Monday, May 25, 2020
A Womans Role in Society - 1080 Words
The Roles of Women in ââ¬Å"A Dolls Houseâ⬠and ââ¬Å"Triflesâ⬠ââ¬Å"A Dolls Houseâ⬠and ââ¬Å"Triflesâ⬠are very different plays, such as the number of acts, the styles used throughout, and the way characters interact. These plays are also very similar in that they dicuss and deal with the same type of situations and scenarios. Both plays helped change society in the way that men view the roles of women in their lives. Nora and Mrs. Wright both are in marriages that they must leave or get out of although they handled their situations very differently the two women in the plays set a precedent and changed the roles of women in society forever. Editor of Drama For Students David M. Galens expains in beginning of ââ¬Å"A Dolls Houseâ⬠, Nora returns home from shopping and Torvald is disappointed in her excessive spending. Nora pouts and acts as a child, and Torvald then addresss her as the child she is acting to be. The relationship she has with her husb and Torvald directly mirrors the relationship with her father, we also see that their relationship is based on dishonesty as Nora has to lie and hide the macaroons that Torvald has banned her from eating. Nora Helmer reveals to a friend Mrs. Linde that she had taken out a loan, to pay for a trip that eventually saved her husband. Nora forged her fathers signature in order to take out the loan since it was illegal. Nora did so to show that she could both take care of her family and conduct business. The only other person to know of NorasShow MoreRelatedA Womans Role in Todays Society1381 Words à |à 6 PagesIntroduction In todays society, a womans roll in todays society is about as equal as a mans. A woman may vote, work what was formerly a mans job or have a job as a CEO and run a major company. The question really is more important with regards to what was a womens roll was in the society in the 1500s or earlier. One naturally asks what a woman in the house hold of the business. Further will probably ask rights if any women had and how did women live back then and if they had any power atRead MoreDiscovering a Womans Role in Society Essay837 Words à |à 4 PagesThroughout the early 1800s, British women often played a subordinate role in society, flexed by many obligations, laws, and the superior males. A young womanââ¬â¢s struggle for independence and free will can often be compared to a life of servitude and slavery. Women were often controlled by the various men in their lives; whether it be father, brother or the eventual husband. In 19th century Britain, laws were enacted to further sup press women that eventually bore the idea that women were supposedRead MoreDiscovering a Womanââ¬â¢s Role in Society in Pride and Prejudice Essay1226 Words à |à 5 PagesThroughout the early 1800s, British women often played a subordinate role in society, flexed by many obligations, laws, and the superior males. A young womanââ¬â¢s struggle for independence and free will can often be compared to a life of servitude and slavery. Women were often controlled by the various men in their lives; whether it be father, brother or the eventual husband. Marriage during this time was often a gamble; one can either be in it for the right reasons such as love or for the wrong reasonsRead MoreDuring the 1960ââ¬â¢s a womanââ¬â¢s role in society was greatly changed through both social and legal2300 Words à |à 10 Pages1960ââ¬â¢s a womanââ¬â¢s role in society was greatly changed through both social and legal means. Womenââ¬â¢s rights movements in the United States date bac k to 1848 at the Seneca Falls Convention, but were greatly ignored after women were granted the right to vote in 1920 by the nineteenth amendment. Many reasons contributed to the reemergence of womenââ¬â¢s movements but the most prevalent is the end of World War II in 1945. During World War II, more than three million women of all classes of society voluntarilyRead MoreEquality of the Sexes: Elizabethan Era and Now (as Conveyed in Romeo and Juliet)895 Words à |à 4 Pagesmajor issue and dispute. Analysing the role of women in the Elizabethan Era, through Shakespeareââ¬â¢s representation in Romeo and Juliet, and comparing them to the role of women in the 21st century, will help to demonstrate that equality of the sexes has been achieved, and come a long way in the past 400 years. Three ways in which equality of the sexes has been achieved is the role of a married, and unmarried woman, and roles of women in society. Married womenââ¬â¢s roles have changed significantly since theRead MoreMotherhood Essay775 Words à |à 4 PagesMotherhood Many different aspects of life characterize motherhood. Traditions along with society influence the role of motherhood. Carol Stacks All our Kin, is an essay about the structuring of kin groups (1974, p.47). In the society, if the mother is not mature enough to raise the child, a close female relative takes on the role of the mother; whereas, the man has the option of choosing to claim the child and take on the responsibilities of fatherhood or he can imply that the fatherRead MoreWoman Post Ww2 - Research Paper1482 Words à |à 6 Pagesââ¬ËWoman ââ¬â Post WW2ââ¬â¢ Research Essay By Isabella Martin ââ¬Å"Account for the Continuity and/or Change in Womanââ¬â¢s status in Aust. Over Time.â⬠The evolution of the rights of woman in Australia owes much to successive waves of feminism, or the womanââ¬â¢s movement. The first of these took place in the late 19th century and was concerned largely with gaining the right to vote and to stand for election into parliament. The second wave of feminism took place in the 1960s and 1970s and focused on gaining equalityRead MoreA Woman s Place, And Zulu Kente s Poem, I Know You Good Woman943 Words à |à 4 Pagesthe same time strong, they care, they love, and most important, they are beautiful. Women have come a long way in society throughout time. They ve gone from being nothing to being something. But yet, there are issues with women in todayââ¬â¢s society. Naomi Wolf with her essay ââ¬Å"A womenââ¬â¢s placeâ⬠and Zulu Kenteââ¬â¢s poem ââ¬Å"I know you good womanâ⬠they address that the role of woman in our society needs a lot of improvement. Women face daily issues such as their voices are not being heard, t hey are being paidRead MoreStructure in A Womans Beauty by Susan Sontag641 Words à |à 3 PagesSontagââ¬â¢s ââ¬Å"A Womanââ¬â¢s Beautyâ⬠the structure the author uses for the story has a dramatic impact on the readers. In the story, Sontag structures the essay base on many historical events and other religious ideas to support her idea, how a woman sometime is only judge by her appearance. Specifically, Sontag uses three ideas in the story to support her argument. First is in history what the Greeks believe in a womanââ¬â¢s beauty. Second, Sontag discuss about how the Christian religion plays a major role in shapingRead MoreIdentifying The Gender Stereotype Example773 Words à |à 4 Pagescom/adsarchive/promo-casestudy/johnsons-baby-products-johnsons-baby-diaries-15560755/ Gender stereotype is defined as specified roles in the society on the basis of gender. For example, generally women work as nurses, teachers, care takers, when men work as doctors, lawyers, construction workers. Cleaning home is like womenââ¬â¢s job, when the work outside home, like farm work, is menââ¬â¢s duty. Watching this ad in the way of gender stereotype, it shows the role of the women become essential in taking care of the children than the men. So Johnson
Thursday, May 14, 2020
Marketing Strategy For The International Business Market
When companies decide to enter the international business market they can do so via two different strategies, the multinational and global strategies. These two may seem like they are the same but in reality each strategy is very different. The multinational strategyââ¬â¢s main purpose is to adjust the product being offer to better appeal to the people or place to where it is being offer, while the global strategy does not make that distinction. Using the global strategy means that the same market strategy used in one country can also be used in another country without regard to the place, people or their culture. It may perhaps sound like an unreasonable strategy but when the product you must sell is standard the most important factor is cost; the global strategy succeeds in this regard. For example if I were to sell a pen here in the USA and then in South Korea the best strategy to use would be the global strategy. With this strategy the same marketing strategy used in USA can a lso apply is South Korea because the pencil is a standard product, it is not unique. By using this strategy I would also save money in market research and be able to produce at a larger scale (because I am not catering to specific needs) which would allow my product to be less costly than if I were to use the multinational strategy. As a result this cost saving technique can be passed to consumers to earn us a bigger market share in South Korea. However if I were to sell Mexican cuisine in SouthShow MoreRelatedIntroduction. Coca-Cola Is One Of The Company That Gets1482 Words à |à 6 Pagesof the United States; this is a perfect example of international Marketing. The term ââ¬Ëinternational marketingââ¬â¢ is not only based on marketing, but rather more building, and executing a solid marketing plan and actively looking for opportunities to expand a given business by moving to new geographic markets, finding new offerings, and products and services that would fit within your company. No doubt expanding a business to an international market can be very challenging. It is costly to implementRead MoreStandardization in International Marketing Strategy Is Doomed to Failure: Literature Review and Methodological Critique1577 Words à |à 7 PagesStandardization in International Marketing Strategy is doomed to failure: Literature review and methodological critique. The literature on standardization of international marketing strategy has rapidly increased in amount since Levitt (1983) suggested the main concept that business strategies and their influences on firm performance should be universal through national markets which are very much alike culturally, economically and politically, in spite of limited empirical evidence focusedRead MoreAlternative Strategies of Managing Business1776 Words à |à 7 PagesAlternative Strategies of Managing Business Alternative Strategies of Managing Business Introduction The success of any business company depends on the strategy it takes on to increase its efficiency. This is because all organizations look forward to increase their returns, and minimize their expenditures. In light of this, success in a business then depends on how successful it is in maximizing its resources, and expanding its market share. This can only be realized when alternative strategies areRead MoreInternational Marketing. Submitted By: Zeinab Amin. Submitted1484 Words à |à 6 Pages International Marketing Submitted by: Zeinab Amin Submitted by: Melanie Simmons International Business Northern Alberta Institute of Technology March 12, 2017 Ã¢â¬Æ' Table of Contents INTRODUCTION 3 INTERNATIONAL MARKETING 4 MARKETING PLAN 5 FACTORS EFFECTING INTERNATIONAL MARKETING 6 PEST ANALYSIS 6 POLITICAL 6 ECONOMIC 7 SOCIAL 8 TECHNOLOGICAL 8 INTERNATIONAL MARKETING STRATEGIES 8 EXPORTING 9 LICENSING AND FRANCHISING 9 JOINT VENTURE 10 DIRECT INVESTMENTS 10 CONCLUSION 10 REFERENCES 12 Ã¢â¬Æ' INTRODUCTIONRead MoreDifferent Levels Of Market Involvement And Modes Of Entry Essay1251 Words à |à 6 PagesDifferent levels of market involvement and modes of entry. In global marketing, the marketing across the national boundaries lies between the potential complexities of international marketing which precisely defines what is involved in it. On the other hand the orders received from other national boundaries are responded by the independent broker too. The company is also involved in the transaction of selling its products and services to the broker with some efforts put in along with the considerationsRead MoreAn Individual Essay On Vegemite1717 Words à |à 7 PagesEssay on Vegemite Ã¢â¬Æ' Table of Contents Introduction 3 1. Importance of Marketing Mix Especially in Foreign Market 3 2. Issues of Vegemiteââ¬â¢s Marketing Mix in Foreign Market 6 3. Result of not adjusting Marketing Mix in International Market 7 Conclusion 8 References List 9 Ã¢â¬Æ' Introduction This is an individual essay where the researcher is assigned to discuss about the importance of marketing mix especially in the foreign market. The theme of the given topic refers to use the example of Vegemite. ItRead MoreEssay on Model questions for Global Marketing1523 Words à |à 7 Pagesquestions for Global Marketing Outline and discuss the principal causal factors that encourage firms to undertake the international marketing of their products and services. Cultural and political forces influence international marketing activity. Discuss the impact of these forces and illustrate your answers with examples. ââ¬Å"The global competitor will seek to standardise his offering everywhereâ⬠(Levitt). Critically evaluate this view with specific reference to a firmââ¬â¢s international product/serviceRead MoreAnalysis of the Primary Models of International Marketing721 Words à |à 3 PagesInternational Marketing Introduction The three primary models that international marketing is predicated on include ethnocentric, geocentric and polycentric approaches to entering, selling to and serving new markets. Each of these approaches have inherent strengths and weaknesses associated with them, and the intent of this analysis is to explain how the way a company markets a product or service will dictate the selection of one over another. There are many cultural differences and factorsRead MoreDeveloping The Right Marketing Strategy1313 Words à |à 6 PagesDeveloping the right marketing strategy is critical to ensuring an organizationââ¬â¢s brand, image, and profitability are maximized in an international marketplace. There are various forms of markets, a global market and a regional market. This document will compare and contrast globalization and regionalization. It will highlight if these two markets are the same or different. In addition, the role of an international marketer to develop marketing strat egies in a regional or global market will be discussedRead Moretopshop marketing plan1483 Words à |à 6 PagesID:43228259 Business Name:Topshopà Email Address: wangyt_1002@hotmail.com à TOPSHOP Marketing Plan Prepared:à [25 Dec 2013] Table of Contents 1 Marketing Plan Summary [Please complete this page last] [The marketing plan summary is a snapshot of your more detailed answers from your marketing plan. It should be easy to read and simple to follow.à ] Introduction of Topshop Business name:à Topshop
Wednesday, May 6, 2020
Advantages Of Authentic Leadership Style - 2102 Words
4 Advantages and disadvantages of authentic leadership Authentic leadership, although still a new theory, has been closely reviewed and analysed. Many of its proponents focus on the positive advantages the leadership style can provide to an organisation, while critics point out to some obvious failings in the approach. Letââ¬â¢s turn out attention to both arguments. Advantages of authentic leadership One of the first benefits of authentic leadership is the enhanced relational engagement it brings about. Since the focus is on objectives and a personââ¬â¢s inner behaviours and values, the leader is more able to maintain trust and cohesion among the group. The focus is on empowering the employees and guiding them through the tasks in an empathetic and honest manner. George points out to this importance of trust in True North. He points to the examples of Enron, WorldCom and Tyco and the CEOs who ââ¬Å"put their companies at risk by focusing on the trappings and spoils of leadershipâ⬠. George went on to write how trust is not built by trying to appear authentic or caring, but highlighting oneââ¬â¢s inner values. The relational engagement is closely related to the second positive of authentic leadership: itââ¬â¢s ability to build positive and rewarding relationships. The focus on employee-leader relations is on the development and on listening to peopleââ¬â¢s ideas and thoughts. The open relationship, which doesnââ¬â¢t mean everything is always happiness and agreement, creates an authentic environment,Show MoreRelatedOrganizational Behavior, Leadership, And Leadership1321 Words à |à 6 Pages In any organization, itââ¬â¢s extremely important for the people in leadership roles to possess a strong leadership role. According to the text Organizational Behavior, ââ¬Å"leadership is the process of developing ideas and a vision, living by values that support those ideas and that vision, and influencing others to embrace them in their own behaviors, and making hard decisions about humans and other resourcesâ⬠(Hellriegel Slocum, 2011). Regardless of what type of leader an indi vidual is, their mainRead MoreAdvantages And Disadvantages Of Transactional And Transformational Leadership In The Workplace1043 Words à |à 5 Pagesdeal with both transactional and authentic leadership and how they are viewed in the workplace. Transactional leadership is most often compared to transformational leadership. Transactional leadership depends on self-motivated people who work well in a structured, directed environment. By contrast, transformational leadership is used to motivate and inspire workers by influence rather than direct the individual. Authentic leadership is an approach to leadership that emphasizes building the leadersRead MoreIntroduction. While Organizations Are Complex And Seemingly1457 Words à |à 6 Pagesinclude formulating strategies, managing risks, or motivating people from multiple cultures. What of leadership styles? Often organizations discover that leadership across cultures is a greater problem than initially thought and it takes careful co nsideration before moving forward. Gaps in the Literature Over the decades, leadership theories have been introduced, researched, and evolved into a new style, method, or faded away. The Theory of X and Y managers, and a combination of the two in Z, provideRead MoreThe Shawshank Redemption By Frank Darabont Essay868 Words à |à 4 PagesElwood Blatch, the man who secretly confesses to killing Andyââ¬â¢s wife and her lover. Warden Norton, the libertarian prisoner who committed a suicide when he freed from jail. Norton would have had greater success in a team management role or as an authentic leader. First, the movie shows how Andy, with the assistance of his friend Red, the prison businessperson, turns out to be the most eccentric prisoners. After the murder of his wife, Andy is sent to Shawshank Prison, where the usual spite takes placeRead MoreA Theory Of Authentic Leadership1366 Words à |à 6 PagesA theory in its infancy Authentic leadership is in its infancy, which means the concept still lacks certain universal answers or theories to specific questions. As we will explore in the section about the advantages and disadvantages of the theory, the lack of proper theory or model is sometimes criticised. But the core ideas of authentic leadership have evolved and academics are continuously researching the theory and its validity further. The emphasis of the theory is on the leaderââ¬â¢s legitimacyRead MoreThe Theory Of Authentic Leadership Essay1627 Words à |à 7 PagesHow people interact with others leans toward three styles of attachment: secure, insecure-ambivalent and insecure-avoidant. The researchers argue that people who are securely attached are most likely to exhibit authentic leadership. Their research reviews how secure attachment is positively related to each of the four components of authentic leadership; self-awareness, relationship transparency, balanced processing and internalized moral perspective (Hinojosa, Davis McCauley, Randolph-Seng, Read MoreAuthentic Leadership And Its Application For Nursing Practice1299 Words à |à 6 PagesBill George discussed and incorporated authenticity as a leadership theory in his book Authentic Leadership (Kruse, 2013). This paper will discuss authentic leadership and its application to nursing practice. It will combine and relate a number of peer-reviewed journals, articles, and Brenà © Brownââ¬â¢s professional development book, Daring Greatly, to substantiate why this leadership theory is effective in the nursing profession. Authentic leadership and vulnerability greatly enhance a leaderââ¬â¢s influenceRead MoreThe Qualities Of A Leader1127 Words à |à 5 Pagesto the path of leadership. In my case, many of the tools that I use as a leader, have been learned through this year. My leadership style is Democratic. I am flexible and open-mind, I like to listen to other opinions, and I take care, my team. In accordance with all styles of communication discussed, my style of communication is a style assertive, although with a few traits of the style passive and few traits of the aggressive style. The features that are distinguished in the style of communicationRead MoreAuthentic Leadership1627 Word s à |à 7 Pagesessential step in becoming an authentic leader. What role did self-awareness play in Sallyââ¬â¢s story of leadership? Throughout her journey, Sallyââ¬â¢s self-awareness made her into an authentic leader she is. Self-awareness is having a personal insight of oneââ¬â¢s self, and as Sally was being aware of her strength and weaknesses; she understood herself and what she clearly wanted. She was able to grasp her traits and characteristic, both her assets and flaws to her advantage. Sally also concentrated on herRead MoreThe Leadership Intervention Strategies For Rebuild Team Morale And Effectiveness1681 Words à |à 7 Pagescritically evaluate the leadership intervention strategies available for Karina to rebuild team morale and effectiveness. Resolution In order to ameliorate such a situation, it is essential for Karina to recognize and interpret the nature of the obstacle and then implement corresponding intervention strategy (Joshevska and Petkovski 2014). According to the team leadership model, Karina was confronted with a team performance problem that requires internal relational leadership actions to be taken (Northouse
Tuesday, May 5, 2020
Control in Cloud Computing Environment â⬠MyAssignmenthelp.com
Question: Discuss about the Control in Cloud Computing Environment. Answer: Introduction Webbs Stores is regional retailer that is based out of Australia. The store has its data centres in Sydney, Melbourne and many regional data centres located in several different locations. There are six hundred members of the staff and two hundred warehouse staff members that are engaged with the store. Due to the problems in the current system and sets of operations, the store has agreed to move its database and operational activities to the cloud. The report covers the aspects of security that Webbs store must consider and implement. The store has decided to move MS SQL Server 2012 R2 database to cloud Infrastructure as a Service (IaaS) model. The following security measures will be required to be adopted in this case. Enhanced network security with the deployment and integration of the database with automated network monitoring and intrusion detection tools. Role based access control system to be implemented to make sure that only the privileges and authorized users are provided the ability to access the database. Two-fold user authentication comprising of one time passwords and biometrics. Implementation of anti-denial and anti-malware tools (Ismail, 2017) Encryption of the information using Advanced Encryption Standard algorithms (AES) and implementation of advanced hashing schemes. There shall be enhanced backup and disaster recovery mechanisms that shall be applied in the database. The above steps that have been illustrated will result in the prevention, detection and control of the security risks and attacks. There are numerous security occurrences that may take place in association with IaaS cloud delivery model. As a result, it has been observed that the customer trust and satisfaction drops down in such cases because of the repeated frequency of such incidents. With the use and implementation of the measures suggested above, it will become possible to avoid the security attacks (Simou, 2016). Issues Difficulties There may be implementation and compatibility issues that may be observed. For instance, the network security tools may not be compatible with the IaaS database that will be implemented for the store (Shahid, 2015). These security tools and measures will also involve a considerable cost associated with it. It may lead to the problems with the estimated budget and expenses in association with Webbs stores. The decision to move the critical database on the cloud might bring in a number of cloud database specific security risks and concerns. The attackers may violate the rules of access control and may hijack the accounts on the database. It will provide them with the ability to access the data and information sets from the database and misuse the same (Alashoor, 2014). Information breaches and leakages are some of the risks that have been observed in association with the cloud databases. There may be business data and operations that will be carried out on the cloud database which will have little or no infrastructural control by the IT department or the technical people from the store. Many of the network-based security attacks may take place with cloud infrastructure as the threat agent (Singh, 2001). The information will be shared from one data source to the other on the cloud and other networks. The sharing and communication of information will be transmitted through various networks and access points. Not all of these networks and access points will have a standard security mechanism implemented which will give rise to the security risks and privacy threats. Risks Issues Backup, Storage and Retrieval There are also risks associated with the back-up, storage and retrieval of the data from the cloud. In case of backing up of the data on the cloud, there will be automated codes and programs that will be required to automatically run the back-up. However, in case of a faulty code or launch of a malware in the code, the process of backing up of the data may not be completed. The data that will be stored on the cloud will also be open to the security attacks by the attackers. There may also be technical and operational errors and risks that may result in integrity risks. There will be a number of stored copies of the data on the cloud. The users may update one of the copies and may leave the other unchanged. This will lead to the problems of inconsistency and violation of integrity (Fowler, 2010). The retrieval of the information will require the authenticated user credentials to login to the database and gain access to the same. The users and employees may accidentally or deliberately share their credentials with the unauthorized users. Such users may gain access to the database and may cause damage to the information present within it. Disaster Recovery Strategy Disaster recovery strategy that is currently followed in the Webbs stores will be required to be modified and updated according to the cloud model that is used. In case of cloud, there will be increased probability of the security and privacy risks. The disaster recovery strategy will therefore be required to analyze all the cloud-related concerns and develop the control measures mapping with each (Tari, Yi, Premarathne, Bertok Khalil, 2015). The frequency of the back-up and the number of data repositories will also increase and the process of the back-ups will be modified as per the improved disaster recovery strategy. Access Control Access control is one of the basic steps towards security. There are a number of access control models that have been developed such as mandatory, role-based, attribute-based and discretionary access control. In case of Webbs Stores, access shall be protected by executing and implementing a combination of mandatory and role based access control. IaaS infrastructure: Role-based access control Ms SQL Server 2012 R2 cloud instance: Role based access control Cloud network infrastructure: Attribute based access control Cloud backup and restore infrastructure: Attribute based access control Role based access control is the mechanism that provides access on the basis of the user role. Attribute based access control on the other hand provides access on the basis of users attributes such as date of birth or social security number or a combination of other attributes (Khan, 2012). Conclusion Webbs Stores has taken a significant and necessary action by deciding to implement the cloud computing models in their architecture. With the implementation of cloud databases, the current issues in terms of difficult data and information management along with replication of the data will be avoided. However, it will give rise to a new set of issues and concerns which will be required to be managed. There will be a number of security issues, privacy attacks, operational and technical risks that will come up. There will also be a number of changes that will be introduced in the store in terms of the operational changes, technical changes, implementation requirements and many more (Nadeem, 2016). It will be necessary to handle all of these issues and changes to gain the best out of cloud computing models and databases implemented in the store. An initial session of training will be required for the internal members of the staff to make them comfortable with the new system. It will lead to a clear understanding of the functionalities and will provide them with the clarity on the correct usage and application (Hashemi Hesarlo, 2014). References Alashoor, T. (2014). Cloud computing: a review of security issues and solutions. International Journal Of Cloud Computing, 3(3), 228. https://dx.doi.org/10.1504/ijcc.2014.064760 Fowler, S. (2010). Impact of denial of service solutions on network quality of service. Security And Communication Networks, 4(10), 1089-1103. https://dx.doi.org/10.1002/sec.219 Hashemi, S., Hesarlo, P. (2014). Security, Privacy and Trust Challenges in Cloud Computing and Solutions. International Journal Of Computer Network And Information Security, 6(8), 34-40. https://dx.doi.org/10.5815/ijcnis.2014.08.05 Ismail, N. (2017). The winding road to GDPR compliance - Information Age. Information Age. Retrieved 25 August 2017, from https://www.information-age.com/winding-road-gdpr-compliance-123468132/ Khan, A. (2012). Access Control in Cloud Computing Environment. Retrieved 25 August 2017, from https://pdfs.semanticscholar.org/ef20/bc1239539f9a8502715153c5af67fc9e9034.pdf Nadeem, M. (2016). Cloud Computing: Security Issues and Challenges. Journal Of Wireless Communications, 1(1). https://dx.doi.org/10.21174/jowc.v1i1.73 Shahid, M. (2015). Cloud Computing Security Models, Architectures, Issues and Challenges: A Survey. The Smart Computing Review, 602-616. https://dx.doi.org/10.6029/smartcr.2015.06.010 Simou, S. (2016). A survey on cloud forensics challenges and solutions. Security And Communication Networks, 9(18), 6285-6314. https://dx.doi.org/10.1002/sec.1688 Singh, K. (2001). IT Infrastructure Security-Step by Step. Sans.org. Retrieved 25 August 2017, from https://www.sans.org/reading-room/whitepapers/basics/infrastructure-security-step-step-430 Tari, Z., Yi, X., Premarathne, U., Bertok, P., Khalil, I. (2015). Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. IEEE Cloud Computing, 2(2), 30-38. https://dx.doi.org/10.1109/mcc.2015.45
Subscribe to:
Comments (Atom)