Thursday 19 December 2019



Entrepreneurship

Entrepreneurs are frequently thought of as national assets to be cultivated, motivated, and remunerated. It can be difficult to explain the difference between the term businessman and entrepreneur.  An entrepreneur has the ability to change the way we live and work. Their innovations may improve standards of living, and in addition to creating wealth with entrepreneurial ventures, they also create jobs and contribute to a growing economy. However, businessman is someone who is starting a business with no innovation or invention. Entrepreneurship is important for a number of reasons, from encouraging social development to innovating the lifestyle.
Entrepreneur have a personality that allows them to believe and take risks as well as enjoy the process that other people find distasteful, some people think that they can do something better then another one in any aspects of the business. They are someone who organizes the factors of creative new product or service and they know how to catch up opportunities to turn a dream into reality. They have skills as vision, motivation and determination as well as have initiative and desire to take risks in order to benefit from the profit. They should be creative, innovative and confident about what they are doing as well as just themselves know what exactly they are doing to make dream come true.
In fact, for those who are wanted to become success entrepreneur, they have to know that money is not the important thing at all for best business.

Ms. Anshu
Assistant Professor
Department of Management Studies

Tuesday 8 October 2019

Detection of Malicious nodes inVanet



Detection of Malicious nodes inVanet

Vehicular Ad hoc Network provides vehicle to vehicle and vehicle to roadside communication by a self-configuration type of network. Through the nodes the data is shared representing themselves as servers and clients across the network. Computers, communications, management technologies, sensor and control innovations comprises of several components. For integration of these functions there can be an improvement in the functioning of a transportation system. By using Vehicular Ad-Hoc Networks the warnings related to the environmental hazards, traffic, road conditions and data regarding the transmission amongst vehicles is provided. The information can be spread across the network if there is any kind of traffic jam or road closure.  This saves time and also helps the drivers for avoiding the specific routes.
Distributed Denial of Service Attack (DDOS) attack is an attempt made by an attacker from different location for stopping the legitimate users from the system for accessing the required objects. Examples of the DDOS attack are as follows:
i)            Flooding the network prevents access of legitimate network traffic.
ii)      Disruption of the connections amongst two machines prevents users to access service.
iii)    Through preventing one individual user to have access to it prevents the user from    accessing a service.
Within the DDOS attacks there are different tools utilized. Even though they have different name they have same basic structure of the tools. Following are the components as shown in figure .
·      Attacker: If the hacker uses the personal computer it is the responsibility of the hacker.
·     Master: the system receives direct command from the attacker also the other agents are controlled by it.
·     Handler: through this program the tasks are performed on the program master system.
·     Agent: the system directly attack the target
·  Demon program: with the help of this program the above tasks are performed on the agent system.

Garima Saini
Assistant Professor
Department of Information Technology.


Tuesday 1 October 2019




Mobile Forensics


Mobile forensics is a branch of digital forensics related to the recovery of digital evidence from mobile devices. With the continued growth of smart phone market, the probability of their use in criminal activities has continued to increase. Mobile phone nowadays comes with a wide variety of software application, new technologies and operating systems. Therefore it becomes complicated for a forensic investigator to examine the evidence from a mobile phone. A proper knowledge of forensic tools and their features is required to collect relevant information.Forensics Operating system like android, being open source, is an advantage for the software developers; but, it is the biggest disadvantage for forensic analysts, as they have to craft and implement new methods for breaking into the device and performing forensic analysis. The methods of performing forensics analysis and data acquisitions on mobile devices are not constant. Investigators must adapt to new methods and change their approach each time they perform forensic investigation on mobile devices.
Important aspects of cell phones which are to be analysed:
· Internal memory
· SIM card
· Memory card
· Network provider
Important data types which can be extracted from the forensic analysis of mobile devices are - Text messages, contacts, history, photos, audio, video, GPS location, emails, memos, calendar, documents, web-history such as use of social media applications like Facebook, twitter, Instagram, WhatsApp etc.
The Chip-Off and JTAG methods are increasingly gaining popularity because of capability of this method to by-pass complicated phone locks and drive encryption. Ultimately, the tool on which forensic analysis is performed will be provided with physical image of the memory chip from that mobile device. In Chip-Off method, the chip is removed or unmounted from the circuit board of the mobile device and testing and programming is done using JTAG (Joint Test Action Group). This method requires the knowledge of location of the chip and JTAG connectors in the device. Along with this, the person must have the knowledge of dismantling and repairing the hardware of the device. The main difference between Chip-Off and JTAG method is that, in the chip extracted during Chip-off analysis cannot be remounted again in the device unlike the JTAG where the connections can again be soldered. Hence, Chip-Off is normally used on damaged devices. This physical image is created by bit-by-bit copy of data stored on memory chip. There are many cases, where calculating a physical dump is not possible with physically extracting the storage chip. Today with such a fast growing pace of mobile devices, it is impossible to design a customized tool for every device, but the physical dump obtained from a memory chip can be analysed in a similar way. Even though Chip-off and JTAG are complicated processes, due to their output obtaining capabilities, there use is on the rise. Sometimes, forensic experts need to analyse mobile devices which are completely damaged in an accident or even sometimes the suspects damage it on purpose, in-order to destroy the evidence, during such time, this method can be very effective and where the other processes fail.


Ms.Sonali Sharma
(Assistant Professor-IT)
Department of IT

Thursday 26 September 2019





BEWARE, LOOK OUT : How Much Should We Trust ALEXA & SIRI!!!



Voice assistants are making our lives easier day by day. Instead of having to get up to turn on the lights, open the doors, draw the curtains, switch on the AC’s, or tomake that call while driving we can simply ask them to do it for us. Not only that, Google Assistant, Amazon Alexa or IphoneSiri allow you to call and search businesses, services,answer mails via voice too, with no need to input a phone number or text anywhere. We all read the news recently as reported Bloomberg in April that human reviewers listened to Amazon Alexa recordings. The news came as shock to many users like me as well. A lot of people got worried that voice assistants like Amazon’s Alexa, Apple’s Siri or the Google Assistant are spying on us at home. All three companies have said the assistants are not listening all the time, but only listen for a wake word — or perhaps hidden commands humans can’t hear.
The worry is why do tech companies want to hold on to information from our homes at first placef? Is it because no one stopping them and theymight be using this data for training purposes. When asked, “Any data that is saved is used to improve Siri,” Apple said.“Alexa is always getting smarter, which is only possible by training her with voice recordings to better understand requests, provide more accurate responses, and personalize the customer experience,” Beatrice Geoffrin, director of Alexa privacy, said in a statement. The recordings also help Alexa learn different accents and understand queries about recurring events happening around us, she said. Surely we all want to benefit from AI that can set a timer or save energy when we don’t need the lights on. But that doesn’t mean we’re also opening our homes to tech companies as a lucrative source of data to train their algorithms and one day in any big breach for fault of ours maybe we lose all this data in the wrong hands. This data should belong to us.
Another security issue has come in light for these leading voice assistants—and this time it isn't manufacturers recording our conversations. A new scam has been exposed, where fraudsters are hiding behind convenient auto-dial features to lure unsuspecting users into a trap. What we do now days is blindly trust these Voice Assistants for searching random businesses though internet and call on these unknown numbers without verifying the authenticity of service provider. The fraudsters have realized that people search for businesses and then call them, all without viewing the online entry for the business itself. And that has opened up a major risk that those businesses are not what they might seem.According to the Better Business Bureau, a private, nonprofit organization in USA since 1912 some scammers have apparently gamed Google and Amazon's phone number ranking systems. Unsuspecting users could end up talking to an imposter instead of the desired business.
As reported by BBB in a latest survey that consumers reached out to it after almost falling for scammers who tried to charge them nonsense fees. One such victim used some form of voice search to call an airline in the hope of changing her seat. A con artist then tried to make her pay $400 in pre-paid gift cards for the service, but luckily, she didn't fall for the trick. Another customer used Siri to contact support for his printer, only to find himself connected to a scammer.

Not only that Every kind of home or office appliance now a days is also becoming a data-collection device. According to the data, the average US household contains 17 smart devices while European homes have an average of 14 devices connected to the network.(source  Cybersecurity in an IoT and mobile world (ZDNet special report) | Download the report as a PDF (TechRepublic). All these gadgets are supported by Alexa or Siri. Amazon acknowledges it collects data about third-party devices even when you don’t use Alexa to operate them. It says Alexa needs to know the “state” of your devices “to enable a great smart home experience.” But keeping a record of this data is more useful to them than to us. Amazon could delete everything it had learned about our home, but we can’t look at it or stop Amazon from continuing to collect it. Google Assistant also collects data about the state of connected devices. But the company says it doesn’t store the history of these devices, even though there doesn’t seem to be much stopping it.One more fear prevailing many of us due to this iscould a hacker tap into one or all of these devices and eavesdrop on us? The official answer is no, and specific technical reasons are cited. However, as quoted by The Palmer Group several theses for 2017 including, "Anything that can be hacked will be hacked." Anyone who believes otherwise is simply naïve. One such hacking was recently reported by a couple too ,
Siri or Alexa is NOT dangerous. The data it collects is NOT dangerous. Nothing about an Amazon Echo is dangerous. But who does what with our data is shivering thought.In today date n time, Data is more powerful than the being itself. It is an immutable law of 21st-century living, which in this case means that the most serious threat to each of us is the profile that can be created with the willing suspension of our agency. Most of us have no idea how much information about us all is available for sale. The willing suspension of agency has the potential to take us right up to the line that separates where we are now from an Orwellian future. (Many people believe we already live in a surveillance state. We'll explore this in another article.)We Must Deal with This Sooner or Later.
Just before winding up this article I searched for home automation with Alexaon amazon.in and it showed me 1000 results found in Home Improvement, Home & Kitchen, Books and Electronics department with huge Diwali offers. Not only that Amazon on Wednesday September 25, 2019  during the new hardware launch of its Alexa enabled device launched Amazon Loop , Amazon Frames , Echo Buds, General Motors Alexa Integration, Amazon Smart Oven, The Ring Indoor Camand many more. It was rightly said by Blake Kozak, an IHS Markit smart home analyst,  "Consumers who were on the fence before, they may stay away," Kozak said about users' reactions to this year's privacy issues. "But consumers that use these devices won't throw them away."
The world will be a very different place when Google, Amazon, Microsoft, Apple and other AI-empowered players have assembled first-party profile data that includes our agency. It will make what they do with our current behavioral profiles look like primitive data processing.We are predisposed to pay for convenience. We happily do it with cash and with data every day. However, we should not suspend our judgment about the implausibility of this narrative for convenience or for the quality of our enjoyment. Though this is a story we have been told before, there are no conventions of this medium. So let me be the first to scream: "Look out!"

Dr. Harsha Ratnani

Associate Professor
Department of IT


Thursday 11 July 2019





Sustainability: The Future of Education


We all stakeholders in academics are interested in education; the stakeholders include students, teachers, parents and even employers. It is in the interest of all the stakeholders that education is of high standard but despite all the focus of raising standards changing educational pedagogy we often fail to stop and ask ourselves something that seems quite simple and that’s what the purpose of education is. Education is not only passing exams and getting to the next level that is seeking good jobs but the purpose of education as a whole is on the societal and global scale. Many a times a question arises “Why School exist, what is the purpose of Education”. The answer to these questions are not easy, the answers to these questions need to be resurged. To attained sustainable education system it’s essential to redefine the teaching pedagogy at primary, secondary and higher education levels. One of the potential pedagogy for transforming education system is usage of ICT .The policy makers should promote and encourage on innovations and improvising the quality and methodology of education. The usage of Information Technology in education not only gives different modalities but also include the lifelong learning possible.
A redefined education system is not only theoretical based but is multidisciplinary and research oriented which raises the awareness of sustainability issues such as human rights, environment, gender equality, global citizenship etc..Educational sustainability would make the learning in one sense future ready not only at primary level but at higher studies also.

Dr.Manisha Gupta
Assistant Professor
Department of Management Studies
Jagannath International Management School

Friday 31 May 2019




OUTLINE OF JOURNALISM: AN OVERVIEW


Journalism as a profession includes reporting and gathering, selection and editing, processing and presentation of news and information to an audience. The media that journalism uses vary diversely and include: content published via newspapers and magazines (print), television and radio (broadcast), and their digital media versions — news websites and applications.
The words ‘journalist’, ‘journal’ and ‘journalism’ are derived from the French ‘journal’, which in turn comes from the Latin term ‘diurnalis’ or ‘daily’.
The Growth and development of journalism in India has had a chequered history. In India, journalism has been a product of struggle against the continuing repressive measures of the British rulers over a long period of time. Journalism in India is nurtured by some of the greatest men that this country has produced-freedom fighters, social reformers intellectuals who gave their best to its development and growth. The history of journalism has therefore been inextricably linked with the growth of national consciousness and the progress of freedom movement. In fact the press journalism nurtured the national consciousness and freedom movement in the country and was in turn nurtured by it.
The responsibility and standing of journalism, along with that of the mass media, has undergone thoughtful and reflective changes over the last two decades with the initiation of digital technology and publication of news on the Internet. This has shaped a swing in the utilization of print media channels, as people are gradually more consuming news through e-readers, smartphones, and other electronic devices, taxing news organizations to fully monetize their digital division, as well as manage on the context in which they publish news in print.
The rapid technological changes, which the print media is adapting to survive, has brought about far-reaching changes in the contemporary media scenario. The onslaught of technology is changing the dynamics of news delivery too. Newspapers, once the medium for breaking news, relinquished that role to television. The internet could take that over. Crudely, the new media ecosystem could look like this: the net will break the news, TV will do follow ups and live coverage and newspapers will end up doing analyses.
To conclude: At the present juncture, India, Indian society, Indian press are all in state of transition. The inclination that Indian press is eye witnessing today is bound to gather potency, while some others are bound to surface in the rouse of rapid technological development and innovations.



Ms. Garima Malhotra
Assistant Professor
Department of Communication Studies

Thursday 30 May 2019




Sustainable Development: India’s Role

 The world has enough for everyone's needs, but not everyone's greed,” are the famous words of Mahatma Gandhi . These words are find ubiquity in different forums in the world today. With the fast paced developments in the global economy on one side, there is increasing demand for fossil fuels and land for setting up industrial units. This has led to the fast depletion of our natural resources and indiscriminate use of plastics and polymers. Global concern to further development in a manner that ensures sustainability of the planet reflects the Mahatma’s ideology.
The same philosophy has its roots in our ancient civilization. Our forefathers, the Aryans worshipped nature .They worshipped the Sun, the eternal source of energy. They revered the rivers and all water bodies; the springs and the water falls. They firmly believed that they were the nurturer of all life forms. They also worshipped the trees such as the Banyan and Peepal, the plants such as the holy Basil among others.  They revered animals such as the cow for providing milk and the snakes (for protecting the crops against damage from the rodents).
Hence we find evidence of a philosophy that promoted a harmonious relationship between all life forms. Such a state would ensure that each life form was not threatened and got ample opportunity to thrive and flourish.
With the rapid industrialization and its trickling down effects in every part of the world, we now witness a blind race to achieve more and more even at the cost of other life forms.  Our industrial units and our means of transport that depend on fast depleting fossil fuels are a cause of grave concern. These units also release harmful effluents and gases in the environment which threatens the ecological balance of the water bodies and causes numerous respiratory ailments in humans.
With the cutting down of trees and clearing of the forests, vast stretches of barren lands have been created with little or no rainfall.  These actions have driven several life forms towards extinction.
Besides, the widening gap between the haves and the have nots, have wrenched the hearts of many across the world. They have vehemently promoted that human dignity has to be preserved and maintained for a just and equitable world.
With a background of these issues to be dealt with sagacity, sincerity and serenity, in September 2015, UN Summit was held in New York. It was in this summit that the 2030 Agenda for Sustainable Development was launched. It envisaged “a world of universal respect for human rights and human dignity, the rule of law, justice, equality and non-discrimination”. The concern for environment and respect for all life forms was emphasized in the agenda. All the member nations pledged to adopt measures to build adequate framework to ensure sustainable development.
Hence we find that India has since long been a promoter of the concept of vasudhaiva kutumbakam or universal brotherhood. Since time immemorial, she has been peace loving and looking forward for the measures that promote common good of all. Hence the time is ripe to revisit our rich cultural past, learn our lessons and be the torch bearers for the rest of the world.




Ms Suchitra Srivastava

Associate Professor

Department of Management

JIMS, Vasant Kunj





Thursday 16 May 2019




Sandboxing Technology in Cyber Security



VIRUS (Vital information resource under seize) is a well known word worldwide due to the hazard it creates when it infiltrates the computer system. There are many ways to prevent and avoid the different forms of viruses so that the data can be protected.
Dynamic Malware analysis can be done in two broad ways:
Analyzing the Difference between defined points- Malware sample is executed for a certain period of time and afterwards the modifications made to the system are analyzed by comparison to the initial system state.
Observing runtime behaviour- Malicious activities launched by the malicious application are monitored during runtime using a specialized tool. 
Dynamic malware analysis takes into account API hooking which follows the following procedure:
         To observe a given malware sample’s control flow, we need to access the API functions.
         One possible way to achieve this is by hooking intercepting a call to a function. When an application calls a function, it’s rerouted to a different location where customized code, hook function resides.
         The hook then performs its own operations and transfers control back to the original API function or prevents its execution completely.
         If hooking is done properly, it’s hard for the calling application to detect the hooked API function.
In cyber security, a sandbox is an isolated environment on a network that mimics end-user operating environments. Sandboxes are used to safely execute suspicious code without risking harm to the host device or network. Using a sandbox for advanced malware detection provides another layer of protection against new security threats—zero-day malware and stealthy attacks, in particular and what happens in the Sandbox, stays in the sandbox—avoiding system failures and keeping software vulnerabilities from spreading. Sandbox testing proactively detects malware by executing, or detonating, code in a safe and isolated environment to observe that code’s behaviour and output activity. The CW sandbox outputs a behavior-based analysis; that is, it executes the malware binary in a controlled environment so that we can observe all relevant function calls to the Windows API as a result the report contains scan summary, file and registry changes, network activity and technical details. IT also generates a high-level summarized report from the monitored API calls. The report provides data for each process and its associated actions—one subsection for all accesses to the file system and another for all network operations. Traditional security measures are reactive and based on signature detection—which works by looking for patterns identified in known instances of malware because that detects only previously identified threats, sandboxes add another important layer of security.
Moreover, even if an initial security defence utilize artificial intelligence or machine learning (signature less detection), these defences are only as good as the models powering these solutions – there is still a need to complement these solution with an advanced malware detection.


Ms. Sonali Sharma
(Assistant professor-IT)

Tuesday 9 April 2019




DATA FLOW TESTING

Data flow testing can be considered to be a form of structural testing: in contrast to functional testing, where the program can be tested without any knowledge of its internal structures.Structural testing techniques require the tester to have access to details of the program’s structure. Data flow testing focuses on the variables used within a program. Variables are defined andused at different points within the program; data flow testing allows the testerto chart the changing values of variables within the program. It does this byutilizing the concept of a program graph: in this respect, it is closely related topath testing, however the paths are selected on variables. Various definitions related to data flow testing are:
·         Defining Node: Node n € G(P) is a defining node of the variable v € V, written as DEF (v, n), if the value of the variable v is defined at the statement fragment corresponding to node n.
·         Usage Node: Node n € G(P) is a usage node of the variable v € V, written as USE (v, n), if the value of the variable v is used at statement fragment corresponding to node n. A usage node USE (v, n) is a predicate use (denoted as p) if statement n is a predicate statement otherwise USE (v, n) is a computation use (denoted as c).
·         Definition use: A definition use path with respect to a variable v (denoted du-path) is a path in PATHS(P) such that, for some v € V, there are define and usage nodes DEF(v, m) and USE(v, n) such that m and n are initial and final nodes of the path.
·         Definition clear: A definition clear path with respect to a variable v (denoted dc-path) is a definition use path in PATHS(P) with initial and final nodes DEF (v, m) and USE (v, n), such that no other node in the path is a defining node of v.
Few define/reference anomalies are as follows:
·          A variable that is defined but never used (referenced).
·         A variable that is used but never defined.
·         A variable that is defined twice before it is used.”
The du-paths and dc-paths describe the flow of data across source statements from points at which the values are defined to points at which the values are used. The du-paths that are not definition clear are potential trouble spots. Hence, the objective is to find all du-paths and then identity those du-paths which are not dc-paths. This is known as DU testing Strategy. In this strategy, chance to cover all edges of the flow graph is very high; although it does not guarantee 100% coverage. This is also effective for error detection specifically for DU-paths that are not definition clear paths.


Ms. Snehlata
Assistant Professor
Department of Information Technology 

Monday 8 April 2019


Defence and Media

“The Press is primarily and properly concerned with providing information to the public at home. Civilians are entitled to know everything about war and its peacetime preparation that need not remain a secret through the overriding requirements of military security.”
General Dwight Eisenhower

India is a big country and requires a sustained effort to take care of its enormous defence and security needs. The defence of the nation or preparing for it cannot, however, be the responsibility of the three services only. Parliament and the entire people of the country have to be involved in it. The support from Parliament and the people can be enthusiastic if they are kept informed about what our forces are doing to accomplish the task assigned to them.

The government’s defence information policy is unfortunately restrictive. While a major chunk of the national budget is meant for defence, Parliament, the press and the people don’t really know how wisely this money is spent. Parliament and the media can also be faulted for not giving due importance to defence and for their failure to put sufficient pressure on the government to give more information than it has been doing since Independence. Ignorance and a lack of understanding have thus marked the discussions on the defence-related issues in Parliament and the Press. The debates in Parliament on defence are as sketchy as the reporting in the newspapers. The government’s policy of giving limited information about defence as well as the failure of the Press and Parliament to bring defence under greater scrutiny can prove costly.

Defence is one of the most important aspects of every nation. Before moving forward to Defence one must know what nation is? ‘Nation’ means ‘born’. People born out of the same race came to be known as a Nation. Any nation will be counted as powerful only if it has strong security forces. National security, therefore, implies the security of the nation as a whole. Thinking of security at the national level involves a combination of varied factors. It doesn’t remain confined to a single factor or aspect. A thorough analysis of geographic, political, economics, technological and strategic factors is required to be undertaken while considering national security.

If law of any country is not strong then crime may increase. Similarly if the country doesn’t have enough arms then the country can’t be secure. However, just the arms only do not make the country secure but the public support also make them strong. Public support is ensured when it is adequately informed. Though all the planning can’t be available for public due to safety point of view, still news items related to Defence do appear in newspapers.

During a time of moment worldwide correspondence, governments have refined their open strategy; especially in the manner in which defence issues are shrouded in the media, to advertise their variant of occasions successfully to their residential just as the universal public. For sure, numbness and falsehood are definitely more hazardous for the military than is informed reporting, however critical in tone. In any case, the media need assistance here. Since the press is divided, aggressive, now and again insensible of military substances, and continually whiplashed between the requests of the market and those of journalistic morals, however defined, the nature of inclusion of military activities or events is definitely uneven, best case scenario.

The inclination of ill-equipped journalists, charging from emergency to emergency, unconscious of the issues in question or of how the military capacities, is to outline complex issues in shortsighted ways. As far as concerns its, the military owes access to data both to media and the Indian public. Besides, it needs to get its story out for the military will rival different groups, and foes, anxious to put their "turn" on occasions. To do this, it needs the media.

The government and the armed forces are still ultra conservative about defence information in India. The deep divide between the armed forces and the average civilian debars them from the understanding of the defence of the nation, which is the necessity of the day. To bridge the gap, the press in India, today, needs greater insight into the requirement of defence services and the facts which a reader wants to know from them. After all, news pertaining to defence cover important and major portions of our newspapers. To bring to light the subject in both its pros and cons, neither an army general nor a general reporter can suffice the purpose. This is where a specialist defence journalist steps in.

The comprehension and backing of educated natives is the premise of public trust in the military. Such certainty is fundamental to the successful execution of their military mission to preserve peace and repulse animosity. People in general have to right to complete information about the plans and advancement of the military, subject just to constraints of fundamental security. A learned and unflinching citizenry is as imperative as an exceptionally energetic military force in meeting an animosity. Public comprehend of the consistently changing military circumstance is reliant upon truthful and current status of their defence force. And this understanding can be got about only by an efficient defence journalist.

In India, as elsewhere, the public understanding of the activities of the armed forces is also essential in overcoming the traditional resistance of public to a large military establishment. The need for a strong military force and the funds to support it is not universally accepted by the public. There is a natural desire on the part of tax payers to reduce expenditure on defence. The interest of a military service as a career is not valued by many young men and women. These reasons further emphasize the importance of defence journalism and role in keeping the public informed of the contribution of the services to the peace and prosperity of the nation. The expectations of the public from the media to be its eyes, ears and brains in matters of supreme importance for the stability and life of the nation, are fulfilled by the specialist defence writer.

The defence of India is vital to the lives of millions of men, women and children, to its existence as a nation and to the people of all countries allied with us in the preservation of the freedom throughout the world. Hence it is very essential to feel the pulse of its public on issues pertaining to the armed forces. What does the common man feel about the giant corporation owned by over 900 million citizen shareholders, who are investing their rupees as tax in equipping and operating this largest enterprise in the country?

Not only has the Indian Public its billions at stake in the business of national defence, but thousands have also chosen to make substantial investments of their time and effort serving in the armed forces. So don’t they play an important role in nation building?  If they do, then it gives them the right to get an insight into what is actually ‘Defence of the Nation’.

But this is not the end of the story. In a field where every step forward is followed by two steps backward, it is very difficult for the defence writer to come out with a write up on his own. In the defence set up, where censorship reigns supreme and the press is treated as an unnecessary encumbrance and a necessary evil, to be a good investigative reporter and a prolific writer is not sufficient. Cooperation from the Ministry of Defence and its various establishments and formations is absolutely essential.

So perform his duty of bridging the gap between the armed forces and the public, the press correspondent needs the defence sources to be more communicative. Keeping this in mind and to propagate authentic and objective defence writing, Ministry of Defence, Government of India, has established a Directorate of Public Relations. Official information on matters related to defence policies, goals and interests is provided to the press by its headquarters at New Delhi and the various public relations officers stationed at cantonments and command headquarters.

In Contras, civilians who write on military matters have shown more imagination and perspective than our intellectual generals. The defence journalist has a very significant role in building up the society’s trust in armed forces. Since understanding the basis of trust, the writer can foster this through his writings which enable people to understand the various facets of defence.

Mr. Sunny Gupta
Assistant Professor
Department of Media & Communication Studies

Wednesday 3 April 2019


FUNDS

It costs money to make money!
The backbone of any business is finance. To survive in this competitive world every business needs adequate finance to meet all its requirements. In olden times finance is needed either for acquiring capital assets i.e. to purchase furniture or for the creation of a new office /factory etc or for manufacturing of a new product. . Usually, such manufacturing are funded by internal sources, while funds required to purchase fixed assets are arranged from external sources. But, in today’s scenario the requirement of finance has been changed.  Today , we not only require finance to buy machinery or to develop a new product or to construct the building but finance is also required to buy materials or stock (the goods that are to be sold), to Carry out some market research and do other types of marketing or  to move into new markets etc. The funding of any project/trade is the most basic feature of its management. If the business is able to fund its project in the right manner, then the business will grow in the healthy manner with more cash inflows and more profit. The requirement of funds can emerge at any point of developing business. Funds are required at the time of startups and even at the time of expansion. Therefore, we can say that finance is needed throughout a company's life.
1.CLASSIFICATION OF THE SOURCES OF FINANCE
The funds for the business can be raised by various ways. The kind of business plays an important role in deciding the type of funds required. The big organization will be requiring a large amount of funds as compare with the smaller organizations. Smaller organizations can even use their retained earnings i.e business can be funded with the help of internal funds only. Smaller organization require less amount so they can even borrow from their friends and family members where as the bigger organization require a huge amount of finance so they can go for a bank loan, borrow funds from the financial institutions or even borrow from the general public by issuing shares and debentures.
Some of the sources of finance are shown in Figure 1

                                                                                       Figure 1
The sources of financial requirement of business can be classified as:
Ø  1.1Internal source of finance.
Ø  1.2 External source of finance.
Internal Source of Finance:  It is referred to the money which is raised from inside the business. It includes
Ø  Sales of assets: Sale of assets means selling of business assets to generate funds for the business which have either become old or have become obsolete( not in use for operational purposes)
Ø  Retained profits: Retained earnings are that part of the profit which is earnerd every year but not distributed to the shareholders. It is also known as reserves or ploughed back profits. In the long run such amount can used for funding the business.
Ø  Reduction in working capital: Reduction in working capital means reducing the level of inventory so that some additional cash can be raised for business.
External Source of Finance: It is referred to the money which is raised from outside the business. It includes:
Ø  Long Term Source of Finance
Ø  Medium Term Source of Finance


Dr. Himani GuptaAssociate  ProfessorDepartment of Management Studies