration, Open Solutions, And Innovation. New York: Jones & Bartlett Publishers. Print

Wang, S. J., & Middleton, B. (2003). A Cost-Benefit Analysis of Electronic Medical Records in Primary Care. American Journal of Medicine, April 1, 114: 397-403

Evolution and Development of Customer Protection

University Name

By

Student Name

CONSUMER PROTECTION REGULATIONS IN THE UK

Degree Title

Instructor’s Name

Date of Submission

Word Count: 2000

Literature Review

A literature-centred overview of the evolution of the United Kingdom consumer protection regime and its current status is imperative.

Evolution and Development of Customer Protection

The advent of the United Kingdom customer protection regime is not regarded as a recent phenomenon as the development of customer protection legislation dates back to the late 17th century and mid-18th century during the pre-industrial era. Studies on the genesis and development of the customer protection regime show that since then, numerous jurisdictions have culminated in the development of a plethora of jurisprudence on the liabilities and rights that United Kingdom buyers and sellers have. Research by Muhammad Akbar concentrated on examining the origin and emergence of the customer protection regime. This work confirmed that the current customer protection legislation in the country is an outcome of imperative developments that occurred from the pre-industrial era to the post-industrial revolution. According to Muhammad Akbar, the pre-industrial period was characterised by low consumption levels within a simple social set up and fewer products than it is the case today. Later, the principle of caveat emptor within the English law was developed and incorporated to deal with this situation. This doctrine upheld the philosophy of individualism where customers had to look after themselves as laws to protect consumers were few and those that existed only dealt with measures and weights of basic commodities. With the growth in consumption and the number of services and products available for consumption, the principle of caveat emptor lost its relevance as sellers assumed greater responsibility in sales transactions. This necessitated the enforcement of specific customer protection legislation in the United Kingdom.

During the industrial revolution of the 18th century, urbanisation and manufacturing intensified, augmenting consumption. Sellers and product consumers began bargaining from long distances, with the former recognising the need for product quality to maintain market competitiveness. This furthered the need for a regime to safeguard the trading standards to ensure that they enhanced public health and customer protection, along with protecting honest traders from unfair competitor practices. During the period of the industrial society in the 19th century, more developments in customer protection laws took place in England, including case law revolving around buyer-seller relationships. However, consumer legal rights to safe products and services remained unrecognised. In the 20th century, mass production emerged, causing a consumer revolution as many products and services became available to consumers. During this time, large-scale developments occurred in consumer protection law, litigation, and the laws of negligence. Also, a movement initiated by an NGO stimulated the development of laws to protect consumers against unfair commercial and trade practices and defective services and products. This led to the development of customer protection laws used today, although they continued to undergo reforms to fit contemporary needs. From a critical stance, Muhammad Akbar’s work is valuable because it provides an informative and comprehensive account of the evolution of UK consumer protection, which enables one to grasp the changes that have occurred in consumer protection over the years.

Current Status of UK Customer Protection

Numerous researchers have focused on the current status of customer protection in the United Kingdom from different perspectives. For instance, Cliona examined customer protection from the perspective of the various reforms the regime will undergo within the context of the UK and Ireland considering the ongoing Brexit debate. According to this researcher, momentous regulatory divergences will be witnessed in customer protection before, after, and even without Brexit. Two of the most significant divergences before Brexit will be the Consumer Rights Act (CRA) 2015 and the Consumer Rights Bill 2015. The CRA 2015 was established to overhaul the contractual rights of consumers in the supply of digital content, goods, and services, together with regulating unfair contract terms in the United Kingdom. The CRA also integrated new rules relating to digital content, which the rest of the European Union is now catching up with as suggested by Taylor Wessing. On its part, the Consumer Rights Bill 2015 was published to reflect to consolidate the current customer protection law, along with endorsing new consumer rights and remedies in Ireland and the United Kingdom. As Cliona suggests, one of the divergences likely to be witnessed between Ireland and the United Kingdom as regards these two laws before Brexit include the objectives and scope of the CRA and the Consumer Rights Bill. Other divergences in implementing reforms of consumer law cover the areas of privity of contracts, jurisdiction relating to the supply of services and digital content, unfair contract terms, sale of gift vouchers, and transparency in contracts. The divergences possible after Brexit (if it happens) will include the areas of language and concepts utilised, the structure of consumer protection law, and the interpretation of the domestic provisions of the law in both the UK and Ireland. Finally, the divergences in implementing consumer law if Brexit becomes impossible will encompass the areas of the models of consumer protection adopted and modes of mapping amendments against the existing legal framework, which is the Consumer Rights Act 2015. Cliona’s research is critically valuable because it provides adequate illumination of possible differences in consumer protection likely to be experienced in Ireland and the UK if Brexit becomes effective.

Louise Nahon argued that reforms in consumer protection laws will have a significant impact in the United Kingdom, irrespective of whether Brexit is effected or not. This author suggests that some of the reforms proposed to come into effect in 2022 include the introduction of new digital consumer protection rules, revision of rules that impact digital service supply, and augmented transparency obligations on online endorsements and reviews. Also, this author suggested that changes will occur in the enforcement and penalty regime relating to unfair commercial practices and unfair contract terms within the harmonised framework across the entire EU. Wessing also acknowledges some of these consumer protection reforms that will occur in the wake of the recent Brexit referendum. These include the integration of the digital content directive and changes in consumer contracts associated with the online sales of goods. The works of both Louise and Taylor appreciate that the United Kingdom consumer protection regime is one of the most advanced regimes in Europe, which will augment consumer confidence when the proposed reforms are attained. Even so, the two differ in that while Louise believes what Brexit will have significant impacts on this regime, Taylor feels that Brexit will not cause great changes to the regime.

Malte Kramme investigated consumer protection from the perspective of the ramifications that Brexit would have on the area of consumer protection. This scholar examined Brexit consequences to consumer protection under three scenarios, namely, UK membership to European Economic Area (EEA), relationships administrated by World Trade Organisation’s rules, and relationships directed by mutual recognition rules within a tailor-made agreement. Based on the EEA model, the most favourable Brexit scenario would entail UK membership of the EEA. The eventual consequence of this membership on consumer protection would the application of high consumer protection standards in the UK. However, Brexit provisions for strengthening the sovereignty of the United Kingdom are incompatible with the EEA agreement, which compels member states of the European Free Trade Association (EFTA) to adopt EU legislation strictly. This incompatibility will augment the complexity of the UK consumer protection regime if Brexit becomes effective. From a WTO-model outlook, the consequence of Brexit to consumer protection will include difficulties in interpreting EU consumer protection directives within the UK legal context and uncertainties of conflict-of-laws, enforceability, and jurisdiction associated with the applicability of EU consumer protection law in the UK. Lastly, from the tailor-made agreement model, the consequence of Brexit on consumer protection is the failure to achieve harmonisation of standards provided by both the EFTA and EU in all consumer protection areas. While Malte offers vital details of some Brexit consequences on UK consumer protection, his work has one weakness, which is the failure to identify the specific consumer protection laws directly impacted by the consequences addressed under each model.

Survey-based research by Oya Pinar, Ibrahim, and Mylenko addressed consumer protection regulations from the outlook of cross-country analysis. They examined the applicability of consumer protection principles and laws in deposit and loan services in 142 countries, including the United Kingdom. The outcomes of their study were that many countries have consumer protection legislation in place, but these laws fail to address specific issues in financial consumer protection. As regards the United Kingdom, these authors appreciated that the country has comprehensive consumer protection legislation. This is because the UK has consumer protection legislation with explicit references to financial services and consumer protection regulations outlined within the financial section legislations framework, besides having general consumer protection law with no explicit references to financial services and other forms of consumer protection legislation. The work of this scholar is dependable because it adopts a valid research instrument and is informed by a broad gamut of datasets, which reflect its reliability. The only problem with the study is its focuses on consumer protection regulations in only two financial services, which implies that its outcomes cannot be generalised to all financial services, especially in the United Kingdom.

In another research effort, Mark and Vickers furthered research on consumer protection in financial services. Specifically, these scholars explored the relationships between consumer protection and the contingent charges for financial services within the United Kingdom context. These authors established that the failure to regulate contingent charges can breed significant economic inefficiencies that compromise consumer protection. Further, they confirmed that contingent charges in conventional settings with sophisticated consumers are efficiently executed because these types of consumers are well informed about consumer protection and can hence influence prices, compared to settings with naive consumers, who are less informed about consumer protection. They concluded that sophisticated consumers use awareness of consumer protection regulation to protect naïve consumers when it comes to implementing contingent charges in UK financial services. Also, they suggested that markets dominated by sophisticated customers can perform inefficiently because these consumers can adopt socially ineffective approaches to evade the high contingent charges that naïve consumers pay. Their conclusions corroborate the claims by Matthew Hilton that the United Kingdom’s consumer protection regime is based on information, where information is provided to individual economic actors to prevent market failures. For this reason, consumer protection regulation in such a scenario would be vital in offsetting the distributional concerns. This study is important because it provides a new perspective for consumer protection policymakers that can be useful in designing policies for curbing monopoly of pricing in the financial sector in the United Kingdom towards ensuring consumer protection against exploitative contingent charges.

Bibliography

Books

Ardic, Oya P, Ibrahim A. Joyce, and Mylenko N ‘Consumer protection laws and regulations in deposit and loan services: A cross-country analysis with a new data set’ (The World Bank 2011).

Journal Articles

Armstrong, M and Vickers J ‘Consumer protection and contingent charges’ Journal of Economic Literature (2012) 50 (2) 477-93.

Hilton, M ‘Consumer protection in the United Kingdom’ (2006) 47 (1) Economic History Yearbook 45-60.

Kelly, C ‘Consumer reform in Ireland and the UK: Regulatory divergence before, after and without Brexit’ (2018) 47 (1) Common Law World Review 53-76.

Khan, Muhammad A ‘The origin and development of consumer protection laws in united kingdom’ (2017) 3 (3) Journal of Asian and African Social Science and Humanities (ISSN 2413-2748) 38-52.

Kramme, Malte F ‘Consequences of Brexit in the area of consumer protection’ GPR: (2017) 14 (5) Journal of European Union Private Law 210-222.

Electronic Source

Nahon, L ‘Consumer law reforms will impact UK regardless of Brexit’ (15 Nov 2019) Out-Law Analysis Pinsent Masons https://www.pinsentmasons.com/out-law/analysis/consumer-law-reforms-will-impact-uk-regardless-of-brexit.

Wessing T ‘UK Consumer law in the wake of the EU referendum (17 Jul 2016) University of Oxford, Faculty of Law https://www.law.ox.ac.uk/business-law-blog/blog/2016/07/uk-consumer-law-wake-eu-referendum.

Evolution of Modern Psychology

Evolution of Modern Psychology

Name:

Professor:

Institution:

Course:

Date:

Evolution of Modern Psychology

Psychology is a term that is used to refer to applied and academic specialization that entails the study of people’s mind and modes of conduct. This is usually aimed at giving detailed explications through feelings and deeds. It is also used in mental fitness treatment, performance improvement, self-help, and ergonomics among others (Coon & Mitterer, 2008). Psychology also involves the study of animal behavior though more emphasis has been placed on the study of people’s behavior. Generally, it is concerned at how individuals have perceptions and reactions to their surroundings, grow in it and how they strive to change these environments.

Psychology addresses a variety of issues including social knowledge, concrete knowledge, personal knowledge, general deductive principles and intuition (Vitta, 2004). This affirmation has an implication that psychology is a wide field of knowledge; with diverse theoretical and practical information on human behavior and conduct. For example, the classical conditioning advanced by Ivan Pavlov is an imperative example of psychological theories. Freudian theory on sexuality and unconscious mind is also another vital theory that helped in the advancement and development of the field of psychology (Niamh et al, 2001).

From the analysis of the diversity of information by psychological theorists, it is noticeable that psychology is a wide field that encompasses different aspects of learning. It is therefore, vital to make distinctions between key issues from trivial aspects of psychological study (Plotnik & Kouyoumdjian, 2010). By way of example, it is worthwhile to focus on behaviorism psychoanalytic theory and cognitive perspectives. Other issues such as structuralism, functionalism and birth date psychology should not be given prominence because they have contradictory views to an enormous extent and have no principal movements in the current world as they used to be many years back.

Through the analysis of human mind and behavior, the field of psychology extends to tackle issues such as ageing, burnout, compliance, death, sensations, flexibility, group thinking, hypnosis intellect, joy, love, memory, noise pollution originality, personal quantitative reasoning, repression, sexuality therapy, wisdom and vision among others. It also includes the study of hidden behaviors such as thinking, dreaming, remembering and other mental events (Russell, 1964). This wider scope of human behavior and mental activities covered in psychology present an implication that psychological studies are exceptionally vital in understanding the interactions between people within a societal setting.

The field of psychology should however, not dedicate a lot of time studying all these issues and this will be costly and time consuming. Some of the fields also tend to be narrow hence will not generate enough information (Cuoto, 2007). Scientists should therefore develop ways of determining what issues are to be tackled for example by prioritizing current and emerging issues and giving little time to those that have been there. Great weight should be given to emerging issues especially trend and behavior. For instance, the reasons for increased divorce in present marriages and the move towards single parenthood are some of aspects that psychological studies should be rooted in (Plotnik & Kouyoumdjian, 2010).

Due to its significance to the human life, psychology is noted to have developed from the main areas of study such as religion, biology, physics and philosophy. This has therefore, led to the development of issues to be addressed that are both scientific and psychological (Sharf, 2011). Among the key studies such as physiology, neuropsychology, psychological and linguistics have emerged because of this. By analyzing psychological studies we should note that a difference do exist between psychology and other theories of explaining human behavior. For instance psychology pertains to the study of human mind while sociology learns the human behavior.

Other theologies mainly deal with the society as a whole while psychology addresses an individual or a small group within the society. A major distinguishing factor between psychology and the other fields lies in the fact that psychology tends to be experimental while the other theories are observation oriented (Nevid, 2011). This assertion can be attributed to the fact that information concerned with the human mind cannot be affirmed from theoretical perspectives. Detailed research and study (analysis) of an individual or a group of people within a society is conducted so as to ascertain their behavior and then make conclusions.

Just like other forms of learning, psychological studies cannot be carried out without the application of presumptions or assumptions. Cognitive psychologists suppose that the study of internal mental processes is exceptionally vital in comprehending behavior, this means that cognitive processes actively organize the information that we receive (Myers, 2010). In reality individuals do not just reflexively act in response to the environment. Humans, just like computers are information processors. Our hardware (brain) both accept, infer and respond to information and this process can be modeled and tested scientifically. This is an evidence-based form of study as there is documented information on the same (Vitta, 2004).

Since psychology involves the study of different aspects it should employ different methodologies but among the prominent ones is experimentation, which is usually conducted in the laboratories such as memory experiments. Case study is another method; for example, the study the study of brain damage patient such as those with anterograde memory loss in memory research (Coon & Mitterer, 2008).

References

Nevid, S. (2011). Essentials of Psychology: Concepts and Applications. London: Cengage Learning

Sharf, R. (2011). Theories of Psychotherapy & Counseling: Concepts and Cases. Edition5. Cengage Learning.

Plotnik, R & Kouyoumdjian, H (2010). Introduction to Psychology. Edition9. Cengage Learning.

Myers, D. (2010). Psychology: Ninth Edition in Modules. New York: Worth Publishers

Coon, D & Mitterer, J (2008). Introduction to psychology: Gateways to mind and behavior. Belmont. Cengage learning

Niamh, S et al (2001). Theoretical Issues in Psychology: Proceedings of international society. Dunedine. Springers.

Vitta, G (2004). Contemporary Psychology. London. Rutledge

Russell, R (1964). Frontiers of Psychology. California. Scot, Foresman

Cuoto, R (2007). Reflection on Leadership. Maryland. University Press of America Inc.

am applying for first focus course to return to study education and gain confidence in studying

Personal statement

I am applying for first focus course to return to study education and gain confidence in studying. First class course will help me develop my knowledge and skills, help me build my English and mathematics skills. The course will further help me improve my study skills. Among the benefits that I will get form the course is the enhancement of my learning skills.

I have a passion in nursing. I also intend, through the course, to improve my Mathematics and English to GCSE Level. I have realized that nursing as a profession is complex and needs some building blocks towards its achievement and thus the usefulness of the first focus course. I hope that experience gained from the course will be beneficial not only to my career but also in strengthening my academic life in general.

I am currently doing a level 2 and level 3 courses in literacy and numeracy for four weeks intended to improve my knowledge. Following that the world is the dynamic nature, I have had a passion to move with the world in most fields. In as much as the world is moving remarkably fast, I believe a little bit of running employed will undoubtedly help me realize my long term dreams of becoming a nurse. The fact that I am laying down the foundation for my career goals is a clear indication that I have a graving passion for nursing.

I have done several voluntary work in the retail sector in charity store with Age UK And Barnodos limited in the past. This has enabled me gain learn new skills and gain experience in collaborating and working with people. This has also enabled me to be independent and key skills in providing excellent customer services both through the phone and face to face. I have thus learnt how to work in a team by helping others with their duties.

I have also gained experience in child education and care where I took care of children between 3-5 years in helping them improve their spellings and gain self confidence. My duties were helping them with painting and numeracy and English and looking after them in the playground. I have thus gained experience in handling children and better communication skills with both parents and staff.

In my spare time, I enjoy spending time with my family and friends and caring for my grandmother. I enjoy listening to music and learning new skills. I also enjoy doing voluntary work.

American Airlines

American Airlines

Name

Instructor

Date

American Airlines

American Airlines History

The American Airlines Incorporation is among the leading airlines in the United States. The owner of the American Airlines is the AMR Corporation with its headquarters located at Fort Worth in Texas State. The development of the American Airlines Incorporation was through a formation of the conglomerate of 82 small airlines. This was through an active bid f acquisitions and reorganizations, majorly carried out in the 1930s. In fact, American Airlines was a common brand used by most of the independent carriers such as the South Air Transport from Texas, Colonial Air Transport from the Northeast, and Universal Aviation from the Midwest. This airline operated a transcontinental air and rail route in 1929. These small conglomerate airlines also included the Thompson Aeronautical Services, which operated a Cleveland – Detroit route as from 1929, as well as the South Air Fast Express (SAFE), which operated in the Western United States (Miles, 2008).

The American Airlines acquired an American Export Airline after the Second World War and renamed it as the American Overseas Airways destined to serve its destinations in Europe. However, the company sold AOA to Pan Am in 1950. The American Airlines once again launched a second subsidiary named Líneas Aéreas Americanas de Mexico S.A. This new branch was to fly through Mexico as well as create a number of airports. During the early years, and to promote its brand, the American Airlines provided free usage as well as advertising on its aircraft, especially for the “Three Guys Named Mike” film of 1951. The American Airlines was the largest airline in America until when Capital merged into the United in 1961. This meant that the American airlines were still the second largest airline in the world alter Aeroflot. The airline continued its expansion over the years, with August 1940 seeing the airline increasing its scheduled flights to 44 airports, 66 airports in august 1953, and 68 airports in November 1978 (Rolow, 2009).Economic Status

The American Airlines is currently financially stable, and the best proof of this is their planned merger with the US Airways. This is thanks to the products and services that the airline provides to both its passengers and cargo travelling. The airline strives to ensure it meets all the needs of its customer, both affluent, as well as, those from a low-income level do. The airline operates a Flagship Suit service, which provides ambience, class and prestige to passengers using this service. The services at these suites are first class as the airline ensures that customers get the right value for their money. Other flight class categories that the airline operates include the domestic first class, the business class, and the economy class. The services offered at these different levels of flight categories varies in relation to the chosen level, with the economy class being the most affordable class for most users (Szurovy, 2003).

This differentiation of flight classes enables the airline to serve a diverse majority of the society depending on their economic capabilities. As such, the airline becomes a major leader in the industry as all customers identify positively with it, basing on the travel fares and quality of on-board services that they receive while using the airline. In addition, the flyer program launched by the company assists in the development of a loyalty program in the world, whereby passengers earn points for every time they use the airline’s services, which they can later redeem free flights and other gifts (Miles, 2008).Possible Merger with US Airways

The American Airlines announced a possible merger with the United States Airways in February of 2013. A successful merger between these two major airlines would result into the formation of the largest airline in the world, both in fleet capacity, as well as regional and geographical coverage by their flights. The merger terms and conditions stipulated that the shareholders of AMR would own 72% of the newly created the company while those of the United States Airways would own the remaining percentage of shareholding, which was 28%. The new combination of the airline formed would bear the name of American Airlines as well as carry its brand. Furthermore, the new holding company that would list in the stock exchange for trading would use the name American Airlines Group Incorporation (Rolow, 2009).

However, despite the major benefits that would arise through the culmination of this merger, the planned move got some serious opposition from a civil suit filed by the District of Columbia, six attorney generals as well as the United States justice department. These groups filed a petition against the planned merger of the two largest airlines in the United States basing on antitrust concerns. Nonetheless, this did not deter the two airlines from realizing their chief goals, which was to form the largest airline in the world. In fact, the American Airlines vowed to go ahead with the planned merger as well as fight against the law civil suit presented against their merger. This strong match ahead got a reprieve in November 12, 2013 when the two airlines reached a common consensus with the six state attorney general’s as well as the united states justice department to allow the merger to take place (Szurovy, 2003).Ticket Pricing

The ticket-pricing model used by the American Airline is so simple and systematic that it provides it users with convenience and satisfaction. A customer gets an opportunity to book a flight, alongside a hotel room, a rental car, a cruise, and other assortment of activities all at a single click owing to the great package offers from the airline’s website. Furthermore, the company adopts a low pricing range for its tickets in order to attract more passengers to travel with its flights. The airline offers its travelers the lowest airfares charges as well as provides a guarantee on their travel prices. In addition, passengers get to earn AAdvantage miles whenever they travel using the airline’s services (Miles, 2008).

Passengers save a lot of time when booking their flights with the American Airlines, or any of its partners, such as the American Connection and the American Eagle which through a combined effort serve to a maximum of two hundred and fifty destinations in fifty countries across the world. Passengers use a search by price schedule to check availability on a wide range of forty flights and their prices within their travel dates. In addition to convenience and variety while booking flights at the American Airline Corporation, the passengers also get the best packages in the pricing of their airfares. The airline guarantees the lowest airfares in the region, as well as zero charges for online booking of flights. In addition, passengers using the Airlines services get to earn AAdvantage frequent flyer miles using it major flights. The passengers can later redeem these flyer miles for gifts and bonuses, or use them to travel another flight at the airlines expense (Rolow, 2009).

Market Power

The American Airlines operates an extensive flight network, involving both domestic as well as international flights. The flights made by the airline’s schedule to fly through numerous corners of the globe, inclusive of Asia/Pacific, South America, the Caribbean, and North America. The largest hub of the American Airline is the international airport at Dallas/Fort Worth. As such, the American Airlines as well as the American Eagle, which is a regional carrier of the AMR group, account for 85% of the traffic at the airport, together with accounting also for 83% of the landing fees at the airport. The American Eagle and the American Airlines use this hub to travel to more destinations compared to the frequency they apply in using other hubs located across the United States (Szurovy, 2003).

The American Airlines serves four of the seven continents in the world, trailing behind the United Airlines and the Delta Airlines. Both of these airlines serve six continents. The company has a number of hubs that serve certain markets and destinations. For instance, the Miami and Fort Worth/Dallas hub serves as the Americas gateways, whereas the American Chicago hub graduated as the primary gateway used by the airline to Asia and Europe. On the other hand, the New York JFK airport is the primary gateway for the airlines Americas and Europe markets with the airlines Los Angeles hub (LAX) serving as the primary gateway to Asia. This shows that the airline has perfect control over its respective markets (Miles, 2008).

References

Miles, J. (2008). Dear American Airlines. New York: Houghton Mifflin Harcourt.

Rolow, A. (2009). The Plane Truth from an American Airlines Flight Attendant. Bloomington, IN: iUniverse.

Szurovy, G. (2003). Classic American Airlines. Hong Kong: Zenith Imprint.

Along the River During the Qingming Festival

Name:

Tutor:

Course:

Date:

Along the River during the Qingming Festival

Introduction

Along the River during the Qingming Festival artwork is one of the ancient China paintings attributed to the artist, Zhang Zeduan of the Song Dynasty. The artwork captures the Chinese people daily life and the capital, Bianjing landscape that is today’s Kaifang from the Song period of the Northern part. The theme of the painting often attributes to the aspect of celebrating the worldly commotion and festive spirit at the Oingming Festival (Lin 84). This is in comparison to the perspective of the ceremonial holiday including prayers and tomb sweeping. The painting successive scenes are a revelation of the lifestyle of every level in the Chinese society ranging from the poor to the rich and the different economic activities especially in the city and the rural areas (Lin 84).

The painting also offers a glimpse to the era of architecture and clothing. The painting is one of the most renowned works among the Chinese paintings and has been referable by many as the Mona Lisa of china (Lin 84).

The original Handscroll

The painting original handscroll is about 5.25 meters long and 25.5 centimeter in height. In the length, the painting has 814 humans, 60 animals, 28 boats, 170 tress, 20 vehicles, 30 buildings, and 9 sedan chairs. The densely populated and the countryside city outline the two major sections in the painting with a river meandering through the pictures entire length. The right section of the painting is the city’s rural area with two crop fields (Lin 86). The crop fields have unhurried rural folks who are predominantly goatherds, farmers and the pig herders in the bucolic scenery of the painting. The country path hat broadens into a road joins with the city road (Lin 86).

The left half of the painting is the urban area that in the long run leads into a proper city with gates. The economic activities including shops, people loading some cargo onto boats and the tax office are observable in the area (Lin 87). The painting depicts people from all the occupations including actors, jugglers, peddlers, begging, paupers, seers, and fortunetellers, monks requesting for alms, doctors, teachers, innkeepers, metalworkers, and millers. The painting also represents masons, carpenters, and official scholars from every established rank. In Along the River during the Qingming Festival painting city proper from outside separated by the left gate, business of all kinds can be seen with activities including selling grains, wine, cookware, second hand goods, lanterns, arrows and bows, and musical instruments (Lin 87).

There are also business involving gold, dyed fabrics, silver and ornaments, medicine, paintings, artifacts and needles as well as restaurants (China online museum 1). The vendors in the scene extend further along the bridge referred to as the Rainbow Bridge, which infrequently is the Shangtu Bridge. The spot where the great bridge crosses river is the major focus and center of the painting. The great commotion animates the perspective of the people on the bridge (China online museum 1). A boat as seen approaching is at an angle with the mast not absolutely lowered threatening to run into the bridge. The crowds seen standing along the riverside and on the bridge can be seen gesturing and shouting towards the approaching boat. Someone is standing near the bridge apex as seen is trying to lower a rope for the crew outstretching arms below (China online museum 1).

In addition to the diners and the shops in the painting, there are also private residences, inns, temples, official buildings and private residences varying from style and grandeur, from mansions to huts with backyards and front (China online museum 1). Commodities and people transported through various transportation modes as seen includes chariots, sedan chairs, wheeled wagons, beats of labor such as mules and a number of donkeys. The river from the painting has fishing boats with passenger carrying ferries including men pulling the larger ships at the riverbank. The details of the painting corroborate roughly through the Song dynasty writings especially the Dongiing Meng Hua Lu describing the majority of similar features of capital life (China online museum 1).

INCLUDEPICTURE “http://upload.wikimedia.org/wikipedia/commons/thumb/d/d2/Bianjing_city_gate.JPG/800px-Bianjing_city_gate.JPG” * MERGEFORMATINET

(Along the River during the Qingming Festival, 1085-1145)

With the modern museums displaying the painting handscrolls rottenly stretching out in full length under glass cases, the original intentions for the paintings was for them to be held by viewers who would at times unroll an arms length of a section. When viewing the painting, it would be from the right end of the painting scroll progressing further to the left with the viewer determining the pace (China online museum 1). Following the use of a relative perspective, the artist who did the artwork has the ability to make everything painted seem to be closer and then recedes. A handscroll of the painting also has the ability to show similar objects from different angles through the creation of suspense moments to entice viewers to continue looking at the artwork (China online museum 1).

Exhibition

In one of the rarest moves, the painting first exhibition was in Hong Kong during June to mid-August 2007 exposition in commemoration of the Hong Kong’s relocation to China 10th anniversary. The estimation of the shipping costs for the painting ranges in tens of millions in Hong Kong dollars (Bowcher 209). This is with the addition of an undisclosed cost meant for insuring the priceless art piece. The exhibition of the painting during 2012 in Tokyo national Museum as the major centerpiece of one of the most special exhibitions to commemorate the 40th anniversary of the established and normal diplomatic relations between Japan and China (Bowcher 209). This is with the Japanese officials in charge of the museum providing one of the most recognized premier security standards for the artwork.

Remakes

The original version of Along the River during the Qingming Festival painting celebrations is marked as one of the most famed pieces of china art from the Song Dynasty. The painting value was recognizable through most of the emperors who kept it as part of their imperial collections for centuries (Bowcher 210). As a result of its artistic reputation valued remarkably, it has drawn inspirations for several works of art over a long time. The piece of art has also managed to revive and update the original styles used in art. One of the early remakes considered, as one of the very faithful to the original piece was the product of Zhao Mengfu. This was during the Yuan dynasty with another significant remake painted at some point in the Ming Dynasty (Bowcher 210).

The remake version made during the period had a length of 6.7 meters, which was longer in comparison to the original version of the painting. The artwork replaced much of the scenery during the Song Dynasty basing on the contemporary customs and fashions through updates of the vehicles styles including carts and vehicles and characters way of life (Bowcher 219). The wooden bridge of the Song undergoes replacement in the remake of Ming with a stone bridge. The stone bridge arc is taller compared to the wooden original with an aspect of reinterpretation of the boat on course to crush being under methodical guidance through ropes under the bridge.

The boat being pulled by the men ashore is to run into the bridge with the rest of the larger boats waiting for their turn dutifully and undisturbed (Bowcher 219). Another version of the painting by the painters of Qing Dynasty court presented to the Emperor Qianlong and later transferred along with other vital artifacts to Taipei national Palace Museum in 1949 was remarkable.

Conclusion

As one of the most celebrated artistic creations in china, the piece has been under admiration with court artists of the following dynasties making several versions with re-interpretive efforts. This is with each following the course of the painting overall composition and preserving the original theme with slight difference in techniques and details. Qingming scroll over the years has been under private ownership severally as part of valued collections. The painting was once part of the favorite collection of Puyi the emperor who had the original Song Dynasty with him when leaving Beijing. The Qing version and the Song Dynasty in Taipei Palace and Beijing museums correspondingly have values as national treasures exhibited majorly during brief yearly exhibitions.

Works cited

Bowcher, Wendy. Multimodal Texts from Around the World: Cultural and Linguistic Insights. Palgrave Macmillan, 2011. Print.

China online museum. Along the River during the Qingming Festival. 2013. Retrieved from HYPERLINK “http://www.chinaonlinemuseum.com/painting-along-the-river.php” http://www.chinaonlinemuseum.com/painting-along-the-river.php

Lin, Ci. The Art of Chinese Painting. Beijing: China Intercontinental Press, 2006. Print.

Evidence in Nursing

Evidence in Nursing

Name

Institution affiliation

Date

Introduction

Nursing is one field that is very important in our lives. Research is one of the critical areas that are very important in this field. Better research should be conducted to ensure that information is achieved. This is one area where research should be adequate and crystal clear. This is also the case with evidence. This entails that detailed information is done consistently and in the most efficient way to ensure that better results are obtained. Nurses are always required to ensure that they provide better research and evidence to what they claim is true and false. Enriched research and evidence should be based on actual facts collected and presented before the public. This means that solid research should be carried out and implemented in the sector of nursing with an aim of increasing the care of patients. This means that the best education, research, policy, practices and administration should relate to the evidence provided.

The use of evidence has started to gain momentum. The knowledge that is emanated from researches, all the notes and information regarding clinical medicine and nursing is attributed to be evidence. This evidence clarifies the outcome of patients who emanate from different geographical locations. This indicates that this evidence should be well and clearly stated and done to ensure that correct results are achieved. This means that there would be a change in how education is provided, research which is more practical and better associations of researchers and clinicians who work in this field. Better evidence entails that nurses show individualism, increase their effectiveness, and become more dynamic and streamlined, and to clearly use the knowledge of clinical judgment. This means and entails that nurses keep their knowledge of latest developments and also new innovation of technology.

Conclusion

Evidence nursing is one issue that should be integrated in nursing. This makes it possible for the best care to be translated to all the patients. Better and well researched information should be done at all times to ensure that the best care is transmitted to patients. This means that the best education, research, policy, practices and administration are reached out to all the patients. New technology and education should be among the best issues that nurses should be well familiar with to ensure they change with the change in these factors.

References

Melnyk, B. M., & Fineout-Overholt, E. (2005). Evidence-based practice in nursing & healthcare: A guide to best practice. Philadelphia: Lippincott Williams & Wilkins.

Evidence Tracking

Evidence Tracking

Name

Institution

Course

Tutor

Date

Abstract

Evidence tracking in forensic investigation is of paramount importance. Specifically, evidence is at the center stage of all the operations because it accredits the decisions that are made by the investigators at different levels as well as the ultimate decision that is made by the judge. For this reason, it is imperatively important for the vital procedures to be flowed accordingly. The purpose of this paper is to review evidence racking in light of a burglary case. The pieces of evidence would include the wad of chewing gum, blood stain and DNA from the beer can and so forth. The investigating team would need to follow all the outlined procedures to avoid contamination or loss of evidence that results from mishandling the information.

Evidence Tracking

In all criminal investigation, evidence is vitally important for accrediting the decisions that are made by the law enforcers at different stages. There are certain distinct procedures that are employed for collecting, preserving and interpreting evidence and different levels of criminal investigation. Usually, different parties tend to be involved in the process from the time the crime is reported to the time that the criminals are convicted. Besides the law enforcers and crime investigators, the technicians that are responsible for interpreting and storing the evidence are also involved. In essence, the process of tracking evidence is complex an all inclusive. The ultimate decision is always reflective of various procedures as well as sources of evidence. It is based on both physical and reported evidence and conclusions are always drawn after all the stakeholders have analyzed the respective evidence. It is against this background that this paper evaluates the procedures that are followed during the tracking of evidence in the case of a burglary.

The crime that has been reported in this case pertains to burglary at 2518 NE Angelfire Circle. Reportedly, the couple went away for the weekend and when they came back, their house had been broken into. The thieves stole the lady’s box of jewelry and left her lingerie strewn all over the place. In addition, they left a wad of chewing gum on the floor upstairs as well as a can of beer. Physical examination of the place indicates that the point of entry was probably the rear door. Seemingly, this is a typical burglary and robbery case that has been experienced in the region for the previous couple of months. There are different evidences that can be collected from the scene. To begin with, DNA samples can be collected from the can, dresser, panties and wad of chewing gum. Then, the blood stain is evidence and can be collected from the shattered glass of the rear door.

With respect to the collection of evidence, this would need to be undertaken effectively in order to avoid tampering with it that can culminate in incorrect decision making. To ensure this, certain procedures need to be followed accordingly. To begin with, the team needs to collect general information on the interior as well as exterior of the house. Then, Houck and Siegel (2003) indicate that they need to proceed to determining the condition of the respective evidence. This is based on various factors and the evidence is considered to be either stable or fragile. In this regard, they need to put in consideration various weather conditions that might affect the crime scene or the evidence that is found within the respective crime scene.

In addition, they need to evaluate any scene management considerations that may contaminate or alter the respective evidence in different ways. In this respect, Byrd (2001) indicates that certain behaviors by the owners or other officials have the capacity to affect the evidence. At this point, they need to determine other additional procedures that might need to be undertaken or techniques that might need to be conducted in the process of collecting the evidence. The team should ensure that all the collection equipment that would be employed during collection is sterile. Most important, the collection should employ appropriate equipment or tools to optimize results.

The various equipment that would be employed in the process of collecting evidence in this case would include latex gloves, forceps, swabs, tweezers, paper bags, wrapping paper, hand tools, plastic bags and thermometer (Fisher & Fisher, 2003). As indicated earlier, the team would be required to use appropriate methods of collection in order to obtain optimal results. The collection procedure would also employ different methods to collect the varied types of evidence that is available in the scene. For instance, the swabbing collection method can be employed for recovering biological evidence such as saliva on the swab and blood on the shattered door glass. In this respect, the material is probably dry and therefore, the following procedure should be employed.

To begin with, using gloved hands, the technician needs to moisten the swab being used using distilled water. S/he should then proceed to thoroughly rubbing the area that is stained with a single moistened swab. If the blood stain is large, she should use multiple swabs. This should then be followed by air drying the swabs. After air drying them, the swabs should be packaged differently and the package placed in a paper envelope. Finally, the technician should collect a control or substrate sample form an area that is unstained using similar techniques.

All evidence including the beer can and wad of chewing gum should then be inventoried and packaged appropriately before the team leaves the scene. This according to Swanson, Chamelin, Territo and Taylor (2008) is instrumental in preventing loss of the evidence or cross contamination of the same. If possible, all evidence should also be marked. The evidence that can not be directly marked such as hair, stains, soil, wad of chewing gum need to be place in an envelop or container then marked accordingly. Packaging in this regard is useful because direct marking of such items might interfere with forensic evaluation. This can be used to explain why it is advisable to always mark the external packaging. In cases where the evidence is marked directly, critical information pertaining to the item number, agency case number, initials of the investigator and the date that the evidence was received or recovered need to be included (Swanson et al., 2008). All the packaged and inventoried evidence should then be sealed with the evidence taps and marked with the initials of the investigator before release or submittal.

With regards to establishing the chain of evidence, the investigator needs to take notes detailing the recovery location, the date of recovery, complete description of each item, the condition of the respective item and any unusual alterations or markings on the given item. The investigator would then collect, mark, preserves and package the evidence accordingly. This also includes sealing the evidence and creating an inventory list. The respective information would then be transferred in a property room to undergo documentation before being submitted to an ideal crime laboratory for analysis.

During this process, formal procedures would be followed and details of all individuals handling the evidence would be documented. In addition, the respective individuals would need to provide the reasons for their handling of the respective evidence. In particular, critical information including the list of evidence, all transfers and their date sand time, signature of the individuals receiving and releasing the evidence, signatures of individuals transporting the evidence and reasons for the respective transfers would need to be documented (Byrd, 2001).

With respect to processing protocols, the team would need to interview the couples, examine the scene, and photograph it to attain more evidence, sketch the scene and process it to attain both testimonial as well as physical evidence. The evidence would then be interpreted based on the theories and factual information provided. This evidence would need to be preserved for it to be presented during courtroom procedures. Besides the crime scene report, the investigating team would need to provide laboratory reports that are undertaken by experts. As indicated earlier, mishandling evidence has far reaching implications on the accused as well as the victims. Fundamentally, mishandling evidence can lead to its contamination or loss. This affects the final decision that is made by the judge. Based on the quality of the evidence, this can lead to conviction or acquittal of the actual suspects. The negative psychological implications to both the accused and the victims if the wrong judgment is made are immense.

References

Byrd, M. (2001). Crime scene evidence: A guide to the recovery and collection of physical evidence. USA: Staggs Publications.

Fisher, B. & Fisher, D. (2003). Techniques of crime scene investigation. USA: CRC Press.

Houck, M. & Siegel, J. (2010). Fundamentals of forensic science. USA: Academic Press.

Miller, H. (1992). Indelible evidence: True crimes solved by forensic science. USA: BBC Publications.

Swanson, C., Chamelin, N., Territo, L. & Taylor, R. (2008). Criminal investigation. USA: McGraw-Hill Humanities.

Alternative assignment for the internship Satisfaction with the GP

Name:

Course:

Tutor:

Date:

Alternative assignment for the internship: Satisfaction with the GP

The following is a short report of the results of the interview that I conducted on two patients with chronic diseases. The first patient was male aged 34 years with cancer disease and the other one was a female aged 40 with diabetes. The male patient was not satisfied with the treatment in general while the female patient seemed to accept and acknowledge the kind of treatment she was getting from the GP.

Similarities and differences among the perceptions of the patients regarding collaboration with the physician

Differences

Cancer patient Diabetes patient

This patient was completely negative about the communication and collaboration with the physician. He said that the physician did not explain to him the cause of his pain, the type of medication he was prescribed, the fate of his sickness, the need to use the drugs despite the fact that the pain was relentless, and effects of not using the drugs accordingly. The patient was positive and collaborated well with the physician. She acknowledged that the physician had taken time with her, and explained everything concerning his sickness. The physician explained the type of medication, the need for taking medication according to prescription, and the effects of using drugs without adhering to physician prescription.

The patient perceived the physicians, continual prescription of the same drugs as bad and negligence of his pain. Again, the patient perceived the physician’s assertiveness over the disease as not comforting and bad. Cooperation of the patient and the physician was also bad. The patient was weary of using pain killers but the pain was persistent. The physician did not take a step to explain to the patient about his pain. The patient was not willing to cooperate with the physician again. Corporation and communication between the patient and the physician was good. The patient was very cooperative on physician’s prescriptions and advice on drugs usage. In fact, the patient and the physician had developed lasting friendship.

Whenever the patient needed any clarification, the physician was ready to provide. There was great cooperation between the patient and the physician. But the patient confirmed that before she knew the physician, there communication was not good although she cooperated.

Collaboration /communication affected patient adherence to drugs to a very great extent. This patient was not willing to adhere to the prescription due to poor communication. She was affected greatly by the communication and corporation. Adherence to drugs was good due to good communication.

Similarities

Both patients at least suffered poor communication with the physician.

After listening to the interviewee’s views about communication and corporation with GPs, I conclude that the physician dealing with the patient with cancer acted badly to the patient. He was not compassionate and did not show any care for the patient. Lack of his interest in meeting the patients care led to poor adherence to prescription. The patient needed little attention which the physician did not provide. If it were me I could have taken keen interest and listen to what the client needs. After careful thought I will advise the patient on his sickness and put him on rehabilitation program. Most importantly I could explain the need for some drugs to particular diseases. I could act as the physician in charge of the diabetic case.

My opinion

According to my opinion the physicians must treat patients with care and communicate appropriately the need for drugs. The physician should explain the need for the patient to adhere to the prescription and the importance of so doing. Instead of prescribing the drugs without explaining the reason for the prescription, they should take time and explain the effects of the drug its connection in treating the disease the patient is suffering from. The physicians should also liaise with the nurses to ensure that the nurses helped the patients to use the drugs as prescribed especially the patients with chronic illness. For the cancer case rehabilitation and pain management strategies are the best.

Lastly, the physician should allow the patients to participate in their care and treatment. They should be listened to and if possible, change of drugs if some drugs did not produce good results.

Alternative Devices to The iPhone

Alternative Devices to The iPhone

Introduction

The iPhone is one of the most commonly used smartphones in the world today. As its popularity grows, the interest in retrieving all the data contained in this device also grows. A smartphone is basically a small computer and numerous concepts of computer forensics can be applied in it. However, the difference here is that data in such phones is highly volatile. Furthermore, it is difficult to copy the content of the memory since it is encrypted in the phone’s operating system. The running of applications foreign to Apple is also cumbersome and this forces forensic experts to work their way around the challenges (Engman 1).

Background

Smartphones such as the iPhone are increasingly being used as instruments of connecting people. This s through phone calls, social networks and short message services. If an individual’s consociates and networks are to be mapped then their mobile phones becomes a resource for this purpose (Engman 1).

Problem statement

The main objective of this paper is to demonstrate how forensic analysis can be performed on the memory of the iPhone. The main question in this study is:

How can a forensic analysis of an iPhone be performed?

Approach/ Methodology

This study will involve a qualitative research methodology which will include conducting investigative experiments. To be able to acquire forensic data from the iPhone it is important to understand the file system that is often used. The iPhone uses the HFSX file system. An understanding of the two main ways, SQLite databases and the binary list (.plist), is important since artefacts such as call history and messages are stored in the databases of the iPhone (Engman 5).

The main objective of any forensic investigation is to find information that can be used as evidence to get to know the individual behind the system. The interest also includes the acquisition of some knowledge of the people that this person knows including his or her associates. The primary function of the smartphones will be to provide the necessary connection between an individual and his or her acquaintances (Engman 9). The data that can be extracted from this phone, which is of interest to forensic investigators, focuses on the following areas

Call logs (Library/CallHistory/call history.db). It is an apparent source of data in the examination of a mobile phone. It provides a list of people the person under investigation is attached to. It also provides timestamp data.

Phone contacts (library.AdressBook/AddressBook.sqlitedb. It includes both mobile phone numbers and email addresses.

Media (Media/PhotoData/photos.sqlite). IPhones can also be used as cameras that keep improving every time a new model is produced. This extraction of these files can act as vital evidence.

Deleted files. To be able to retrieve this there is need for a hard copy of the phone memory which will be engraved out of the unallocated space. The files and folders in this segment could be valuable evidence.

Internet History (Library/operamini/history.Plist). This will provide information useful in understanding the internet patterns and the sites accessed.

Analysis and Discussion

Backup analysis is one way through which different used can be used in the performance of forensic investigation in an iPhone. iTunes is one of the most common for backup in iPhone. When using iTunes one is supposed to specify how often he or she will be upgrading the firmware on the mobile device. With great dependence on the operation system, the backups are often stored in the default locations. This folder often has a forty digit long muddle value as its name hence a unique identifier (Engman 8-9). During forensic investigations a browse through the backup directory will produce files without file extensions but only a Unique Delivery Identifier that is different in every iPhone (Engman 9). These backup files are able to display the content of the messages, contacts, media, and internet history and call logs.

Forensic analysis can also be conducted through the jailbreak technique. This is made possible by a security fault in the phone that can be used in the exploitation of the device to gain a read or write permission into the root partition of the phone (Engman 18). The initial step is to find a tool that can be used to exploit the existing version of the iOS on the iPhone. Whenever a jailbreak is done Cydia, application software for searching and installing other programs foreign to Apple, s installed. When installed through an SSH-client to the iPhone, the software is able to browse through the entire file system without any restrictions. It is able to browse through the entire file structure and retrieve call logs, contacts, messages, media, internet history and deleted files (Engman 18-19).

Conclusion

The objective of this paper was to provide an overview of the techniques that can be used in the examining forensic data in an iPhone. The methods discussed are both based on their usability and ability to retrieve certain files. These files are considered as vital to forensic investigators and could act as important evidence. They include messages, call logs, internet history and deleted files. Backup files in the iPhone only serve to retrieve minimal amounts of data. However, the jailbreak technique, despite its complexity, gives more information that the backup style of analysis.

Works cited

Engman, M. Forensic Investigations of Apple’s iPhone. Kandidatuppsats. 2013, pp.

1,3,5,12,15,18. 19.