Saturday, December 28, 2019

3 Steps to Craft a Body of Research Paper to Attract the Reader

To create a perfect paper that will both meet all the professor’s demands and will be interesting for the audience who’s reading it, a student has to work really hard. The personal, rich details that you choose to include in your paper have the starring role in making people certain that your paper won’t get boring fast. The body of the research paper needs to be structured in a way that makes it interesting for the audience, and still checking off all the requirements that your professor has outlined in the syllabus. Keep in mind, of course, that your professor is your first reader, and that the more intriguing they will find your paper, the more likely they will want to give you a good mark. 1. Personal Experiences If the requirements allow you to add some stories from your own life, there’s really no better way to draw your reader into the text, as if it is a dramatic tale being recounted around a campfire. Think about it when you want to tell a friend about something new that you have learned, do you begin with the dry facts, or do you start with â€Å"So this morning, I was almost late for a class, because I forgot to set my alarm, but I’m glad I wasn’t, because†¦Ã¢â‚¬ ? Of course, when you frame information with personal lively details, the audience is more likely to get involved. Just make sure that this kind of first-person story is permitted before you include it to your paper. 2. Interesting Facts Since you’ll be going on at length and in details about a very specific topic, try to add some interesting facts to the body of the research paper whenever it is possible. While it’s possible that you find all the facts of your research interesting, think about the details that might be relevant to the readers’ lives. Is there anything about the research that could impact them or anyone whom they love? Is there an aspect of popular culture that you can draw into your research in a relevant way? There’s no shame in making your paper as intriguing as possible, while communicating the necessary facts that your professor has asked for. 3. Numbers Don’t forget about the power of using numbers. Data in numbers can really catch the readers attention, especially if the details attached to those numbers that are striking and the reader couldn’t even predict them. Is there a shocking number of test subjects that haven’t responded to a medication, expected to be highly effective? Are there surprisingly few people who complain about their in-laws when prompted to do so by a researcher in the social sciences? You can make your readers surprised when you hit them with numbers (especially a percentage of some kind) that will get their statistics-loving brain firing on all cylinders. Your carefully conducted research deserves a reader who’s paying close attention to what you’re saying. When you draw them in with stories, interesting facts, and the power of numbers, they’ll be better able to appreciate your research – and you’ll receive a better score for your paper.

Friday, December 20, 2019

Jurisdictional Issues within the Criminal Justice System...

Within the United States’ Criminal Justice System, problems pertaining to jurisdiction issues are quite common due several reasons. The United States v. Thomas J. L Smiley case and the United States v. Jared Lee Loughner case both had jurisdiction issues. Smiley and several other men obtained permission through a license from Mexico to search for treasure on an expedition; the treasure belonged to the steamer Golden Gate, which belonged to the Pacific Mail Steamship Company located within the United States. Ultimately, federal charges were brought upon him from the United States for violating a statue regarding plundering a sunken and/or abandoned ship. In contrast, Loughner had federal charges brought upon him by the United States due to†¦show more content†¦This presents a huge problem for attorneys and legal team of Loughner, as they must ensure he receive a fair and unbiased trial which is one of his fundamental rights as an American citizen. Without receiving an unbiased judge, the fifth amendment of the Bill of Rights within the United States Constitution would be violated. The Fifth Amendment states the following: No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a grand jury, except in cases arising in the land or naval forces, or in the militia, when in actual service in time of war or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation. (Fifth) Due process of law refers to the all citizens of the United States must receive fair treatment from the Criminal Justice system; thus, jurisdiction becomes an enormous issue within the case as the location of the trial and the judge and jury as well, must be unbiasedShow MoreRelatedThe Origins Of Juvenile Justice1385 Words   |  6 Pages1. Describe the origins of juvenile justice, from the house of refuge to the juvenile programs of today. Ans: In the early nineteenth century, the idea of reforming youth offenders took root in the United States. The House of Refuge in New York, which opened in 1824, was the first juvenile house of reform in the United States. This was the first attempt to house juvenile offenders in a separate facility and other States, like Maryland, would soon follow suit. The idea was not to punish juvenilesRead MoreCommunity Justice And Criminal Justice980 Words   |  4 PagesCommunity justice is a broad term that includes many aspects of involving the community. The main goal is to enhance the lives within the community through the creation of problem solving strategies and strengthening the standards within the community by restoring victim’s quality of life, and reintegrating offenders of crimes. Although community justice can be traced back hundreds of years. The model is still considered a nontraditional approach in today’s criminal justice sector. Due to its broadRead MoreOrg anizational Issues and Criminology1605 Words   |  6 PagesIntroduction- When we think of the criminal justice system in the United States, we are referring to a broad collection of federal, state, and local agencies that are focused on crime prevention and upholding the law. In general, these agencies uphold the law at various levels, investigate crime, process the accused, compile evidence, work with the district attorney, and develop profiles and crime prevention techniques. The process of the criminal justice organization is designed to work in conjunctionRead MoreLeading Group Challenges1610 Words   |  7 PagesLeading Group Challenges * Police, courts and corrections are part of criminal justice organizations. Each of these organizations face challenges every day and the leaders of these agencies must deal with these challenges (Duelin, 2010). The types of criminal justice leaders range from police chiefs and sheriffs to prison superintendents, and heads of government, state, or local task forces. Some of the challenges they confront are budget and staffing shortfalls, political perspectives on theRead MoreCja 394 Court Managment Executive Summary Essay853 Words   |  4 PagesLearning Team HERE Contemporary Issues and Futures in Criminal Justice/CJA 394 May 28, 2013 Amanda Behl Overview The American court system is quite daunting and complicated. Consequently, the assistance previous available is no longer accessible resulting from budgetary issues. Therefore, strategic planning goals and management skills are essential to providing an efficient and smooth operating judicial system. Moreover, public education, access to the legal system, access to public court documentsRead MoreJuvenile Justice And Criminal Justice1368 Words   |  6 Pages The border between juvenile justice and criminal justice did not endure the juvenile court’s first century. By the 1980s, there was general disappointment with both the means and the ends of normal juvenile justice. As with every other social repair efforts, it is difficult to say whether frustration with juvenile justice was born of erroneous concept or of wretched execution. The administering accepted by justice policy, however, was unmistakable. Juvenile courts began to adopt the sentiment andRead Morepolicing practices and operations1473 Words   |  6 Pagesdepartmentalized to enhance efficiency and improve communication. Relationships within these organizational structures exist. Partnerships are developed between the community and policing agencies to increase crime reduction and improve order maintenance. The organizational structure of policing agencies will be reviewed along with communication patterns both within and outside of the agency. Current trends and issues facing policing agencies and communities will be examined and an analysis of changedRead MoreCriminal Justice Trends Essay1475 Words   |  6 Pagesto say there weren’t any trends that the criminal justice system was being plagued with. Between gangs, terrorism and crime in general we have a huge problem on our hands rather it be old news and a new crime trend. For the criminal justice system right now the possible retaliation from terrorist and what sort of technology advancement they might come with is going to be at the top of our list. In the past (early 2000) the criminal justice system found problems with a demanding change thatRead MoreDeveloping Good Character And Correcting Deviant Behavior Early Americas Youth1095 Words   |  5 PagesThe Juvenile Justice Court is one of the most important courts of limited jurisdiction in the justice system (Carp, Stidham, Manning, 2012). Developing good character and correcting deviant behavior early in Americas youth is essential to the future generation. According to May and Ruddell (2012), the fist idea of segregating juvenile criminality from adults came about in the early 1800 and in 1899 Chicago was the first city in America to establish a juvenile court. In Georgia, the first childRead MoreDisproportionate Minority Contact739 Words   |  3 PagesDisproportionate Minority Contact Minority youth are disproportionately represented throughout juvenile justice systems in nearly every state in the nation. Disproportionate minority contact (DMC) in juvenile justice occurs when minority youth come into contact with the system at a higher rate than their white counterparts. African-Americans, Hispanics, Asians, Pacific Islanders and Native Americans comprise a combined one-third of the nations youth population. Yet they account for over two-thirds

Thursday, December 12, 2019

Quantitative Risk Analysis In Information Security Management

Question: Describe about the Quantitative Risk Analysis in Information Security Management? Answer: Introduction This is a report on the application of modern information security tools and techniques contrasting in practical scenarios. In order to demonstrate these applications, this report draws a comparison of a failed conspiracy of the late 16th century known as the Babington Plot, famous for the way the English intelligence network managed to use espionage and cryptanalysis to safeguard the throne, and postulates how such a conspiracy would have benefited from modern information security technology. The Babington Plot was a conspiracy to assassinate Queen Elizabeth I and replace her with Queen Mary Stuart alongside a Spanish invasion into England. It was thwarted by Sir Francis Walsinghams efforts over 20 years to establish a valiant spy network and infiltrate the ranks of any potential threats. On account of his spies, Walsingham was able to collect damning evidence against all conspirators, especially Mary Stuart, who was the primary target of his espionage and ended up being executed for her involvement in the plot. The key evidence that made the case was acquired by a security leak in the communications between Mary Stuart and her supporters, both within and outside England, created by Walsingham that allowed him to intercept all such communications. After a detailed breakdown of the shortcomings of the communication channels established by the conspirators, this report presents a postulated scenario of such a plot occurring in the 21st century and how modern technology could play a role in plugging the gaps in the original 16th century plot. Information Security Techniques Used Before discussing the exact techniques employed during the course of the plot in order to establish secure communication, we must first look at the major persons of interest who were directly involved in the line of communication. The following is a brief of these people: Mary Stuart, Queen of Scots: She was a legitimate heir to the throne of England and had been chased out of Scotland by Scottish rebels. She was imprisoned by Queen Elizabeth I for 19 years at various locations and under the charge of various jailers. Sir Francis Walsingham: Then spymaster in the employ of Queen Elizabeth I, he was able to discover the ongoing plot and planted a double agent, Gilbert Gifford, in the line of communication between Mary and her co-conspirators in order to collect evidence against the conspirators thus eliminating Mary from the line of succession. John Ballard: He was a Jesuit priest as well as an agent of the Roman Church who was able to group together a number of other conspirators in a plot not just spanning the assassination of Queen Elizabeth but also encompassing a Spanish invasion of England, deposing Queen Elizabeth (a Protestant) and replacing her with Queen Mary (a Catholic). Anthony Babington: A Catholic recruit of John Ballard, he served the role of a courier for messages between the imprisoned Mary and other conspirators for a duration of time. He was also instrumental in Marys communications with her foreign supporters. Thomas Phelippes: He was a cryptanalyst in the employ of Walsingham and was directly inserted in the line of communication for decoding all letters sent to and received from Mary and making copies of the letters. Gilbert Gifford: A double agent who was originally involved in a previous plot against Queen Elizabeth but was captured by Walsingham and eventually agreed to act as a double agent in order to avoid punishment. Throughout the course of Marys imprisonment, a number of channels and techniques were employed for communication. However, the crux of the Babington Plot was the communication between the conspirators after a July 1584 decree by Queen Elizabeth that prevented all communications to and from Mary, thus also eliminating the possibility of incriminating her in a plot. A new line of communication had to be established, and this was tailor-made by Walsingham to suit his needs. The communications to Mary were received by the French ambassador to England as diplomatic packages. These were passed on by him to Gifford who would then hand them over to Walsingham. Walsingham would allow his cryptanalyst Phelippe to decode and copy the letters, then reseal the letters and return them to Gifford. As per previous arrangement, Gifford would hand this letter to a local brewer who would hide the letters in a water-tight casing inside the stopper of a barrel, thus smuggling them to Mary. The reverse pr ocedure was followed for letters originating from Mary. It is notable that the cipher used in these communications, a nomenclature cipher, was provided by Walsingham himself. The nomenclature cipher was a very popular type of cipher used in the 16th century for secure communication and is regarded as a type of substitution cipher which employs homophonic substitutions. The following is an analysis of this episode from the standpoint of achieving the three goals of secure communication confidentiality, integrity and availability. Confidentiality. The primary device employed by Mary and her conspirators to ensure confidentiality was to encode letters using a cipher which was supposedly known only to the two parties involved in the communication. There were multiple vulnerabilities in their designs. Firstly, the secrecy of the cipher had been compromised. Thus, all their communications were easily decoded and recorded. Secondly, a single cipher was used for all communications which ensured that once the cipher is known to an interceptor, all further messages are insecure. Thirdly, verification of the secrecy of the cipher was difficult to achieve. Even if a single cipher is to be used throughout all communications, if there were a mechanism in place to check if the cipher has been leaked to outside parties, then appropriate counter-measures could have been taken. Integrity. There were no mechanism in place to ensure integrity of messages. Therefore, it was extremely easy for anyone in the communication chain or for someone intercepting messages in the middle of the chain to modify the contents of the messages being conveyed. This was exploited by Walsingham in the instance of a reply from Mary to an authorization request for the assassination plan, approving of the plans of her supporters but not expressing authorization. The original letter was kept by him as evidence and a duplicate letter was forged, in which instructions to reveal the identities of all co-conspirators and their roles was added by him along with authorization to proceed with the plan, and sent to the French ambassador as a letter from Mary herself. Availability. There were minimal considerations given to ensuring availability of the messages, especially from the viewpoint of modern information security. The meandering routes taken for all communication and the long distances to be travelled made it so that, in the absence of any high-speed data transmission technology, the only concern of the conspirators was to ensure secure delivery of messages. Walsingham was keen to ensure steady communication between Mary and her supporters as this was the most important pre-requisite for gathering evidence against Mary. Modern Techniques Now that we have discussed the original intricacies of the plot and the various mechanisms employed for secure communication during the conception of the Babington Plot in the late 16th century, we can proceed to adapt the scenario to the 21st-century. Should a similar scenario arise in the present era, the following adaptations of the original plot are quite probable. Firstly, the communication link would definitely be digital. As the people involved in the conspiracy are distributed far apart from each other geographically, it is only logical that digital communication media, most likely the internet and e-mail, would be employed. Secondly, due to the addition of high-speed computing in to the mix, both the cryptography and cryptanalysis techniques would be significantly upgraded. Instead of a simple substitution cipher, which can be easily cracked using computers, a more sophisticated encryption algorithm would be used. Thirdly, the role of Gilbert Gifford would experience a notable change. Modern day message carriers, the role previously played by Gilbert Gifford, are computers and not people. Thus, it is highly likely for Mary to communicate directly with Babington and other conspirators without needing Gifford to relay her messages. It is thus more likely for Gifford to only receive copies of their exchanges for the purpose of managing logistics or such, if at all. The other people and props involved purely in communication of messages, such as the brewer and his beer barrels, can be imagined to have been replaced by e-mail Servers and electronic devices hard-wired with communication protocols. Fourthly, new security concerns arising out of usage of modern technology will need to be addressed. Most of these are modern day complications, derivations or branches of existing security issues which have been born due to the advances in technology, for example new forms of social engineering attacks. Therefore, to imagine the enactment of the Babington Plot in the modern era such that Mary Stuart and her fellow conspirators would strive to establish a secure line of communication via modern e-mail technology, it can be postulated that these techniques would be employed: Mail Transfer Agent (MTA). This is a modern day take to the brewer and his beer barrel from the original plot in the 1580s. Messages are transferred between the conspirators using a well-known MTA as this ensures that the MTA will ensure many aspects of secure transmission, including a measure of confidentiality, integrity and most importantly availability. In the modern day, digital transmission of data should be almost instantaneous and availability of message transmission services as well as transmitted data is a huge concern. Therefore, relying on a well-established and publically respected MTA is recommended. Authenticated Encryption. Authenticated Encryption (AE) is a data encryption technique which employs a block cipher to simultaneously provide confidentiality, integrity and authenticity. Some of this is redundant but recommended nevertheless with the usage of an MTA. An example of an AE would be combining a Message Authentication Code (MAC) with another data encryption function. A MAC uses the concept of a secret key shared between two end-users to ensure authentication and data integrity by using this key to generate meta-data (hash) specific to the key and the original data. Thus, any changes to the data or any differences in the key used for generating the hash will cause a mismatch with the original hash. In addition to this, the original message is encrypted using a data encryption algorithm (e.g. AES) and the MAC may be generated before or after encryption. Key Distribution. This is one of the greatest concerns of modern day information security. In the case of asymmetric encryption algorithms, public key servers have been able to resolve this issue in large parts. Symmetric key encryption algorithms are trickier in their needs for secure distribution of keys and this is often achieved by first establishing a secure communication line with the help of asymmetric keys. As was mentioned in the shortcomings of the original communication line in the Babington Plot, using a single cipher (or in this case key) for extended periods of communication causes vulnerabilities to arise and thus it is recommended for the key to be changed on a periodic basis. Conclusion and Recommendation The study and analysis of the circumstances and facts surrounding the Babington Plot have revealed that concerns regarding secure communication have been carried down from several centuries ago to the modern day. Emergence of new technology has changed the way these concerns apply to real life, and has introduced new forms and factors that affect these applications, but the basic concepts of confidentiality, integrity and availability are largely unaffected. The Babington Plot was thwarted by the presence of a large number of security leaks. These leaks were a product of the extensive spy network established by Sir Francis Walsingham and demonstrated that while the conspirators were committed to their cause, they were unable to outsmart their enemies. Thus, it can be said that the conspirators lost the information war, a term which is generally associated with the Information Era or the 21st century, but definitely holds true even for a case from the 16th century. It is thus highly recommended for any endeavor that requires secure communications to check and re-check all their communication links for conformity to the basic standards of information security. The techniques highlighted in this report are some suggestions that could benefit secure communications but should not be regarded as the entire gamut of security measures available in the modern day. The information war, between spies and counter-spies, guardians and hackers, thieves and security forces, is constantly on-going and ever-changing in form. Thus, caution and awareness are the only reliable tools to step towards victory. Reference Pachghare, V. K. (2015).Cryptography and information security. PHI Learning Pvt. Ltd.. Oppliger, R. (2015). Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.IEEE Security Privacy, (6), 18-21. Rebollo, O., Mellado, D., Fernndez-Medina, E., Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework.Information and Software Technology,58, 44-57. Jajodia, S. (2015). Advances in Information Security. Chen, X., Zhang, Z., Chen, H. H., Zhang, H. (2015). Enhancing wireless information and power transfer by exploiting multi-antenna techniques.Communications Magazine, IEEE,53(4), 133-141. Ab Rahman, N. H., Choo, K. K. R. (2015). A survey of information security incident handling in the cloud.Computers Security,49, 45-69. Kenkre, P. S., Pai, A., Colaco, L. (2015). Real time intrusion detection and prevention system. InProceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014(pp. 405-411). Springer International Publishing. Haya, G. M. (2015, June). Complexity Reduction in Information Security Risk Assessment. InProceedings of the 2015 ACM SIGMIS Conference on Computers and People Research(pp. 5-6). ACM.

Wednesday, December 4, 2019

The Value Of The Real Estate Business †MyAssignmenthelp.com

Question: Discuss about the Value Of The Real Estate Business. Answer: Introduction Real estate business is one of the most lucrative businesses in the world market today. Investors tend to change from temporary/ short term investment to a permanent investment (Spertino et al, 2013). As compared to other businesses, real estate business in most of the cases experience continuous increase in the value. The business involves both buying of a bare piece of land and selling, putting up a house structure on a piece of land then sell and also just buying and selling of already built houses. The value in the real estate business tends to be appreciating all the time due to value increase in the pieces of land (Tiwari White, 2010). Before venturing into real estate business, there are various factors that the business people need to consider just like in other normal business opportunities. Negotiation skills are some of the required attributes for those aspiring to engage in real estate business or those who already are running the business (Rothaermel, 2015). These skill s are deemed important in this kind of business especially when negotiating prices with the willing buyers and the willing sellers. On top of that, prior knowledge about the trending price is as well helpful for they act as the reference point at the time of negotiating prices with the customers so that prices are not overstated or understated (Bewayo, 2015). Another key factor to consider is the population of the location of the business. Population is always allied with good business performance (Graham et al, 2011). As a result therefore, highly dense populated areas tend to have businesses thriving well than those in less dense populated areas (Hahan et al, 2011). The business was then chosen to be situated and operate in five cities such as Belton, Terratae, Mount, Domaine and Hills. The services that will be rendered by the real estate agency in these cities will be buying pieces of land, constructing houses, renting out houses, leasing houses and selling the built houses to the willing buyers. Since the business is from new investors and the business is still new, thorough market research incorporated with advertisements should be held viable to make the business have wider coverage in the cities. Televisions, radios, newspapers, magazines, social media and other platforms should be engaged in carrying out the advertisement to crea te awareness to the public to expand and win the trust of the customers. Advertisement will also ensure that wider market is covered and that the business stands a better chance of competing with the competitors favorably (Wagner et al, 2013). In connection to that, advertisement will wipe off the middlemen from the channel. As a result therefore, to have all of these done, more man power have to be engaged in the business and the more the number of workers, the larger the size of the business. In this case, the business size will be relatively big since more professional services will need to be hired. The prospected customers for this business are the residence and the willing investors who would be looking for apartments for hire in the cities. Research questions In order to identify and know what happened in the previous market in the previous years, data was collected covering the location of business (cities), the number of bathrooms houses in the cities were having, the number of bedrooms, the total number of rooms houses had in the cities, the advertisement cost and the prices that were labeled against the house in different cities. Data was to be used to construct research questions that would be helpful in identifying the behavior of the market and to find the strategies to venture into the market in the defined cities. Some of the objectives that were identified in this report were to determine if there was relationship between the listed cost and the final sale of the houses. Secondly comes to determine the relationship between all rooms the houses had and the listed cost and lastly, to determine the relationship between all the rooms a house has and the final sale. All these stated objectives will only be met if the research questio ns are answered. The first question then becomes; Which is the best city to invest in among the five sampled cities? Cost labeled against every product is one of the determinants of the value the product hold. Depending on the persuasive and the bargaining power of the involved parties in the buying and selling process, the listed cost can at sometimes be higher than the final sale. In the case where the listed cost is lower than the final sale, then it is either the product has been sold at a discount or the buyer had higher bargaining power than the seller. And if the real estate product had higher final sale than the listed cost, then it is either that the value of the real estate product had appreciated due to some added values to the product or the seller had higher bargaining power than the buyer. As a result to that therefore, we are interest to have a question that Is there relationship between listed cost and the final sale? Responding to this question will help the owner of the business know how to treat the two or consider them at any time they are making any transaction. It is in the minds of the many without proof that a house with the highest number of rooms will have the highest listed cost as compared to others that were having less number of rooms. To ascertain the change and the effect, this report is therefore bound to answering the question Is there a relationship between (All rooms) and the listed cost of the houses in the cities? Any sort of relationship that is found existing between these two variables will mean that any change in the number of rooms will definitely have effect on the listed cost. Lastly, we have also sparked interest in determining the relationship that exist between all rooms a house has and the final sale of the house. As a result therefore, we pose a question: Is there relationship between all rooms a house has and the final sale of the house? response to this question will also be viable to the decision makers of the business in that they will be required to consider the number of rooms a house has in labeling the final sale of the house irrespective of whether the buyer has higher bargaining power than him/her. Selected statistical methods Some of the selected statistical methods for use in this research were Pearsons correlation coefficient (r). This statistical method will help to identify the relationships that exist between variables to be tested as stated in the research questions. The value of r will show whether or not the relationship was strong positive if the value of r is positive and close to 1 or strong negative if the value of r is negative and close to -1 (Keith, 2014). The hand calculation of Pearsons coefficient will be as follows; Descriptive statistics such as the mean, variance and standard deviation of the collected quantitative data will be calculated as shown below; Mean = where i= 1, 2, 3, where n is sample size Mean will be calculated for listed cost and final sale for the sampled cities. Mean is important in determining the characteristic of the dataset (Schielzeth, 2010). To calculate the variance denoted by (S2) for the sample of the data from the dataset and it was done as follows; Variance (S2) = where from the formula, standard deviation is now the square root of variance and it is denoted by letter S when it is calculated for a sample. S = The dataset will also be represented in figures such as the scatter plot and box and whisker for the variables of interest i.e. listed cost, final sale and all rooms. The scatter plot will help us visualize the trend line between the plotted variables whereas the shape of the data represented in the variables will be shown in box and whisker plot. Technical analysis In response to question one, the line graph was used to compare how the listed cost and the final sale was changing with the sampled cities. As a result, final sale was slightly above the listed cost in most of the cities. The cost were seen appreciating in Belton city and the trend even continued to shoot higher in Domaine city. A sharp drop was recorded through to Hills city and remained almost constant at all the time when data was being collected. In Mount city, the listed cost and final sale were slightly increasing and higher than that in Hills where lastly, both the final sale were still on the rise in Terratae city with listed cost taking a sharper increase than Final sale. Bedrooms Bathrooms All rooms Listed ($000) Final Sale ($000) Advertising expenditure ($000) Bedrooms 1 Bathrooms 0.816468 1 All rooms 0.947519 0.930913 1 Listed ($000) 0.898309 0.891372 0.954659 1 Final Sale ($000) 0.880324 0.9083 0.950101 0.980465 1 Advertising expenditure ($000) 0.696894 0.62631 0.726355 0.76513 0.757146 1 The correlation coefficient (r) for the test of relationship between listed cost and final sale was 0.980465 showing that there almost perfect positive correlation between the two variables. This means that the higher the listed cost the higher the final sale, this responds to the second question. Similar test was conducted to test for the relationship between all rooms and the listed cost. The value of r was 0.954659 indicated near perfect positive correlation and that increase in the number of all rooms leads to an increase in the listed cost. This responds to the third question. In response to the forth question, correlation was tested between all rooms and final sale and the value of r was found to be 0.950101 that showed near perfect correlation. This can as well be interpreted to mean that higher number of rooms attracted higher final sale. All rooms, listed cost and final sale showed positive skewness and that higher were more than lower costs. The scatter plot above was to confirm for the strength of the relationship between final sale and listed cost that was shown to be at 96.13% and that most of the plotted points were concentrated around the trend line. All rooms showed to have influence on the final sale. From the collected data, relationship between the two variables was found to be at 90.27% as indicated by coefficient of determination (R2). Results and discussions From the research questions in response to question one indicated that it was crystal clear that in the previous years the business performed particularly in Domaine city. The prices of the real estate products were the highest and stood high as compared to other cities. It was therefore an advice to John Hikins and George Main real estate agency to prioritize Domaine city as the best destination for venturing real estate business. As opposed to that, Hills city recorded the lowest real estate business performance with no significant signs of showing increase in the trend as from figure 1. As a result therefore, the real estate agency is advised consider other cities over it and if at all it is to be considered, then it should be based on other factors otherwise it should be given low priority. Terratae is another city that had shown sharp price increase of the real estate products and the graph still shows that the trend was to continue for some time in the future. This makes the ci ty one of the best investment places for real estate business. The number of rooms (All rooms) in the cities were found to have influence in both the listed prices and the final sale for the houses. Due to that, near perfect positive correlation was recorded in the test of relationship between all rooms, listed cost and final sale. The coefficient of determinant showed all the strengths at over 90% to mean that all the tested relationships had near perfect positive correlation. References Bewayo, E. D. (2015). Uganda entrepreneurs: why are they in business.Journal of Small Business Strategy,6(1), 67-78. Graham, J. R., Hanlon, M., Shevlin, T. (2011). Real effects of accounting rules: Evidence from multinational firms investment location and profit repatriation decisions.Journal of Accounting Research,49(1), 137-185. Hahn, E. D., Bunyaratavej, K., Doh, J. P. (2011). Impacts of risk and service type on nearshore and offshore investment location decisions.Management International Review,51(3), 357-380. Keith, T. Z. (2014).Multiple regression and beyond: An introduction to multiple regression and structural equation modeling. Routledge. Rothaermel, F. T. (2015).Strategic management. McGraw-Hill Education. Schielzeth, H. (2010). Simple means to improve the interpretability of regression coefficients.Methods in Ecology and Evolution,1(2), 103-113. Spertino, F., Di Leo, P., Cocina, V. (2013). Economic analysis of investment in the rooftop photovoltaic systems: A long-term research in the two main markets.Renewable and Sustainable Energy Reviews,28, 531-540. Tiwari, P., White, M. (2010).International real estate economics. Palgrave Macmillan. Wagner, T. M., Benlian, A., Hess, T. (2013, January). The Advertising Effect of Free--Do Free Basic Versions Promote Premium Versions within the Freemium Business Model of Music Services?. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 2928-2937). IEEE.