Wednesday, October 30, 2019

I) Outline the sources of the English Law in the order of their Essay

I) Outline the sources of the English Law in the order of their importance. (400 words) ii) How important is Equity in this respect (400 words) - Essay Example For instance the development of non-monetary amends like injunctions and decrees of specific performance was brought in by Equity. Legislation is the commonest source of new laws or of law reform after the Seventeenth century. The most vital legislation is Acts of Parliament which is known as primary legislation. This becomes binding only after approval in the House of Commons and the House of Lords; after which it gets the Royal Assent from the Queen. The doctrine of precedent is defined as ‘The common law principle which binds a judge or a magistrate to follow previous similar decision of higher courts in the same hierarchy; also known as stare decisis† (Vickery & Pendleton 2006). The doctrine of precedent derives from common law and law of equity, which is ‘English-made’ laws that aims to be fair and treat all equally, so that the decisions by the courts are predictable and consistent in resolving disputes. There are binding and persuasive precedents, which binding precedents are known as ‘ratio decidendi’ when the final order or ‘res judicata’ by the court is made to the immediate parties, and it has a legal effect based on the key reasons for the decision. This includes passed decisions by the higher courts in the same hierarchy in similar cases, will be used for future similar cases so there are consistent remedies or sanctions under common law. An example of a precedent bei ng used was in the final decision of The House of Lords case in 1932, for the ‘Donoghue V Stevenson case.1 The House of Lords case was similar as manufacturers have the duty of care when selling their products, and ensure they are safe to consume. Therefore this precedent was legally binding and enforced by common law for a similar outcome. English law prior to the intro of the rule of equity was chiefly ruled by Common Law. Blackstone (2001) specified Common Law as â€Å"the

Sunday, October 27, 2019

Ethical Hacking And Attacking Computer Science Essay

Ethical Hacking And Attacking Computer Science Essay It is debatable, if hacking can be ethical or not, the term Hacking over time has been associated with destructive activity. These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose. The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker. Ethical hacking is the process adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of internet, computer security has become a major concern for business. Organizations need ethical hackers who can think like a cracker to simulate a real life hacking scenario; they make use of same tools and techniques of that of crackers without damaging / compromising the sensitive information thereby maintaining the integrity and confidentiality of the organization. Ethical hacker should have excellent programming and networking skills. They evaluate the security of target and update the organization regarding the discovered vulnerabilities along with recommendations to mitigate them. Anatomy of a Hack Initially, Hacking meant having extraordinary skills to break into the system. However today there are lots of automated freeware tools available on internet making it possible for anybody having the desire to hack succeed in breaking into the system. These are the 5 phases every hacker must know. Figure 1: Anatomy of an Attack Reconnaissance Reconnaissance is the preparatory phase where an attacker gathers information about the target system prior to launching the attack. This phase might also involve network scanning either internal or external without any authorization. One of the ways for gathering information during this phase may involve Social engineering. A social engineer is a person who smooth-talks and persuades people to reveal personal / sensitive information such as passwords, security policies etc. Social engineering is one of the easiest ways to hack as it requires no technical skills and one of the hardest forms of attack to defend against as humans are the weakest link in the security chain. All security measures taken care by the organization goes in vain when the employees get social engineered. Detecting social engineering attacks are difficult, as there is no tool to detect such attempts, in most of the cases victim themselves are not aware having revealed sensitive information. Rebecca and Jessica are the common terms used, which refer to people who are easy target for social engineering attacks such as a receptionist or a support executive. Dumpster diving is another way of gathering information. It is the process of looking for discarded sensitive information in an organization thrash. It is one of the effective ways of gathering information as it may provide attackers with even more sensitive information such as username, password, ATM slip, social security number, Bank statements. It is important that an organization has appropriate policies in place to protect their assets and also provide proper guidance to employees on the same. Reconnaissance technique can be classified into active and passive reconnaissance. In passive reconnaissance, the attacker does not interact with the system directly but uses social engineering or dumpster diving as a mean to gather information. Where as in a active reconnaissance, the attacker makes use of tools for port scanning, network scanning to get the details of the application, operating system etc. Often reconnaissance phase overlaps with the scanning phase. Scanning Scanning precedes the actual attack and is one of the important phase of information gathering where in the attacker gathers information about the targets IP address , operating system , system architecture , services running in the system in order to find various ways to intrude into targets system. The strategy to launch the attack is based on the gathered information. The risk of an organization is considered high in the scanning phase as it enables access to the network. Different types of scanning are Port Scanning: Procedure for identifying the open ports and the services running on the target system. Network Scanning -Procedure for identifying IP addresses, active hosts on a network either to attack them or as a network security assessment. Vulnerability Scanning -Automates method to identify the known vulnerabilities present in the system and the network. Some of the important tools used during this phase are Nmap which is used for port scanning; it also offers a variety of advanced features such as remote OS detection. Nessus is a vulnerability scanner which detects the local flaws, uninstalled patches and weakness in network hosts. Nessus has a security vulnerability database which is updated on a daily basis. It carries out development of security checks for recent security holes. CEH scanning methodology The diagram below shows the sequence of steps followed in order to scan any network although scanning method may differ based on the objective of the attack. The Attacker starts with checking for the live systems in the network. Once he finds the live system, looks for any open port present in the system to identify the services running on it. The next phase is OS fingerprinting which is nothing but gathering operating system information about the target system. Post which the attacker scans for vulnerabilities present in the target operating system and exploit it. The attacker may also choose to probe the network by making use of proxies. Figure 2: CEH Scanning Methodology Gaining Access This is one of the most important phases for an attack as this is where the actual attack is planted. Therefore the business risk is highest in this phase. Although not a mandatory phase as an attacker need not always gain access to cause damage like in denial of service attacks. The main aim in this phase is to obtain elevated privileges such as system privilege to execute commands to access sensitive information. Maintaining Access Once the attacker gains access into the system or the network, he tries to retain his ownership on the compromised system and periodically attack it. Typically in this phase the attacker tries to install Key loggers to capture the keyboard strokes, sniffers to capture network traffic, rootkits at the kernel level to gain super user access and Trojan horse to gain repeated backdoor access, also download the password files to access the system at a later time. Once the Trojans are in place, the attacker can assume to have gained total control of the system. During this phase the attackers might even harden the system against other attackers by fixing the vulnerability which allowed them to access the system or the network. Clearing Tracks This is where the attacker tries to cover the evidence of his activities for various reasons like maintaining access or legal actions. During this phase the attacker deletes the system logs preventing the system administrator from monitoring the unusual activity, Rootkits are installed as they are effective in covering tracks and also because in some cases they disable logging. Other techniques like Steganography which is used to hide the data in a image or a file, are made used by the attacker in order to cover tracks Typical Hacking Techniques There are several ways an attacker can gain access into the system such as Operating system attacks Application Level attacks Shrink wrap code error Misconfiguration attacks Google Hacking Google Hacking is the art of creating complex search queries in order to gather information of the target system. Google is the primary tool used for Google hacking. Advanced Google operators are used to filter information. Google hacking database identifies files containing password, sensitive directories, vulnerable web pages, error messages containing sensitive information, pages containing firewall logs etc Figure 3: Google advanced search option Basics of Google Hacking Below are some of the basic ways Google is used for hacking Directory Listing Attack: Webpage often accidentally displays files and directories that exist on the web server when top level index file is missing or invalid as directory listing is not taken care of. Most of the times they do not prevent users from downloading files or accessing sensitive information without authorization. Locating directory listing in Google is very straight forward. A query of Intitle: Index.of is the universal search for directory listing Figure 4: Google hacking for Directory Listing An attacker can make use of this information to access sensitive information of the application. Information Disclosure Error messages can disclose a lot of sensitive information about the target like the operating system, network architecture, user information etc. A query of intitle: error fetched 4,070,000 results Figure 5: Google hacking for Information Disclosure Below is the error message displayed by an application. Figure 6: Error message displayed from Google hacking query The error message reveals sensitive information about the target system such as the application is built in asp.net, IIS 4.0, MYSQL database. An attacker can now launch attacks that are vulnerable to these technologies. Sensitive Information: Here are some of the Google search syntaxs to crawl for Sensitive information such as passwords filetype: xls inurl: password.xls -Looks for username and password in ms excel format. intitle: Index of master.passwd -index the master password page index of / backup- Looks for the index backup file on server) intitle: index.of passwd.bak Looks for the index backup password files. intitle: Index of pwd.db- Looks for database password files inurl: user.xls intext: password- Looks for url that save username and passwords in spread sheet files Site Digger, which explores Googles cache to look for susceptibilities ,errors, security loopholes on website and Gooscan which automates queries against Google search engine are some of the other tools used for Google hacking. Certified Ethical Hacker Certification Course (CEH) CEH is the professional certification provided by the international council E-Commerce consultants (EC-Council). Figure 6: CEH Process Apart from EC council, there are other certified hacking course taken by some well known Hackers like Ankit Fadia Certified Ethical Hacker (AFCEH) and also some other vendors like karROX Certified Ethical Hacker Course. Ethical Hacking Services As part of ethical hacking services, Penetration testing which is nothing but creating a real life hacking scenario and trying to break into the system is offered by various vendors. Different tools, technique and methodologies are used to gain entry into that application. The service offered could be either a black box testing (where only the application URL is given) or a grey box testing (where a dummy user account with least privilege is created for the pen testers).Penetration testing will be carried over by a team of dedicated ethical hackers. Some of the key benefits of penetration testing are Find security loopholes which cannot be found through functional testing. Identify business logic flaws which cannot be detected by Code Review. Real world simulation of hacking thereby revealing soft targets for possible attacks. Meet Regulatory Compliance like PCI, HIPAA, GLBA and ISO regulatory compliance. Reduction in web application development security flaws. Development of effective mitigation strategies based on your specific environment The Pen test report provides recommended remediations for the identified attack. Follows the industry standards for security such as OWASP TOP 10 and SANS 25. Commercial tools like Cenzic, Acunetix, and IBM Rational Appscan are some of the widely used tools for Pen Test. Social Engineering Testing is offered as complementary service by some vendors which tests the organizations human firewall by gaining access to an organization and its assets by tricking key personnel over communications medium such as telephone, email, chat, bulletin boards, etc. Acknowledgement Vikram 😛 Related Knowledge Briefs or References Have to check. Summary In recent times Web applications are the target of various forms of attacks. According to a Gartner report 70% of the security attacks are targeted on the web application. Competition is so high that enterprises cant ignore the risk associated with their vulnerable application. Loss incurred could vary from monetary losses to loss of credibility. In certain cases it could mean end of business. You cannot stop an attacker from hacking, the only thing you can do is make it harder to get in. Ethical hackers are the security professionals who use their hacking skills for defensive purpose. The process of ethical hacking would depend on, what is that organization is trying to protect, against whom and how much or resources the organization is ready to spend. The hacking tools are meant for research and educational purpose only and should not be used for destructive purpose. Your Name then enter a short two or three line biography, including your BU/practice and location. Was the information contained in this Knowledge Brief useful? We strive to improve our content by continuously refining it. You can discuss the document, or download the most recent version, from the details page of this Knowledge Brief. Your feedback is appreciated!

Friday, October 25, 2019

Near Death Experiences :: essays research papers fc

There are many phenomena present in today’s world concerning both life and death. An extraordinary incorporation of these prominent values is a Near Death Experience (NDE). Near Death Experiences empower and affect the psyche of many, changing their lives forever and altering their perception of death. Many questions arise from this particular topic simply because you have to experience it to fully understand its meaning. Questions such as, What is it, What happens, and how do they occur are familiar to experts in this field or to the people who have first hand experience.   Ã‚  Ã‚  Ã‚  Ã‚  Although the meaning of a Near Death Experience is different to the individual, it is described to be a personal encounter with death, later being brought back to life. The man responsible for triggering the later studies of this perplexing subject is Dr. Raymond Moody. During the year of 1975, he published a book, Life After Life, explaining his newfound concept of a Near Death Experience. He heard about a specific case study that extremely intrigued him. “As a student, Raymond Moody heard about the experience of a psychiatrist who had ‘died’ from double pneumonia only recovering after his doctor had pronounced him dead to his family.'; This remarkable case stunned Raymond Moody, and after publishing his book, this case intrigued society. This particular psychiatrist went on to write about his Near Death Experience, but Dr. Moody was the first to research this unknown topic.   Ã‚  Ã‚  Ã‚  Ã‚  Although Dr. Moody set a precedence in studying this subject, the event that triggered his studies was not the first Near Death Experience to be documented. Elisabeth Kubler-Ross, also a psychiatrist, worked with survivors from the Nazi concentration camps. Because of her patients, she had become completely convinced that something unexpected happens close to death. Her book, Death and Dying, much more general than Dr. Moody’s work, contains the first real exploration of a NDE by a doctor.   Ã‚  Ã‚  Ã‚  Ã‚  Obviously, Near Death Experiences occur near an individual’s time of death. The cause of an individual’s time of death can come from virtually anything, but, usually results from some sort of accident. “Accidents come out of the blue. They can happen to anyone and there’s no time to prepare for them.'; Because accidents may occur at any time, so may a Near Death Experience. Thus meaning that, only knowledge of the subject matter can reduce fear and gain preparation.   Ã‚  Ã‚  Ã‚  Ã‚  Each individual may experience different emotions, visions, and encounters, but generally, the first few stages of Near Death Experiences are common throughout each case.

Thursday, October 24, 2019

Tropical Rainforests vs Tropical Grasslands

Discussion Based on the data at Tables 4c. 2 and 4c. 3, it is evident that the tropical rainforest has higher species richness than the tropical grassland ecosystem. However, when based in the indices on Diversity, Similarity and Dominance in the tropical grassland and tropical rainforest data, the Simpson Indices favor the data for the tropical rainforest as more diverse than the tropical grassland. The Simpson Indices, as defined in Cuevas et. al (2012), is based on dominance and as the number of dominant species in a community are few, the species has low diversity.The tropical rainforest ecosystem showed a higher index of dominance than the tropical rainforest resulting to the higher values it obtained in the Simpson Indices of Similarity and Evenness. This means that most of the dominant organisms present in the grassland are quite similar and the same due to the higher Simpson Indices on Equitability and Diversity while it is a different case for the forest. First, we need to i dentify the forest study site as a secondary or primary growth type. From the tables of species richness and number of species seen in an area, we can deduce that the forest study site is a secondary growth forest.Secondary growth forests are products of secondary succession. Secondary succession, as described in Campbell (1996), is the type of succession that occurs when the soil is intact and accommodates a considerable amount of nutrients that can support life. This succession is primarily dependent on the pioneer species (e. g mosses, weeds and etc. ) which tends the soil from its lifeless state. Since pioneer species are mostly small and more adaptable to the harsh environment, we can say that the organisms or individuals present in the forest study site are products of secondary succession.A primary growth tropical rainforest, in turn, has the following characteristics: a barren soil, presence of few organisms that can flourish at extreme conditions (pioneer organisms) and dev elopment of communities in a newly formed habitat (Ricklefs, 2008). However, the study site showing the higher species diversity based on Shannon index is the tropical rainforest study site. Comparing data presented at Table 4C. 4, the tropical rainforest showed that even in the degree of randomness of the species, the tropical rainforest showed a wider variety of species compared to the tropical grassland.The Shannon Indices are also dependent on the species richness or the number of species in a given area. (Begon et. al, 2006). Also, some species or individuals are specific in terms of their habitat. This species are sometimes common in a given habitat while rare in another type of habitat. For the common species in the grassland, Imperata cyndrica, Mimosa and Elepantopus are examples of species that are generally common due to their intercepted lengths or relative covers, as seen in Table 4C. 2, which yielded considerable values for it to be classified as common.Grassland indivi duals form in clusters and are difficult to recognize as individual species, which is why counting them as separate individuals is not practical and difficult. They are counted through the relative cover that their nodules occupy. These individuals may have the following factors that allowed them to develop in their present habitat: good interspecific competitor, highly adaptive to harsh environment and efficient distribution of nutrients and essential compounds to the plant itself. However, some species are rare in grasslands. Examples of the rare species in the grassland ecosystem are Desmodium, Sorghum, and Borreria.Based on the intercepted lengths and % cover of the species in Table 4C. 3, the species are rare due to low values it yielded on the parameters (i. e. intercepted lengths, relative cover and etc. ) and thus, regarding it as rare. This species or individuals may be rare due to low interspecific competition and are not yet adapted to their environment. They may also be dispersed randomly and landed on a grassland ecosystem that offers unfavorable conditions to the growth and development of such plants. Species that are quite common in the tropical rainforest are the Palosanto, Caryota cumingii and Cariota rumphiana.Even if the species or individuals are high in numbers compared to other plant species present in that area, we cannot conclude that these plants are the dominant individuals in the tropical rainforest. There may be certain reasons why these individuals are high in numbers. We should include factors such as reproduction rates or processes since these individuals have different ways of propagating their seeds and also the nutrient availability of the given area in the study site that the individuals really thrive for specific nourishment the place or area provides.Also, the forest has a larger area for growth and development of species and a larger area would signify that it could accommodate more species than the grassland ecosystem. Th e diversity of individuals in an ecosystem is affected by many factors including the area, nutrient availability and presence of biotic interactions such as competition, mutualism and etc. that would allow species or individuals to grow and develop for a higher diversity in an ecosystem. Begon et. Al, 2006) Conclusion Based on the data gathered and computed, we can say that even if the tropical rainforest species or individuals showed lesser dominance on one another, they exhibited a wider variety of species than the tropical grassland organisms. In the computation for the Shannon’s Indices of Diversity and Evenness, the tropical rainforest is a better candidate for a more diverse and even distribution of species compared to the tropical grassland.The same goes for the Simpson Indices of Dominance, Diversity and Evenness of the tropical rainforest that was more favorable than the tropical grassland. However, presence of viable resources, the area of the ecosystem and specific biotic interactions, such as competition in clumped-distributed plants, greatly affects the diversity of plants since plants tend to disperse and develop in places or areas that have lesser competition and high amount of viable nutrients.Since the tropical rainforest showed most of the characteristics needed for a plant individual to diversify, we can conclude that the tropical rainforest is more diverse and exhibits higher species richness than the tropical grassland ecosystem. However, It is strongly recommended that the increase of transect size or area for research study regarding the diversity and richness of species to validate the errors in this exercise. Introduction A community, as defined in the Dictionary of Ecology (1962), is a group of one or more populations of organisms in a common spatial arrangement or area. Tropical Rainforests vs Tropical Grasslands Discussion Based on the data at Tables 4c. 2 and 4c. 3, it is evident that the tropical rainforest has higher species richness than the tropical grassland ecosystem. However, when based in the indices on Diversity, Similarity and Dominance in the tropical grassland and tropical rainforest data, the Simpson Indices favor the data for the tropical rainforest as more diverse than the tropical grassland. The Simpson Indices, as defined in Cuevas et. al (2012), is based on dominance and as the number of dominant species in a community are few, the species has low diversity.The tropical rainforest ecosystem showed a higher index of dominance than the tropical rainforest resulting to the higher values it obtained in the Simpson Indices of Similarity and Evenness. This means that most of the dominant organisms present in the grassland are quite similar and the same due to the higher Simpson Indices on Equitability and Diversity while it is a different case for the forest. First, we need to i dentify the forest study site as a secondary or primary growth type. From the tables of species richness and number of species seen in an area, we can deduce that the forest study site is a secondary growth forest.Secondary growth forests are products of secondary succession. Secondary succession, as described in Campbell (1996), is the type of succession that occurs when the soil is intact and accommodates a considerable amount of nutrients that can support life. This succession is primarily dependent on the pioneer species (e. g mosses, weeds and etc. ) which tends the soil from its lifeless state. Since pioneer species are mostly small and more adaptable to the harsh environment, we can say that the organisms or individuals present in the forest study site are products of secondary succession.A primary growth tropical rainforest, in turn, has the following characteristics: a barren soil, presence of few organisms that can flourish at extreme conditions (pioneer organisms) and dev elopment of communities in a newly formed habitat (Ricklefs, 2008). However, the study site showing the higher species diversity based on Shannon index is the tropical rainforest study site. Comparing data presented at Table 4C. 4, the tropical rainforest showed that even in the degree of randomness of the species, the tropical rainforest showed a wider variety of species compared to the tropical grassland.The Shannon Indices are also dependent on the species richness or the number of species in a given area. (Begon et. al, 2006). Also, some species or individuals are specific in terms of their habitat. This species are sometimes common in a given habitat while rare in another type of habitat. For the common species in the grassland, Imperata cyndrica, Mimosa and Elepantopus are examples of species that are generally common due to their intercepted lengths or relative covers, as seen in Table 4C. 2, which yielded considerable values for it to be classified as common.Grassland indivi duals form in clusters and are difficult to recognize as individual species, which is why counting them as separate individuals is not practical and difficult. They are counted through the relative cover that their nodules occupy. These individuals may have the following factors that allowed them to develop in their present habitat: good interspecific competitor, highly adaptive to harsh environment and efficient distribution of nutrients and essential compounds to the plant itself. However, some species are rare in grasslands. Examples of the rare species in the grassland ecosystem are Desmodium, Sorghum, and Borreria.Based on the intercepted lengths and % cover of the species in Table 4C. 3, the species are rare due to low values it yielded on the parameters (i. e. intercepted lengths, relative cover and etc. ) and thus, regarding it as rare. This species or individuals may be rare due to low interspecific competition and are not yet adapted to their environment. They may also be dispersed randomly and landed on a grassland ecosystem that offers unfavorable conditions to the growth and development of such plants. Species that are quite common in the tropical rainforest are the Palosanto, Caryota cumingii and Cariota rumphiana.Even if the species or individuals are high in numbers compared to other plant species present in that area, we cannot conclude that these plants are the dominant individuals in the tropical rainforest. There may be certain reasons why these individuals are high in numbers. We should include factors such as reproduction rates or processes since these individuals have different ways of propagating their seeds and also the nutrient availability of the given area in the study site that the individuals really thrive for specific nourishment the place or area provides.Also, the forest has a larger area for growth and development of species and a larger area would signify that it could accommodate more species than the grassland ecosystem. Th e diversity of individuals in an ecosystem is affected by many factors including the area, nutrient availability and presence of biotic interactions such as competition, mutualism and etc. that would allow species or individuals to grow and develop for a higher diversity in an ecosystem. Begon et. Al, 2006) Conclusion Based on the data gathered and computed, we can say that even if the tropical rainforest species or individuals showed lesser dominance on one another, they exhibited a wider variety of species than the tropical grassland organisms. In the computation for the Shannon’s Indices of Diversity and Evenness, the tropical rainforest is a better candidate for a more diverse and even distribution of species compared to the tropical grassland.The same goes for the Simpson Indices of Dominance, Diversity and Evenness of the tropical rainforest that was more favorable than the tropical grassland. However, presence of viable resources, the area of the ecosystem and specific biotic interactions, such as competition in clumped-distributed plants, greatly affects the diversity of plants since plants tend to disperse and develop in places or areas that have lesser competition and high amount of viable nutrients.Since the tropical rainforest showed most of the characteristics needed for a plant individual to diversify, we can conclude that the tropical rainforest is more diverse and exhibits higher species richness than the tropical grassland ecosystem. However, It is strongly recommended that the increase of transect size or area for research study regarding the diversity and richness of species to validate the errors in this exercise. Introduction A community, as defined in the Dictionary of Ecology (1962), is a group of one or more populations of organisms in a common spatial arrangement or area.

Wednesday, October 23, 2019

Psychology Revision Notes Essay

Participants were divided into four groups which were acoustically similar, acoustically dissimilar, semantically similar and semantically dissimilar. Participants were presented with the list a total of 4 times and each time was interrupted to try to prevent rehearsing. They were then presented with a 20-minute interval task and afterwards were asked to recall their list. Semantically dissimilar words were recalled the most telling us that encoding in LTM is semantic. Summary of study on capacity of STM and LTM  Summary of study on duration of STM  Peterson & Peterson-  Showed PPs a list of nonsense trigrams and asked them to count back from 400 in 3 second intervals for a duration ranging from 3 to 18 seconds. Found that duration of STM was 18-30 seconds maximum.  Summary of study on duration of LTM  Bahrick-  400 participants aged between 17 and 74 were tested using different methods including free-recall tests, photo-recognition test, name recognition tests and photo-name matching test. PPs performed less well on free recall tests (30% after 48 years) but were much better in the photo-name test (90% after 60 years). Models of memory  Description of the multi-store model of memory, plus evaluation inc. research  Atkinson & Shiffrin-  Multi-Store Model which consists of three parts – sensory, short term and long term stores. Rehearsal is required in order for information to move across stores and retrieval is needed to access the information. If information is not rehearsed it will decay.  Description of the working memory model, plus evaluation inc. research Baddeley & Hitch-  Working Memory Model which consists of three parts – central executive, phonological loop (store and articulatory control system) and the central executive. Memory in the real world  Knowledge of what Eye Witness Testimony (EWT) is-  The evidence provided in court by a person who witnessed a crime, with a view to identifying the perpetrator of the crime. The accuracy of eyewitness recall may be affected during initial encoding, subsequent storage and eventual retrieval.  Loftus & Palmer’s (1974) study on EWT-  Reconstruction of an Automobile Disaster. 9 student PPs per 5 conditions (bumped, contacted, hit, smashed and collided). All watched a video then asked to estimate speed. Smashed the highest (40.8mph) and contacted the lowest (31.8mph). PPs in second part of experiment then asked a leading question about broken glass. 16/50 of the smashed condition PPs said yes in comparison to 7/50 in the hit condition. Knowledge of the factors which affect the accuracy of EWT  anxiety-  Christianson and Hubinette (1993)  Anxiety and EWT – real incidents involving high levels of stress lead to more accurate, detailed and long lasting memories.  Deffenbucher (2004)  Carried out a meta-analysis of 18 studies, looking at the effects if heightened anxiety on accuracy of EWR. It was clear that there was considerable support for the hypothesis that high levels of stress negatively impacted on the accuracy of EWM. Age-  Parker and Carranza (1989)  Compared the ability of primary school children and college students to correctly identify a target individual following a slide sequence of a mock crime. In the photo identification task, child witnesses has higher rate of choosing ‘somebody’ than adults witnesses, although they were also more likely to make errors of identification than college students.  Weapon focus effect-  Loftus(1987)  In violent crimes, arousal may focus attention on central details e.g. a weapon. Loftus et al identified weapons focus effect. 2 conditions, one involving weapon the other not. Condition 1 (less violent) people was 49% accurate in identifying man. Condition 2 (more violent) people were 33% accurate. Suggests weapon may have distracted them.