Sunday, May 17, 2020
A Report On Tick Tock - 1177 Words
Tick-Tock 1 Every day brings a new surprise and this day sure brought a good one. The thing that I dealt 1with that day was something I never would imagine happening to me or anyone in a million years. I 2 was home with just my two brothers. It was an ordinary summer afternoon. The wind blowing, the 3birds tweeting. Not a problem in sight. Until I took a short nap and rose a few hours later. My eyes 4quickly opened to a vexatious sound. A continues ticking which messed with my head. Tick-tock 5tick-tock over and over again. I took a deep breath and calmed down for a second. Then, the 6monstrous noise hit me again. I couldnââ¬â¢t take it anymore. I got up off of the bed and intensely ran into 7my brother s room. 8 ââ¬Å" Wade, Wade do you hearâ⬠¦show more contentâ⬠¦29ââ¬Å" KATIE!!!â⬠Wade screeched. 30Ignoring Wade once again, I hustled down the stairs. I expeditiously left my house, slamming 31the door behind me. Out in my dadââ¬â¢s garage, I grabbed a hammer and then dumped the bag of 32watches out on the floor. I deathly gripped the hammer and smashed each watch one by one. After I 33had finished, I piled the watch scraps back in the bag and grabbed a shovel. I ran to the side of the 34house and dug a small hole where I buried each and every watch. After I was done, I returned my 35items and went back inside and I swear that the ticking went away for a few minutes, but the 36moments of glory didnââ¬â¢t last long. Suddenly, the deplorable sound started again. I cringed. I took a 37deep breath and thought for a second. Then, something in my kitchen caught my eye. A clock. 38How could I not know that a clock in the house was making the noise! Relief struck me like 39lightning, powerfully and quickly. I skedaddled and grabbed the clock I had originally spotted. After, 40I collected the few other clocks that hung in my house. Once more, I flew out the door to get the 41hammer. Just like before, I smashed each clock to its death. Just like you do to people, I buried the 42clocks right by the watches I earlier put in the ground. When I walked back, I had high- hopes that 43the ticking would be gone, but this time it didnââ¬â¢t even go away for a second! Right when I walked in 44the door tick-tock flew into myShow MoreRelatedAdvanced Micro Devices Inc: Business Analysis and Recommendations1741 Words à |à 7 Pageshave taken place since the revenue dropped. Advanced Micro Devices Inc announced that for fourth quarter of 2012, it expects revenue to decrease 9%, plus or minus 4%, sequentially. According to I/B/E/S Estimates, analysts are expecting the Company to report revenue of $2.4 billion for fourth quarter of 2012 (Advanced Micro Devices Inc Comments On Q4 2012 Revenue Guidance, 2012). Furthermore, there has been two rounds of lay offs this year t o cut down on operating expenses. This second round of lays offRead MoreTorture: Why It Should Stop800 Words à |à 4 Pagesinformation, enemy resistance and utter uselessness. Tortured prisoners give false information. One writer writes ââ¬Å"Many survivors of torture report that they would have said anything to make the torture stop.â⬠(Mayer, 2005; McCoy, 2006) Another says that ââ¬Å"We had people who were willing to confess to anything if we would just stopâ⬠(Andersen). The NY times reports that in 2002, A Syrian born Canadian named Maher Arar was stopped in an airport and was interrogated. He was later sent to a prison whereRead MoreCitizen 2000: Helping Out the Community952 Words à |à 4 Pagesinsight into the world on modern day policing. He knew that some of the rules were meant to be bent or even broken for the sake of getting his job done properly. Never the less, his gut feeling told him it wouldnââ¬â¢t help him at the annual review. ââ¬Å"Tick-tock, buddy,â⬠said Micky. ââ¬Å"Fine letââ¬â¢s just go. But if we end up on suspension for this Iââ¬â¢ll never talk to you again.â⬠ââ¬Å"Ha-ha, you got it, man.â⬠The car sped out of the car park and back through the small winding streets and finally out onto the carriagewayRead MorePersonal Narrative Reflection Paper1526 Words à |à 7 Pageshere. My mother was in the courtroom along with my dad arguing: who deserved guardianship and how much child support should be paid.(Citations) I contorted myself in a chair and waited for what seemed like an eternity for the judge to summon me. ââ¬Å"Tick Tockâ⬠overtook the room due to the clock. I did not realize how long I had been sitting there, and I was soon in the courtroom. I timidly entered into the wood-filled room, and I spotted my dadââ¬â¢s first cousin, Court Poore, and looked around for anotherRead MoreInfluential Factors of International Business and International Business Environment4145 Words à |à 17 PagesConditions on Business Environment let us take the following example. The report in Business Population Monitorà from chartered accounting and business advisory firm PKF, in conjunction with Access Economics examines the impact of demographic changes on the Australian business landscape, detailing the anticipated winners and losers across industry types and geographical regions. The Beneficiaries of ââ¬ËGrey Goldââ¬â¢ The report highlights the prognosis that Australiaââ¬â¢s working-age population is expectedRead MorePros And Cons And Pros1825 Words à |à 8 Pagesis as small as a rice grain and may come in other forms such as, a ring or other type of jewelry if you do not want the chip to be implanted inside your body. (Maggie Astor, Microchip Implants for Employees? One Company Says Yes) â⬠¢There are no reports of the chip causing harm in the human body, however, only the employees of the company have been chipped. (Maggie Astor, Microchip Implants for Employees? One Company Says Yes) â⬠¢There is no need to carry around your credit card or other informationRead MoreLeadership Qualities Of The Great Leaders Of Our Time1833 Words à |à 8 Pagesin the morning anxiously awaiting for the day to begin, along with the other 80 or so of us trying desperately to get some sleep before our first full day. The anticipation was as thick as a morning fog rolling in on the eastern seaboard. Every tick-tock of the wall mounted clock could be heard over the thunderous snoring from a dude at the other end of the compartment. I had no idea what to expect or what was expected of me over the next eight weeks. Somewhere in the middle of This was my choiceRead MoreCase Study2264 Words à |à 10 Pagesexamined it closer. Yes, Sir. What does the first line say? Boffins hand shook as he held the paper. Ive read your last school report,ââ¬â¢ said Doctor Pax, as he opened the folder on his desk. ââ¬ËYet, I see you excelled in all subjects apart from one. Boffin gulped. Care to tell me which subject that was? Boffin bent forward to study the floor. Shall I read this report? You received top marks for maths, Gloriana, and all the sciences. Oh yes, here it isâ⬠¦foreign languages E. You failed. Despite excellentRead MoreGlobal Business Management: Current Trends and Practices5739 Words à |à 23 Pagesproviding services in the anticipated operating environment. TRENDS IN CONTRACTUAL ISSUES Organizations are generally concerned with contractual issues such as scope of service, performance standards, security and confidentiality, controls/audits/reports, sub-contracting, dispute resolution, and indemnification. The level of detail and importance of contract provisions varies with the scope and risks of the services outsourced. Contracts describe the rights and responsibilities of parties. SpecialRead MoreBank of Queensland Research Paper Banking Industry21330 Words à |à 86 Pagesthe Annua Report 2011, loan 0. al 2 ns and a advances a amortiz costs c at zed comprised 83.4%. A high pro d oportion o the said loans an of d nd advan nces at am mortized c costs comp mprised res sidential securitiz proper loans secured b zed rty by mortg gages ($m 24,177 ) f followed b commer by rcial loans ($m 4,986) as detai in the notes to th iled he finan ncials of the 2011 an e nnual repor (2011 An rt nural report, page 75 5). tated in th Chairm he manâ⠬â¢s report (BOQ Annual Report, 201 and
Wednesday, May 6, 2020
A Norm Is A Rule Of Behavior Of Individuals In Society
A norm is a rule of behavior of individuals in society or groups, Emile Durkheim sociological founder considered norms to be social factors that exist in individualââ¬â¢s society of independence that creates the shapes of our behaviors and thoughts (Crossman, 2017). In the terms of not having sociality without social control the society would have no function without enforcing social orders that make daily life and the complex division of labor possible (Crossman, 2017). Social order is produced by ongoing life longs process of socialization that individual experience. Through the process of stages of growing up when we are taught the norms, behavioral rules and appropriate interaction that is common to our families. The process of howâ⬠¦show more contentâ⬠¦Emile Durkheim developed the first mod ern strain theory of crime and deviance, but Mertonââ¬â¢s classical strain of theory came to dominant criminology during the middle part of the 20th century (ââ¬Å"Strain t heories - criminology - Oxford bibliographies - obo,â⬠2017). Classic strain theory focuses on the type of strain involving inability to achieve success or focused on a broader goal of the middle-class status (ââ¬Å"Strain theories - criminology - Oxford bibliographies - obo,â⬠2017). Robert Agnew developer of general strain theory in 1992, becoming the most leading version of strain theory and major theories of crime (ââ¬Å"Strain theories - criminology - Oxford bibliographies - obo,â⬠2017). General strain theory focuses on a wide range of strains including the inability to achieve a variety of goals, loss of balanced passions ad negative treatment by others (ââ¬Å"Strain theories - criminology - Oxford bibliographies - obo,â⬠2017). General strain theory deviates the explanation of race, gender, ethnic, age, communities and society differences in crime rates (ââ¬Å"Strain theories - criminology - Oxford bibliographies - obo,â⬠2017). People that gravitate to general strain theory are more likely to relieve less support that increases the crime of rate. Differential association theory wasShow MoreRelatedThe Concept of Sociological Perspective of Deviance Essays1127 Words à |à 5 Pagesof Deviance also known as ââ¬Å"rule-breakingâ⬠behavior or ââ¬Å"counter cultureâ⬠can be defined as culture norms, values, and morals which shape the social acceptance of individuals or group through their actions or ââ¬Å"unmoral or illegalâ⬠behavior. In order to gain a better understanding of Sociological Perspective of Deviance it is important to understand the broad consensus of behavior and its place in society. Situational deviance pertains to a group who engages in behavior that is considered ââ¬Å"non- defiantRead MoreWhy do people comply to social rules and expectation.1570 Words à |à 7 PagesWhy Do People Comply With Social Rules and Expectation? Rules are statement on what can, should or must be done in particular circumstances. They govern our daily life whether we are aware of them or not. Rules are divided into two, direct rules(written formal rules) such as laws regarding manslaughter or incest and indirect rules(unwritten informal rules) such as norms, values and traditions of a particular society. Social expectation serves as a powerful tool to reinforce common beliefs and hopesRead MoreEmile Durkheim s Theory Of Anomie1144 Words à |à 5 Pagestypes of norms in societies that cause crime. He explains that social norms are an agreement of some people who live in that geographical location. Conservative societies incline to have less population and be more oppressive. If certain behavior goes against social norms, then severe punishment can ensure to reject the behavior. In opposite case more advanced societies allow more facilities for different behavior and accepts changes. Behavior against the norm is tolerated in a dvance societies. DurkheimRead More Deviant Behavior Essay1653 Words à |à 7 PagesDeviant Behavior Deviant behavior refers to behavior that does not conform to norms, does not meet the expectations of a group of a society as a whole. After birth, children begin to experience situations with others. They are taught what he or she should and should not do, what is good or bad and what is right or wrong. Learning habits that conform to the customs and traditions of the groups into which the child is born develops a system of values. These values provide justification and motivationRead MoreSocial Control Theory Essay1247 Words à |à 5 Pagesin crime and deviant behavior. Unlike theories that seek to explain why people engage in deviant behavior, social control theories approach deviancy from a different direction, questioning why people refrain from violating established norms, rules, and moralities. The theory seeks to explain how the normative systems of rules and obligations in a given society serve to maintain a strong sense of social cohesion, order and conformity to widely accepted and established norms. Central to this theoryRead MoreSocial Deviance Is Based On The Violation Of Social Norms1721 Words à |à 7 Pagesis to examine the concept of social deviance, which is based on the violation of social norms. Depict the social construction based o Becker and The moral entrepreneur such as rule creator and ruler enforcers. To the extend of why rules are created, based on the evolving of the society based on social panic. How society are being brainwashed by the news to place pressure on higher authority in put some rules about. Social panics according to Cohen and the seven stages of a moral panic. FurthermoreRead MoreThe Purpose Of Paper Is To Is Examine The Concept Of Social1722 Words à |à 7 Pagesto is examine the concept of social deviance, which is based on the violation of social norms. Depict the social construction based o Becker and The moral entrepreneur such as rule creator and ruler enforcers. To the extend of why rules are created, b ased on the evolving of the society based on social panic. How society are being brainwashed by the news to place pressure on higher authority in put some rules about. Social panic according to Cohen and the seven stages of a moral panic. FurthermoreRead MoreGang Affiliation and Social Factors Underlying their Deviant Behavior1460 Words à |à 6 PagesWe have discussed gang affiliation and the social factors underlying their deviant behavior, however, the motives for why people engage in this deviant behavior have different sociological theoretical explanations. I will use the following theories to interpret and analyze this cause of deviance. Functionalist theory/perspective The Functionalist theory through the studies of Durkheim, states that society is comprised of a greater network of parts that contributes to its stability. The functionalistRead MoreDeviant Behavior Essay1674 Words à |à 7 PagesDeviant behavior refers to behavior that does not conform to norms, does not meet the expectations of a group of a society as a whole. After birth, children begin to experience situations with others. They are taught what he or she should and should not do, what is good or bad and what is right or wrong. Learning habits that conform to the customs and traditions of the groups into which the child is born develops a system of values. These values provide justification and motivation or for wantingRead MoreA Norm Is A Standard Behavior That Is Expected From A Group1130 Words à |à 5 Pages A norm is a standard behavior that is expected from a group of individuals. People must live by the expectations that their culture has set for them. Culture s eems to have a major influence on peopleââ¬â¢s cognition. Ethan Watters believes that culture influences people. In ââ¬Å"Being Weirdâ⬠, Watters explores anthropologist Joe Henrichââ¬â¢s research on how culture shapes the world around us. Julia Serano also talks about culture in her essay ââ¬Å"Why Nice Guys Finish Lastâ⬠. Serano addresses how sexuality
Tuesday, May 5, 2020
Understand The Use Of ICT Samples â⬠MyAssignmenthelp.com
Question: Discuss about the Understand The Use Of ICT. Answer: Introduction The purpose of the report is to understand the use of ICT in the business scenario. In the modern day, every business organisation needs to use technology in order to enhance itself and make the product available to the customers. This can help the organisations to gain a competitive advantage in the market (McDermid, 2015, p.45). The report focuses on the application of ICT on a specific organisation. The company in question is a 5-year-old software organisation based in Melbourne. The organisation develops an in-house application and has its market spread across the small and medium sized industries in the country. However, there is limited scope for development for the organisation hence; the option of developing internet security is a top priority. One of the strategies developed by the company is the expansion of business to have an online presence. The executive managers of the organisation are concerned with the type of business that goes on in the market. The potential client for the organisation could be pharmaceutical and hospitality industries. The concern is more on the economic factors rather than the social-economic and environmental factors. The report analyses the ways by which such an organisation can protect itself from the risk of internet security. The application of modern internet security is described in the report. The objective of the report is to investigate the ways by which ICT can be used in order to gain a competitive advantage in business. The organisation is a software company and as a result, it is important for every member to develop acute knowledge about the application of ICT and its uses in the modern world. The uses of the application in order to expand the organisation in the global market are also stated in the report. Furthermore, the report also provides recommendations based on the ways by which the use of ICT can be improved by the organisation. Concept of information and network security Network security is referred to as the actions undertaken by an organisation to prevent any security threats in the software or computers. In the modern world, there have been several instances of breached security services. This occurs due to poor anti-virus and improper monitoring of the software and computer systems. The information and network threat usually occurs during the time of data transfer. According to Bannister Connolly, (2014, p.119), the data transfer can be in the form of both physical as well as electronic. In most cases, data transferred via electronic media is prone to security threats. Network security usually comprises of policies and practises that prevent the threat of unauthorized access to the computer system. The accessibility is monitored and the ways by which these threats can be prevented or mitigated are accessed by the professionals in-charge of the online security system. Markus Mentzer, (2014, p.353) stated that network security is mainly used for the authentication of data. It is a one-factor authentication, as it requires a sole variable for the authentication of data. After the authentication, the data is encrypted with a firewall that prevents the entrance of any threats in the system (Stallings Tahiliani, 2014, p.90). In the light of this statement, it can be said that the firewall needs to be strong and need to have the potential to prevent a threat of the software. Without a proper firewall, the threat of security can be immense. In the modern days, the use of anti-virus software can prevent a threat of attacks. Another immensely important factor that needs to be done is the update of the software. Stahl et al., (2013, p.435) stated that the backdated software is prone to threats from the viruses and hackers. With the quick update of technology in the modern world, it is necessary that the software remain updated to prevent the entry of viruses. In this regard, it can be said that several applications are developed th at prevent the threat of security in the software. Recent technologies used in information and network security In the modern day, the threat of virus and hackers has been a major concern for industries. This is because lots of valuable information is taken away from the organisations that can pose a huge opportunity for the competitors. Not only business, the threat also engulfs the military database that may threaten a country. Hence, Stahl et al., (2016, p.55) stated that technologies need to be developed that can help in the protection of threats in the organisation. Some of the most recent technologies that are used in the security of information and prevention of security are provided. Symantec Advanced Threat Protection Symantec Advanced Threat Protection (SATP) is used for the purpose of uncovering, prioritising, investigating and providing remedial measures to advanced threats that occur in an organisation. This can be done under a single window and can provide resistance to the threat of any security (Chen Zhang, 2014, p.314). The technology also involves cloud-based sandbox and detonation services in order to provide services related to cross point control. The visibility allows customers to check into any security threats and make rectifications based on the threat. ProtectWise Cloud Network DVR According to Hall, (2014, p.21), the ProtectWise Cloud Network offers visualisation, detection and responses to network security events. This includes advanced persistent threats, data filtration and so on. The software detects attacks automatically and prevents the spread of the attack. The advantage of this technology is that it can detect an attack on any device such as computers or mobile phones. It does not have any limit about the window of retention for a network. Fireglass Threat Isolation Platform Firewall is one of the pioneers of isolation technology. This software can be used to fend off malware and phishing threats from the computer. Al-Saggaf et al., (2015, p.235) stated that this software creates a gap between the attacks developed from the web and the applications. Any threat from the web is blocked instantly in order to prevent threats of attack. This provides security for the computers as well as other devices that detect possible threats. Application of these technologies in the organisation Based on the use of this software it can be said that the application of these can help in the improvement of any organisation. In the case of the organisation mentioned in the case study, the use of the software can help it to attain its objective of diversifying the business. The reason for the inability to perform this task was due to the lack of resources to manage the websites and client database. In order to perform this task in an efficient manner, the use of the modern technologies and software related to prevention of web-based threats can be utilised in order to carry the company in a global context (Bull, 2015, p.19). For example, the use of Advanced Threat Protection developed by Symantec is software that can identify complex attacks to the system. This can be used in order to detect any virus or hackers that may use complex software to steal information. According to Ming et al., (2015, p.360), this system can be used worldwide in an effort to curb the increase and sprea d of hackers and viruses through various means of malware. On the other hand, technology such as ProtectWise Cloud can be used to detect threats from any devices. In the modern world, this can prove to be a huge advantage for an organisation, as most people tend to use the internet from various devices apart from the computer. Organisations seeking a long-term future in the software industry can utilise this software, as it has a bright future in the software industry. Chou, (2013, p.79) observed that the use of fire glass can also be effective for business. This is because the spread of malware in corporate business settings is blocked by the use of fire glass. Fire glass isolates the threats and mitigates it without the knowledge of the organisation or the system. This creates an advantage as system clean up is not always necessary for the organisations. In the global context, this software can help in the development of a secured web service throughout the world. Advantages and risks of the technologies Pieprzyk et al., (2013, p.343) stated that the technologies used have certain advantages that may be useful for organisations. These advantages provide opportunities to explore the technologies and implement it for better use in the future. However, Hsiao et al., (2014, p.67) stated that certain risks are also involved that may threaten the use of these technologies. The advantages and the risks that the technologies provide can be listed individually. Symantec Advanced Threat Protection The advanced threat protection developed by Symantec provides for the automatic detection of threats in a system. The system prioritises the critical events that may threaten the software and system. Apart from this, even if the system is infected then the technology can provide remedies within a few minutes (Vasilakos et al. 2015, p.10). These advantages provide organisations with proper support and prevention techniques that help to eliminate any threats of a virus. However, the risks that are involved because of this include the use of updated software (Carroll, 2014, p.90). An organisation adopting the use of this software needs to ensure that the system in which they are installing the technology is updated and have the potential to install the software. The high maintenance of the software makes it a risk factor for the organisations implementing the use of the technology. The application of this technique in the organisation provided in the case study can help in the protectio n of the system. The automatic detection of threats is a huge advantage for the organisation as it lacks the required employees to handle the technology. The risk factor needs to be considered in order to ensure that the software can be installed in the system (Perlman et al., 2016, p.56). ProtectWise Cloud Network DVR The advantage that ProtectWise can provide is the flexibility of the coverage of the threats. According to Jouini et al., (2014, p.489), the threat of attacks come from various sources. These sources need to be identified and eliminated in such a manner so that it can help in mitigating the threats of the viruses and hackers. ProtectWise helps in maintaining the flexibility regarding covering large areas in the system. The data that is passed by the use of this technology remains encrypted (Kahate, 2013, p.67). This provides additional security of data in the end. The managing of customers is also done with the help of this software. However, as stated by Hau, (2013, p.99), the challenges to this system are also intense. The use of sophisticated malware can catch the software off-guard. The sudden attack on the cloud-computing model can make it difficult for ProtectWise to make recommendations using suitable solutions. This important factor needs to be considered by the case study or ganisation before implementing its technique. The reason for the failure to detect immediate threat is the vast expansion of range in the domain that makes it difficult to anticipate the threat from the correct sources. Fireglass Threat Isolation Platform The advantage provided by fire glass threat is the fact that the software blocks malware threats from reaching the systems. The uniqueness by which the technology deals with the handling of malware can help it to ensure that the software can be used to detect any threats from viruses. Pathan, (2016, p.89) stated that another advantage that the fire glass is that it increases the productivity of an organisation. This is because employees can maintain their focus on the job that they are doing rather than worrying about the security threat. However, the risk factor that remains is the fact that the fire glass blocks the use of any website that is deemed to be dangerous (Bhargava et al., 2013, p.12). In this regard, any helpful information may not be accessed easily due to issue in accessibility. Hence, the use of this technology in the system needs to be done strategically. In the case of the given organisation, the use of fire glass can help in maintaining the total security of inform ation without having to access online portals. Conclusion Thus, it can be concluded that in order to maintain proper cyber security at the workplace it is necessary that every organisation adopt certain technologies that can help in maintaining proper security in the workplace. The purpose of the report was to analyse the security threats that exist in an organisation and as a result, certain issues were addressed. The issues addressed in this context include the security threats that are posted by the hackers and viruses. This can cause problems in an organisation as secret documents can be seized. These technologies need to be verified and tested before its application in the organisational context. Every organisation needs to verify the advantages and risks that are involved in the use of these technologies. This provides an opportunity to analyse the security software before implementing it in a final context. The significance of the findings is to keep people aware of the possible threats that can be suffered if proper anti-virus is no t used. The objective of the report has been achieved by identifying the technologies that can help in mitigating the security threats. These technologies are built keeping in mind the amount of threat that exists in the modern world. The use of these technologies can help in the identification of immediate dangers and prevent the loss of any important documents. The advantages and risks involved in these techniques have identified that need to be managed by the organisations implementing it. In this regard, the organisation in the case study has been taken as the primary example. The application of these in an organisational context is analysed. The report also provides a future scope of study for the topic. Researchers can also identify the use of these technologies in a reputed organisation. Recommendation After analysing the situation of the organisation and identifying the advantages and risks of the technologies, recommendations can be made that can help in the improvement of the organisation. Some of the recommendations include the authentic use of anti-virus system. The anti-virus used by the organisation need to be authentic so that it can detect the threats at any time. This can help in keeping out any possibilities of a virus as viruses normally occur in a system that uses backdated anti-virus technology. Apart from another recommendation, include the constant update of software. In order to use the modern technologies effectively, the organisation needs to maintain software that supports the working of the technologies. A third recommendation includes the recruitment of trained IT personnel. This is required in order to manage the technologies effectively and ensure that trained personnel manage to implement the technologies and identify threats that may occur. A fourth recomm endation includes the application of any one of the technologies. The application of these technologies can help in preventing any virus attack or threat in the systems. The risk factors need to be mitigated strategically in order to ensure a smooth flow of work activity. References Al-Saggaf, Y., Burmeister, O., Weckert, J. (2015). Reasons behind unethical behaviour in the Australian ICT workplace: An empirical investigation.Journal of Information, Communication and Ethics in Society,13(3/4), 235-255. Bannister, F., Connolly, R. (2014). ICT, public values and transformative government: A framework and programme for research.Government Information Quarterly,31(1), 119-128. Bhargava, V. K., Poor, H. V., Tarokh, V., Yoon, S. (Eds.). (2013).Communications, information and network security(Vol. 712). Springer Science Business Media. Bull, R. (2015). ICT as an enabler for sustainable development: reflections on opportunities and barriers.Journal of Information, Communication and Ethics in Society,13(1), 19-23. Carroll, J. M. (2014).Computer security. Butterworth-Heinemann. Chen, C. P., Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data.Information Sciences,275, 314-347. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Hall, B. R. (2014). A synthesized definition of computer ethics.ACM SIGCAS Computers and Society,44(3), 21-35. Hau, E. (2013).Wind turbines: fundamentals, technologies, application, economics. Springer Science Business Media. Hsiao, D. K., Kerr, D. S., Madnick, S. E. (2014).Computer security. Academic Press. Jouini, M., Rabai, L. B. A., Aissa, A. B. (2014). Classification of security threats in information systems.Procedia Computer Science,32, 489-496. Kahate, A. (2013).Cryptography and network security. Tata McGraw-Hill Education. Markus, M. L., Mentzer, K. (2014). Foresight for a responsible future with ICT.Information Systems Frontiers,16(3), 353-368. McDermid, D. (2015).Ethics in ICT: an Australian perspective. Pearson Higher Education AU. Ming, T. M., Jabar, M. A., Sidi, F., Wei, K. T. (2015). A systematic literature review of computer ethics issues.Journal of Theoretical and Applied Information Technology,78(3), 360. Pathan, A. S. K. (Ed.). (2016).Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Perlman, R., Kaufman, C., Speciner, M. (2016).Network security: private communication in a public world. Pearson Education Pieprzyk, J., Hardjono, T., Seberry, J. (2013).Fundamentals of computer security. Springer Science Business Media. Stahl, B. C., Flick, C., Hall, R. (2013). Evaluating research quality in technology ethics.The possibilities of ethical ICT, 435. Stahl, B. C., Timmermans, J., Mittelstadt, B. D. (2016). The ethics of computing: A survey of the computing-oriented literature.ACM Computing Surveys (CSUR),48(4), 55. Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson. Vasilakos, A. V., Li, Z., Simon, G., You, W. (2015). Information centric network: Research challenges and opportunities.Journal of Network and Computer Applications,52, 1-10.
Subscribe to:
Posts (Atom)