Thursday, May 21, 2020

The Social Lives Of Adolescents And Adults With Autism Essay

A study by Orsmond, Krauss, and Seltzer in 2004 sought to examine the social lives of adolescents and adults with Autism. Specifically, they researched the participants’ peer relationships, the participants’ involvement in social activities, and what individual and environmental factors concerning the participants affect peer relationships and involvement in activities. They hypothesized that the participants with more developed verbal skills, fewer social impairments and fewer disruptive behaviors would have a greater number of social interactions. They also expected that participants in inclusive educational setting would have more social interactions and that a socially engaged mother would also cause more social interactions among the participants. Based on this study, the results were that the difficulty people with Autism have in participating developing and maintaining friendships begins at childhood and persists into adulthood. They also found that participants in segregated educational environments had the same amount of peer relationships as participants in inclusive educational environments; therefore in this study, forming peer relationships seems to be based purely on individual characteristics. However, participation in social and recreational activities seem to be based on both environmental--if the mother partook in similar activities-- and individual characteristics. These findings are important in the context of my study because it shows the peerShow MoreRelatedServices For Adults With An Autism Spectrum Disorder978 Words   |  4 PagesI read and analyzed the following texts: 1. Services for Adults with an Autism Spectrum Disorder by Paul T. Shattuck, Anne M roux, Laura E Hudson, Julie Lounds Taylor, Matthew J Maenner, Jean-Francois Trani Published October 2011 2. National Autism Indicators Report by Anne M. Roux, MPH, MA; Paul T. Shattuck, PhD, MSSW; Jessica E. Rast, MPH; Julianna A. Rava, BA; Kristy A. Anderson, MSW. Published 2015. 3. Young Adults on the Autism Spectrum Face Tough Prospects for Jobs and Independent Living byRead MoreAutism Is A Matter Of Passionate National Debate1197 Words   |  5 Pages Introduction: †¢ In the past two decades or so, autism has changed from being a condition nobody had even heard about to widely recognized mental health condition. Due to widespread use of internet, social media and smartphones everybody knows something about autism. Just searching for autism in Google brings up more than 68 million results. Autism has become a matter of passionate national debate among different stake holders such as government, public health agencies, mental health associationsRead MoreAutism Spectrum, Asperger, And Pervasive Development Disorder1519 Words   |  7 PagesThe autism spectrum consists of three main disorders, autism, Asperger s, and pervasive development disorder not otherwise specified (PDD-NOS). One issue regarding disorders on the autism spectrum is the minimal research funding for them. While treatable diseases are heavily studied due to the search for a cure, the disorders on the autism spectrum cannot be treated. The complication of limited funding is that people are not dealing with ASD (autism spectrum disorder) correctly, which worsens theRead MoreVideo Modeling As An Effective Intervention Strategy for Instructing Students with ASD1738 Words   |  7 PagesIntroduction According to the U.S. Department of Education, autism is defined as a disorder of neural development characterized by impaired social interactions and verbal and nonverbal communication. Individuals with autism spectrum disorder (ASD) may also display attention deficits, engage in repetitive behaviors, resist environmental changes, have unusual sensory experiences, and may exhibit inappropriate behaviors that have adverse impacts on educational performance (Delano, 2007). The incidenceRead MoreAutism Spectrum Disorder ( Asd )1801 Words   |  8 PagesAutism spectrum disorder (ASD) is a heterogeneous neurodevelopmental disorder characterized by qualitative impairments in social interaction and communication, and restricted, repetitive behavior (American Psychiatric Association [APA], 2013), and is associated with impairments in executive functions. Autism Spectrum Disorder is also defined as a group of disorders that impair an individual’s ability to understand and engage in the give-and-take of social relationships. (Boyd, 2015) Autism is a well-knownRead MoreInterview, Observation Report On Mental Services Clinic Essay955 Words   |  4 Pagesproblems, Intellectual disabilities or Autism, Disruptive external behavior, ADHD, and ODD by performing assessment and therapy. The program is a training and research clinic; therefore, it is designed to train graduate students at the clinic to perform assessment and therapy. The graduate students deliver most of the services under the direct supervision of licensed and doctoral level supervisors. At the UHCL PSC, children (as young as 2 years old) and adults are seen. The clients are typically thoseRead MoreBenefits Of Obtaining A Lasting Relationship With A Dog999 Words   |  4 Pagesincrease in mental health, social health, and physical health. By acquiring a relationship with a dog a person can seek out meaningful companionship that they are not obtaining from being in a human relationship (Kurdek, 2009 ). One reason a person may turn to a dog for company is due to a recent loss of a loved one (Kurdek, 2009). In a study by Kurdek (2009) it was shown that dogs could help people in an elderly care facility by providing them with social interactions. The social interactions created helpedRead MoreAutism Spectrum Disorder Essay1395 Words   |  6 PagesAutism Spectrum Disorder Autism is a brain development disorder that a child is usually born with. The disorder was first described in 1943 (Goldman, 2003, p.852). It is know to affect about 1 in 1000 people in the U.S and is more common in males than in females (Goldman, 2003, p.852). The symptoms are very widely ranged. In general, there is failure to develop language and communication skills, unable to form normal social relation ships, and a need to follow a routine. Symptoms Many childrenRead MoreLanguage Is Not Static, It Is Capable Of Change Over Time And Distance Essay1877 Words   |  8 Pagesproper English’, is the formal written language used for academia, expected in universities, research papers and professional workplaces. Often, different social class and age groups within a country or community will speak in a different manner, such as a dialect or slang, reflecting upon their individual situation and that of their family and social groups. Every country, community, cultural group and individual uses and refines their own dialect of English to communicate effectively with those aroundRead MoreAutism Spectrum Disorders Essay1848 Words   |  8 Pages Autism is a form of neurodevelopment disorder in the autism spectrum disorders. It is characterized by impaired development in social interactions and communication, both verbal and non-verbal. There is an observed lack of spontaneous acts of communication; both receptive and expressed, as well as speech impairments. A person diagnosed with Autism will also show a limited range of activities and interests, as well as forming and maintain peer relationships. The individuals will display limited

Wednesday, May 6, 2020

Essay on The Age of Alexander - 1793 Words

The Age of Alexander The conquests of Alexander the Great spread Hellenism immediately over the Middle East and far into Asia. After his death in 323 B.C., the influence of Greek civilization continued to expand over the Mediterranean world and W Asia. The wars of the Diadochi marked, it is true, the breakup of Alexanders brief empire, but the establishment of Macedonian dynasties in Egypt, Syria, and Persia (the Ptolemies and the Seleucidae) helped to mold the world of that day into a wider unity of trade and learning. The Hellenistic period was an international, cosmopolitan age. Commercial contacts were widespread and peoples of many ethnic and religious backgrounds merged in populous urban centers. Advances were made in various†¦show more content†¦B.C. Pergamum was also prominent, and there were other cities of influence (e.g., Dura). In the Hellenistic period, although the cities were no longer independent, as they had been in the Hellenic era, they were the centers of trade and craft industry. It was in the cities that the descendants of the Greco-Macedonian conquerors became a professional class of rulers and soldiers and merchants, which provided a cultural and economic bond throughout the area, even though political unity did not survive the death of Alexander. Among the Greek ruling class, the old loyalties to the Polis had given way to a dedication to the profession. As the administrators and the merchants of their world, in spite of being in the minority, they had an influence out of proportion to their numbers. The city of Alexandria, founded by Alexander, located on the Mediterranean at the mouth of the Nile, became the most prominent center of commerce and learning. The library in Alexandria became the depository for recording many of the literary and scientific achievements of the time. Although women continued to have a subordinate status, some lucky few of the wealthy and ruling classes, would have the opportunity to become involved in commerce or in intellectual activities. For theShow MoreRelatedThe New Jim Crow: Mass Incarceration in the Age of Colorblindness by Michelle Alexander657 Words   |  3 Pages The book â€Å"The New Jim Crow: Mass Incarceration in the Age of Colorblindness† (â€Å"The New Jim Crow†) hits on many significant points concerning the criminal justice system and the systemically racial elements that have been perpetuated through various laws. As argued in the book, the â€Å"War on Drugs† has been used to perpetuate racial discrimination against African Americans since the 1980s and the Reagan Administration. My personal reflection on the book comes from a legal perspective. Within theRead More The New Jim Crow: Mass Incarceration in the Age of Colorblindness, by Michelle Alexander1182 Words   |  5 PagesThe New Jim Crow: Mass Incarceration in the Age of Colorblindness is a book by Michelle Alexander, a civil rights litigator and legal scholar. The book discusses race-related issues specific to African-American males and mass incarceration in the United States. Michelle Alexander (2010) argues that despite the old Jim Crow is death, does not necessarily means the end of racial caste (p.21). In her book â€Å"The New Jim Crow†, Alexander describes a set of practices and social discourses that serve toRead MoreThe New Jim Crow : Mass Incarceration During The Age Of Colorblindness By Michelle Alexander1665 Words   |  7 PagesIn the new proactive book, The New Jim Crow: Mass Incarceration in the Age of Colorblindness, Michelle Alexander dives into the not so complicated racial issues that plague this country that we tend to ignore. In all of history, African Americans have had to constantly fight for their freedoms and the right to be considered a human being in this society. It’s very troubling looking back and seeing where we have failed people in this country. At the turn of the century, when people began to thinkRead MoreThe New Jim Crow : Mass Incarceration During The Age Of Colorblindness By Michelle Alexander1854 Words   |  8 PagesI read The New Jim Crow: Mass Incarceration in the Age of Colorblindness by Michelle Alexander published in 2012. The non-fiction book is 331 pages and features a forward by esteemed civil rights activist Dr. Cornel West. Alexander is civil rights lawyer who decided to write this book after dealing with young black felons restricted by the prison system. The book was a fascinating glimpse into the biases of the criminal justice system. The book is split into six riveting chapters. The initial chapterRead MoreThe New Jim Crow : Mass Incarceration During The Age Of Colorblindness By Michelle Alexander3956 Words   |  16 Pagestoday. The New Jim Crow: Mass Incarceration in the Age of Colorblindness, by Michelle Alexander, is a book about the discrimination of African Americans in today s society. One of Alexander s main points is the War on Drugs and how young African American males are targeted and arrested due to racial profiling. Racial profiling, discrimination, and segregation is not as popular as it used to be during the Civil War, however, Michelle Alexander digs deeper, revealing the truth about our governmentRead MoreAlexander the Great: Historys Greatest1250 Words   |  5 PagesMacedonia was the birthplace of the greatest man in history: Alexander the Great. Greatness was in his blood, fierceness and bold fighting was only a bit of his entity. Alexander also influenced the world. He died young and for a brief period of twelve years of his life were actually spent engaged in performing the work of his life (Abbot, chapter 1). However, his influence was great and seen throughout history around the globe. Alexander the Great was the greatest in history because he conquered theRead More Alexander The Great Essay705 Words   |  3 PagesAlexander the Great On July twentieth, 356 B.C. Alexander the Great was born. His Father was Philip, the King of Macedonia. His mother was Olympia, daughter of the late King Epirus. Alexander was quite mature for his age. At 13 he started learning from Aristotle, he was trained with other children. It was at this time that he met Hephastion, his future best Friend. Aristotle gave Alexander training in rhetoric and literature and sparked his Interest in science, medicine, andRead MoreEssay A Brief Biography of Alexander the Great615 Words   |  3 PagesAlexander the Great Alexander, the great king of Macedonia, won many wars and conquered the land of Persia and defeated there king Darius III. He was meant to be the leader of an army that his father had made because as he was growing up he was raised as a commander. At the age of 20, Alexander was already the king of Macedonia. Six years later he conquered Persia. As a young kid Alexander the Great was formed to be a hero and as he grew up and completed his accomplishments he wasRead MoreThe Death Of Alexander And The Egyptian Pharaoh Essay1579 Words   |  7 Pageswho exiles Alexander and his mother from the kingdom for insubordination. Ptolemy, Alexander’s general who became the Egyptian pharaoh following the death of Alexander, narrates the story at an old age to scribes in Egypt. Ptolemy was present and was a primary source for many of the events in the history of Alexander and he did, in fact, write down his accounts of those events. Those documents no longer exist. However, the film does not attempt to cover all of the battles Alexander and his troopsRead MoreThe Death Of Alexander, The Egyptian Pharaoh Essay1593 Words   |  7 PagesPtolemy, Alexander’s general who became the Egyptian Pharaoh following the death of Alexander, narrates the story at an old age to scribes in Egypt. Ptolemy, a primary source for many of the events in the history of Alexander, did, in fact, write down his accounts of those events. Unfortunately, those documents no longer exist. Understandably, the film does not attempt to cover all of the battles in which Alexander and his troops fought, rather it basically covers t wo of the major battles in spectacular

Computer Fraud †an Analysis on Oracle Corp vs. Sap Ag Free Essays

string(101) " have grabbed some most advanced computer techniques, together with some abuse techniques obviously\." Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. We will write a custom essay sample on Computer Fraud – an Analysis on Oracle Corp vs. Sap Ag or any similar topic only for you Order Now Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAP’s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of company’s information system will be addressed with some reflections of the Case. It has been reported that the world’s software giant SAP AG was sued by its largest competitor, Oracle Corporation, for computer fraud and data theft in March 2007 (Anon, 2010). In the Complaint, Oracle Corporation (2007) stated that in November 2006, unusual heavy download activities were spotted on Customer Connection, a website Oracle used to serve its customers. The uncovered access originated from an IP address in one of SAP’s braches with log-in IDs of PeopleSoft and J. D. Edwards customers. It is discovered later that TomorrowNow and SAP TN, two SAP subsidiaries, committed a series of unauthorized access to Oracle’s customer service system and more than 10,000 illegal download activities. Mass of important materials, including copyrighted software codes and confidential documents was theft. In this way, SAP was capable of establishing a service library for PeopleSoft and J. D. Edwards products, and launched a marketing campaign to snatch Oracle’s customers. The fraud resulted in Oracle’s 120 copyrights infringed and posed the threats of losing 358 customers (Kawamoto, 2007). On 24 November 2010, the U. S. Federal District Court for Northern California announced that Oracle won the Case with SAP liable for $1. 3 billion compensation. As Slappendel (2010) points out, this is the largest amount ever awarded in copyright infringement cases. The core reason may lies that the verdict is based upon the fair market value of the licenses for utilizing those resources instead of Oracle’s profit loss. After the verdict, SAP’s stock price has been falling significantly and TomorrowNow had to be shut down (Anon, 2011; Team, 2010). Although SAP accepted the liability and apologized for its inappropriate behavior, the company has been arguing that the penalty was contrary to the reality of the damage caused by the fraud (Margan, 2011). It is also reported that SAP has filed motions to the Court and therefore SAP’s computer fraud case does not seem to end at present. The action of data theft has brought unnecessary troubles to both SAP and Oracle. In order to prevent computer fraud effectively, it is essential to fully examine the reason of SAP’s behavior. Fraud Triangle will be used as an analysis tool. It is estimated by Romney and Steinbart (2009) that Fraud Triangle consists of the three normal conditions for fraud to occur: pressures, opportunities and rationalizations. Figure 1 shown below is a brief summary of Fraud Triangle in the Case. 5. Homely meals in software industry FIGURE 1 FRAUD TRIANGLE OF SAP Pressure Opportunity Rationalization 2. Oracle’s insufficient security management 4. Theft by other companies (i. e. Siebel Systems) before 1. Financial – fierce competition in the market 3. Few evidence – may not be spotted Firstly, SAP is probably under the severe pressure of maintaining the top one throne in the software market. During the last decade, competition between Oracle and SAP has greatly increased and the rivalry has developed into a feud. Particularly in 2004, Oracle began a series of acquisitions, aiming at increasing the share of enterprise applications market, where SAP owned the leadership (PeopleSoft, 2011). After realizing the seriousness, SAP fighted back by offering special discounts to woo customers, and thus a cruel price battle initiated. However, the strategy did not seem to rescue much, SAP’s market share remains downward sloping (Team, 2010). Currently, Oracle and SAP are vying for the third-party enterprise software support and maintenance market. The enormous pressure of winning may contribute to the commitment of computer fraud, especially for spying the business secrets of the largest competitor. The following two external conditions may possibly be linked to SAP’s unwise actions: Oracle’s insufficient security management and an opportunity to conceal the fraud. Oracle has provided the Customer Connection as a supplementary of its service to the customers. However, the semi-open system, which stores countless precious information, does not appear to be equipped with superior security management techniques. A huge defect exists that allows easy access to resources supposed to be protected from outsiders. In terms of the flaw, Oracle may be partially liable of its loss. Even though Oracle’s detection of abnormal access is relatively sensitive, it could not take a step ahead of the crime. Besides, Oracle’s dependence on service website offers the probability to conceal fraud, since comparably less evidence would be left for detection. With technology improvement, computer fraud may become far more difficult to spot in the future (The National Fraud Center, Inc. , 2000). Moreover, the experience of being a casualty of computer crimes might have lifted SAP’s rationalization of being a perpetrator. It is recorded that in 1999, SAP filed a lawsuit against Siebel Systems and claimed of being a victim of the so-called White Collar Crime (Kawamoto, 2007). Additionally, it may be reasonable to recognize the fact that most people in software industries regard the occurrence of computer fraud as homely meals, because almost all businesses in this market have grabbed some most advanced computer techniques, together with some abuse techniques obviously. You read "Computer Fraud – an Analysis on Oracle Corp vs. Sap Ag" in category "Papers" As a result, SAP’s fraud behavior may not be that severe in the eyes of the decision makers. Hence, accelerate the germination of computer crimes. After fully assessment of why SAP may err, suggestions on how to improve the security of enterprise’s information system will be addressed with reflections of the Case. In the perspective of prevention, several control methods could be considered to raise the security capability of the enterprise’s information systems. First of all, persuade or enforce all employees, even the customers, to use strong password to access to company’s database or service websites (Standler, 2007). Requirement of password changes at regular time intervals would be necessary to prevent some former employees of customers’ company from entering the system, which may exactly Oracle needs. Secondly, restrict physical and remote access to system resources unless the both the log-in ID and IP address are authorized (Backhouse and Dhillon, 1995). Thirdly, safeguard and double encrypt all data and programs. For example, materials on the Customer Connection could be double encrypted so that without further encoding, the downloaded materials would remain useless for non-employees or non-customers. Besides, techniques such as anti-virus software and firewall could to some extent protect the system from worms and viruses attack. Although using the above prevention method could avoid some dispensable loss, perpetrators penetrate everywhere (Romney and Steinbart, 2009). Therefore, an efficient detection system should be ready for any possible incidences. The establishment of a fraud hotline is recommended, which contains the employment of computer security officers, consultants and forensic specialists. The control system will be engaged in monitoring all malicious actions and reporting back as soon as possible. In the Case, Oracle took advantage of its superior detection system and made SAP’s fraud evidence traceable and suppressible (Oracle Corporation, 2007). Despite prevention and detection, there are other preparations could be made ahead of the arrival of any disasters with the intention of reducing the loss caused by computer fraud (Kunz and Wilson, 2004). These routines mainly concern insurance application, recovery plans constitution, material back-up within the whole information system. Furthermore, timely crime reporting to the government crime center and effectively legislative tool using might be helpful for retrieving fairly compensations from perpetrators, as it has been done by Oracle Corporation in the Case. Some ERP market analysts even suspect that the Lawsuit could be a sort of Oracle’s strategy to decrease the competition in the third-party enterprise software maintenance and support market. Whatever the original purpose is, Oracle has achieved benefit from winning the Lawsuit for the current period. To conclude, SAP’s situation has satisfied all of the three conditions presented in Fraud Triangle, some of which heavily depend on industrial environment as well as the design of Oracle’s information system. Thus, objectively, SAP may not liable for all the censure, though it really has been occupied in illicit competition using computer fraud. Oracle could be considered partially responsible for its loss and the sentenced $1. 3 billion seems somewhat too cruel for SAP to bear. Although some experts may argue that the breach of intellectual property is unforgivable culpable negligence, it looks possible for the Court to adjust the amount of penalty towards a more realistic number. Since the next round hearings will not start until July 2011, all the outcomes remain unpredictable (Margan, 2011). It is undeniable that, however, computer fraud could bring about huge losses for the entire society, especially when it is used in economic espionage. In the speeding advancing information century, nearly all of the impossible could be made possible. Consequently, it seems that only the creation of a healthy competition environment, emphasis on business ethics and proper education may aid in bringing down the upward climbing computer crime rate. REFERENCE Anon. (2007) SAP-We Will Aggressively Defend Against Oracle‘s Claims [online]. Ziff Davis Media, United Press International. Available at: http://www. hysorg. com/pdf94025193. pdf [30 April 2011] Anon. (2010) Oracle Awarded $1. 3bn In SAP Data Theft Case [online] 24 November. BBC News. Available at: http://www. bbc. co. uk/news/business-11826167 [28 April 2011] Anon. (2011) SAP Posts Sharp Profit Drop Due To Oracle Lawsuit [online] 26 January. Available at: http://www. physorg. com/news/2011-01-sap-sharp-profit-due-oracle. htm l [29 April 2011] Backhouse,J. and Dhillon,G. (1995) Managing Computer Crime – A Research Outlook [online]. Computer and Security: 14(1995) 645-651. Available at: http://www. sciencedirect. com/science? ob=MImg_imagekey=B6V8G-3Y45T96-1J-1_cdi=5870_user=5939061_pii=0167404895000240_origin=gateway_coverDate=12%2F31%2F1995_sk=999859992view=cwchp=dGLzVzz-zSkWAmd5=dc84aa4043457d125f6d40af14107a14ie=/sdarticle. pdf [29 April 2011] Granick,J. S. (n. d. ) Faking It: Calculating Loss In Computer Crime Sentencing [online]. Available at: http://infosecon. net/workshop/pdf/FakingIt. granick. pdf [1 May 2011] Kawamoto,D. (2007) Oracle Sues SAP On Spying Charges [online] 22 March. CNET News. Available at: http://news. cnet. com/Oracle-sues-SAP-on-spying-charges/2100-1014_3-6169729. tml [28 April 2011] Kunz,M and Wilson,P. (2004) Computer Crime And Computer Fraud [online]. Available at: http://www. montgomerycountymd. gov/content/cjcc/pdf/computer_crime_study. pdf [1 May 2011] Margan,T. P. (2011) Oracle, SAP Still Going At It Over TomorrowNow [online] 28 February. Available at: http://www. itjungle. com/tfh/tfh022811-story07. html [29 April 2011] Niccolai,J. (2010) SAP: Court Lops $500M Off Oracle’s Potential Damages [online] November. IDG News. Available at: http://www. pcworld. com/businesscenter/article/210244/sap_court_lops_500m_off_oracles_potential_damages. tml [1 May 2011] Oracle Corporation (2007) Oracle Vs. SAP Lawsuit Complaint [online]. Available at: http://graphics8. nytimes. com/packages/pdf/business/20070323oracle. pdf [28 April 2011] Panorama Consulting Group. (2010) Clash Of The Titans: An Independent Comparison Of SAP Vs. Oracle [online]. Available at: http://panorama-consulting. com/resource-center/clash-of-the-titans-sap-vs-oracle/ [10 April 2011] PeopleSoft (2011) Oracle vs. SAP [online] 1 May. Available at: http://www. peoplesoft-planet. com/Oracle-vs-SAP. html [1 May 2011] Romney,M. B. and Steinbart,P. J. 2009) Accounting Information Syste ms, 11th Ed. Pearson Prentice Hall. Shaw,E. et al. (n. d. ) The Insider Threat To Information Systems: The Psychology Of The Dangerous Insider [online]. Security Awareness Bulletin: No. 2-98. Available at: http://www. pol-psych. com/sab. pdf [29 April 2011] Slappendel,S. (2010) Oracle v. SAP: Highest Damages Awarded For A Copyright Infringement Lawsuit [online]. Available at: http://www. jeffreyneu. com/20101124282/oracle-v-sap-highest-damages-awarded-for-a-copyright-infringement-lawsuit. html [28 April 2011] Standler,R. B. (2007) Tips For Avoiding Computer Crime [online] 25 November. Available at: http://www. rbs2. com/cvict. htm [29 April 2011] Team,T. (2010) SAP-Oracle Lawsuit Could Weigh On SAP Market Share, Stock Price [online] 14 December. Available at: https://www. trefis. com/company? article=30677# [29 April 2011] The National Fraud Center, Inc. (2000) The Growing Global Threat Of Economic And Cyber Crime [online] December. Available at: http://www. utica. edu/academic/institutes/ecii/publications/media/global_threat_crime. pdf [1 May 2011] APPENDIX: A COPY OF THE NEWS REPORT Oracle awarded $1. 3bn in SAP data theft case 24 November 2010 Last updated at 07:32 GMT Oracle chief executive Larry Ellison testified during the case European software giant SAP has been ordered by a Californian court to pay US rival Oracle $1. 3bn (? 820m) after losing a data theft case. The case revolved around customer-support documents and software stolen by SAP’s subsidiary TomorrowNow. Oracle alleged that the German company intended to use the data to poach the 358 customers involved, and demanded $1. 65bn compensation. SAP had claimed it owed only $40m, but the jury decided in Oracle’s favour. SAP said it was disappointed with the jury’s decision and would look to challenge the verdict. [We will] pursue all available options, including post-trial motions and appeal if necessary,† it said in a statement. It did, however, reiterate that it had made a mistake: â€Å"We regret the actions of TomorrowNow, we have accepted liability, and have been willing to fairly compensate Oracle†. ‘Big dreams’ Oracle co-president Safr a Catz expressed her satisfaction with the verdict: â€Å"For more than three years, SAP stole thousands of copies of Oracle software and then resold that software and related services to Oracle’s own customers. â€Å"The trial made it clear that SAP’s most senior executives How to cite Computer Fraud – an Analysis on Oracle Corp vs. Sap Ag, Papers