Wednesday, September 2, 2020

Descartes Meditation Essay

Descartes holds that you are more brain than body. Do you concur? What kind of need does he plan? † In the Meditation Two: Concerning the Nature of the Human Mind, Descartes portrays himself â€Å"as in the event that I had unexpectedly fallen into a profound whirlpool† (pg. 492), communicating the need to stir his way up and regroup the day preceding. He fundamentally shouts that he will put off all questions and â€Å"suppose that everything is bogus (492)†. In this contemplation he plays on the idea that the psyche is more noteworthy than the body. In some respects’ I do concur with what Descartes is stating about dualism idea and how we are â€Å"thinking things (493)†. I accept the psyche is more significant in some way than the body on the grounds that the force the brain needs to think, reason, make, dream, envision, accept, remember, respond, want, feel, and the capacity to know and have unlimited thoughts. Descartes concurs that he â€Å"doubts, comprehends, insists, denies, wills, won't, and that additionally envisions and faculties (494). †In this segment I do concur with Descartes on his perspective on this â€Å"thinking thing†. The psyche is unimaginable to the point that we people can’t handle the many-sided edifices that the brain has. At the point when Descartes depicts the wax model I was somewhat befuddled however in the wake of scrutinizing the idea I have come to acknowledgment that it bodes well. I think Descartes was frantic to discover away, some approach to depict the significance of the psyche and utilizing this outline was an inventive method to do as such. So he portrays this bit of wax how it’s hard and cool, pliable, has a slight nectar flavor (494). At that point he portrays what befalls this wax when it experiences the distinctive temperature cycles and how the structure of the wax changes and so on. So we realize that when the bit of wax is experiencing those physical changes it despite everything stays to be a similar piece. So observing that we comprehend that the hard bit of wax and now dissolved bit of wax have the equivalent properties’ must not simply originate from the faculties since the entirety of the reasonable properties were changed. As Descartes depicts that â€Å"the feeling of smell, sight, contact or hearing has now changed; but the wax stays (495). † So from this one may feel that the creative mind is the thing that this bit of wax is, however Descartes shouts, â€Å"Therefore this knowledge isn't accomplished by the workforce of creative mind. Rather he infers that â€Å"I (Descartes) see it through the psyche alone. † Learning this representation is shows the significance of the brain and the physical body. That the body can take on a wide range of changes, yet the brain is excellence behind everything. I can’t state that I concur with everything that Descartes is attempting to communicate, however I do concur with the reality there are hard ideas to get a handle on and comprehend. We each have extraordinary psyche, and understanding the brain will require some investment and will take tolerance.

Saturday, August 22, 2020

Health And Safety In The Workplace

Wellbeing And Safety In The Workplace HR are one of the most significant highlights of numerous organizations. A business achievement depends intensely on the adequacy to which this asset is overseen. Strategies and practices utilized by the firm, set out the principles to which they look strive for. They are intended to administer the activity of the business; particularly in todays economy where there is such an ascent in administration ventures (Biz/ed, 2010). This subject is of significance to us since it has demonstrated to be a dismissed field in todays corporate world; particularly in Grenada. In such manner, this paper try to feature the significance of Workplace Health and wellbeing to the business, to build up a comprehension of how its powerful administration can influence the exhibition of a business, diagram how this can be viably completed considering the enthusiasm of the organization. It is frequently said that, the soundness of a country is the abundance of a country (Fraser, 2004), a similar idea applies to business. The wellbeing and security of a companys human asset is a huge supporter of the achievement of that business. HR represent a huge extent of numerous companys costs; the individuals perpetually drive a business (Biz/ed, 2010) As indicated by the Bureau Veritas, Workplace Health and Safety alludes to, the assessment of dangers identifying with the wellbeing and security of an associations laborers and others (counting the general population) who might be influenced by its exercises (Bureau Veritas, 2007). Who build up working environment wellbeing and security? The wellbeing and security of a working environment is built up through various sources. Right off the bat, on a national level word related wellbeing and security is initiated as per legitimate guidelines that were made by authoritative choices and is authorized and checked by organizations, for example, the Occupational Safety and Health Administration (OSHA), for the U.S., and the Ministry of Labor in Grenada. OSHA, an office of the U.S. Branch of Labor, has the obligation of guaranteeing the wellbeing and soundness of Americas laborers by setting and implementing guidelines; giving preparing, effort and training; building up organizations; and empowering (OSHA, n.d.). On a national as well as on an organization level there are additionally cases of normal reviews by a security agent. This can act naturally mentioned or legitimately commanded. This is done to guarantee that organizations follow the specified rules that are set to oversee the wellbeing and soundness of the working environment. Likewise, from a corporate point of view, the wellbeing and security principles of the organization can be build up by the presentation of it in the Companys general laborer manual or potentially in the different manual put in a safe spot for unmistakably spreading out, the guidelines by which the organization try to keep its workplace and the individuals that utilization it protected and solid. A progressively casual, yet a compelling strategy is worker perception. This is essentially workers announcing perils that go unnoticed to the assessment delegate as well as the executives. These choices are set up to guarantee understanding of an organization to screen and control the wellbeing and security of the working environment, and to look after it. In-adherence of guidelines set by the above administrative bodies can bring about a business being fined or condemned to prison time (Cascio, 1998). Explanations behind Maintaining Workplace Health and Safety There are reasons why a business ought to keep up a protected and solid working environment. It cleanses nature of potential dangers to everybody that utilizes the office. An associations profitability is straightforwardly identified with the wellbeing and security of its workforce. Along these lines, legitimate wellbeing and security rehearses shield the efficiency of its workers. At the point when the workforce is unfortunate it influences profitability; amount and quality. Appropriate practices keep up the soundness of the laborers and it secures human rights; the human right to a sheltered and solid condition and the human right to a protected and sound working environment (PDHRE, n.d.) A significant purpose behind keeping up wellbeing and security in the working environment is that inability to do so be excessively expensive. The results of not up keeping legitimate wellbeing and security practices can run from having costly financial payouts, to death (clients of the work environment). Different repercussions are Lower efficiency levels wiped out or harmed laborer don't deliver a similar quality and amount as do wellbeing laborers. Low quality items and administrations the immediate connection between nature of workforce and nature of items or administration they produce. Elevated levels of objections from clients lower nature of items or administrations conveyed to clients would make them troubled. Loss of clients and hence lower incomes if the nature of the creation isnt tended to it can bring about a misfortune in the client base and later misfortune in incomes on account of lower deals. Greater expenses this expansion in cost can emerge out of various sources including: installment of protection claims for harms, cost of replacement for wiped out or harmed laborers (preparing and wages), and advantages for wiped out or harmed laborers. Higher staff turnover as people become ill or harmed hands on they will in general leave. In the event that the wellbeing and security practices of the work environment are frightful representatives would not remain along these lines higher turnover. Poor modern relations unexpected weakness and wellbeing practices would stand out from associations who battle for the privileges of workers. Along these lines, tending to security and medical problems in the working environment sets aside the business cash and increases the value of the business (OSHA, n.d.). At the point when laborers stay protected and sound, the immediate cost-investment funds to organizations include: lower laborers pay protection costs diminished clinical consumptions littler uses for come back to-work programs less flawed items lower costs for work lodging for harmed laborers less cash spent for extra time benefits Wellbeing and wellbeing additionally bring about significant reductions in circuitous cost (OSHA, n.d.). This is because of: expanded efficiency more excellent items expanded spirit better work/the board relations decreased turnover better utilization of HR Workers and their families profit by wellbeing and wellbeing since (OSHA, n.d.): their wages are ensured; no money related stun due to ailment or injury their family lives are not hampered by injury; no loss of pay destabilization in light of ailment and injury they have less pressure; due to a com Work environment wellbeing and security expand path past the limits of the worksite. The groups of laborers and different clients of the worksite can likewise be affected by wellbeing and security in the working environment (OSHA, n.d.). It is of a misguided judgment that wellbeing and security in the working environment just involves guaranteeing that there arent any risks on the worksite anyway it ought to be noticed that the peril can be simply the representatives. Representatives who are wiped out (transmittable/non transferable), who have a medication or liquor issue, who have mental issues can likewise present incredible danger to the wellbeing and security of others in the working environment. Brutal workers can likewise be named a danger (Cascio, 1998). In such manner testing of the individual along with the worksite is vital; medication and liquor testing, mental tests and so forth. Whose duty right? The wellbeing and security of a work environment ought to be a piece of the business HR technique. It should be an activity that is profoundly established into the way of life of a business. Nobody individual ought to be liable for it. Given this, all representatives, administrators and chiefs ought to experience preparing here to suit their position. Directors particularly ought to have a mentality that help great wellbeing and security rehearses in light of the fact that it is normally reflected by workers; if the chief consideration about wellbeing and wellbeing, the representatives will do as well (OSHA, n.d.). Both the business and the worker are liable for guaranteeing that the working environment is sound and safe for all clients. Businesses are legitimately committed to keep up and give a workplace that is favorable for agreeable activities. They likewise need to give safe frameworks of work and offices that would continue the government assistance of its representatives. They are additionally liable for giving representatives any data, guidance, preparing as well as oversight that is expected to guarantee that laborers are sheltered during tasks regardless of the activity. Because of this duty to guarantee representatives are protected busy working, a business may initiate guidelines and arrangements that would require the consideration from and consistence of representatives (Directgov, 2010). Representatives are additionally expected to have an influence in guaranteeing legitimate wellbeing and security of the work environment. They are to make certain their very own wellbeing and security and that of different people in the work environment; regardless of whether partner, client, provider, and so on. Critically, laborers are relied upon to stick to the headings given by the executives to ensure wellbeing and security. In the event that laborers are to overlook these orders it makes a risk in the working environment for themselves as well as for other people (Directgov, 2010). Compelling administration of the asset Every work environment is extraordinary and dynamic. In this manner the system used to successfully deal with the human asset ought to likewise be extraordinary and dynamic. This procedure ought to incorporate clear and succinct designs for the tending to the kinds of mishaps that and uncovering the wellbeing and security risks that could happen at the worksite (OSHA, n.d.). A successful arrangement, as dependent on the wellbeing and wellbeing program the executives rules given by OSHA in January 1989 is the Four Point working environment Program. The Four Point Workplace Program as its name recommends, it is a program that contains four components in moving toward ideal powerful wellbeing and security principles. These components Duty and Employee Involvement The administrator or supervisory group drives the way, by setting strategy, allotting and supporting obligation, setting a model

Friday, August 21, 2020

Nursing research Essay Example | Topics and Well Written Essays - 250 words - 56

Nursing research - Essay Example In such manner, this procedure of dispersal will incorporate accommodation of a theoretical to the individuals from the crowd three days preceding the introduction so as to offer them a chance to investigate the substance of the introduction before the genuine introduction. As a result, furnishing the crowd with a review of the introduction will be compelling in giving them a chance to pose inquiries following the introduction. My work environment setting depends on the procedure of a blend of productions and banners to scatter an answer. I locate these two procedures ineffectual since they neglect to give the intended interest group a chance to investigate the arrangement and pose inquiries in regards to the solution’s viability in the working environment. Then again, it is apparent that these two procedures are not relational in nature. In such manner, the two procedures just illuminate a person about an answer without giving the individual the chance to investigate the arrangement, which makes the two procedures

Thursday, June 4, 2020

Midnight Lake, An Absolutely Ordinary Rainbow, and Other Poems - An Analysis of Contemporary Australian Values - Literature Essay Samples

Australian poet Les Murray’s poems often reflect his own belief and value system, as well as provide a new outlook on social issues, such as homelessness and drugs, as shown in ‘Midnight Lake’. He also highlights the importance of rural Australian culture, claiming that poetry can ‘model the fullness of life and bring our fullest being in to play’. Natural sacramentalism and the significance of ordinary lives, as shown in ‘An Absolutely Ordinary Rainbow’ and ‘Spring Hail’, are common themes throughout his works. Murray also frequently draws upon Aboriginal culture and how their traditions are gradually being degraded by the Americanisation of Australia, as shown by ’Sydney and the Bush’ and ‘Inside Ayer’s Rock’. Les Murray uses everyday language in a skilled and sensitive way throughout his poems to reflect the values of Australian society and subsequently open people’s eyes to new ideas and perceptions. An Absolutely Ordinary Rainbow serves the aesthetic purpose of reflecting on the social construction of masculinity in Australia and the way in which ordinary human experiences can be something sacramental. Through the use of allusion, synecdoche and symbolism, Murray explores the human condition and how people yearn to have a sense of belonging within Australian society, especially when it comes to masculinity. Inside Ayer’s Rock, on the other hand, serves the ideological purpose of criticising the commodification of Aboriginal culture. Murray shows how Aboriginal culture has been misrepresented, capitalised and mocked through the use of irony, imagery and symbolism. Through using evocative language, the fake and artificial nature of their commodified heritage is highlighted a nd reminds the contemporary audience to not fall for the counterfeit veneer that shrouds Aboriginal customs. The artificiality of commodified Aboriginal culture throughout Inside Ayer’s Rock is presented through the use of industrial imagery. The title â€Å"Inside Ayer’s Rock† does not actually refer to Uluru, but rather the resort and gift shop twenty miles from the tourist destination and Aboriginal sacred place. The setting is described as having â€Å"paired fluorescent lights† on â€Å"steel pillars† with a â€Å"haze-blue marquee cloth† acting as the ceiling. The first four lines immediately present the idea that the resort is not only highly industrial, but also a fake and artificial facade which contrasts the natural beauty of Uluru. Artificiality is also emphasised through the line â€Å"dusted coolabah trees†, providing the image that there are cardboard cut-outs of native Australian flora that have been dusted by the workers there, which further plays into the notion that there is nothing natural about the resort. There is a clear juxtaposition between the natural Aboriginal culture and the man-made misrepresentation. The way in which people have capitalised on Aboriginal traditions in Australia is also criticised through the use of irony. The line about a â€Å"sheet-iron Dreamtime Experience that is turned off at night† is highly ironic a ‘dream’ cannot be ‘turned off at night’. The line emphasises the fact that an age-old storytelling tradition has been capitalised on and lost all merit because of the way it is sold to the public. The owners of the shopfront have fashioned their opening hours to a time that they think would attract the most tourists without taking into account the true experience that is intended. They’re therefore making more money this way and further benefiting from a tradition that isn’t even their own one of the highest forms of cultural appropriation. The idea of televisions that â€Å"talk in gassy colours† further emphasises the point that Aboriginal culture has been exploited. Since Ayer’s Rock is a tourist attraction, the televisions are most likely playing documentaries about native Australians and their heritage to lure people in; â€Å"gassy colours† further evolves the idea of artificiality, too. The degradation and mockery that’s been made of Aboriginal culture is shown in the poem through the use of symbolism and irony. â€Å"Near the entrance, where you pay for fuel, there stands a tribal man in rib-paint and pubic tassel† accentuates just how much the Aborigines have been degraded by society. The whole notion of natives wearing â€Å"pubic tassel† is a tourist misrepresentation that drips irony. The cardboard Aborigine is there as a photo opportunity and is symbolic of the distorted image people have of their culture. When people pose for a picture, they are further degrading Aboriginal tradition by blindly enforcing a humiliating stereotype. They find the cut-out so profound and bizarre that they have to pose for a photo. The bathos in the final line â€Å"In beyond the children’s playworld there are fossils, like crumpled old drawings of creatures in rock† further evolves the idea that Aboriginal heritage has been blindly disregarded. A multitude of misrepresentations has been left to fester in tourist destinations such as Ayer’s Rock, which Murray believes will gradually lead to Aboriginal culture being totally degraded and devalued by Australian society. Through the use of irony, metaphor and symbolism, Murray exhibits just how much Aboriginal culture has been chiseled down, through misrepresentations, into just a shell of what it used to be. Beyond the rich imagery, there is an underlying theme of how a vast culture has been materialised and turned into an artificial commodity which is capitalised on. Just as much as Murray shows that Uluru has been disregarded as a highly sacramental place for the Aborigines by tourists, he demonstrates that ordinary human experiences can be sacramental and how people yearn to feel accepted in An Absolutely Ordinary Rainbow. Stereotypes surrounding masculinity in Australia are explored in the poem through Murray’s use of metaphor and synecdoche. The title An Absolutely Ordinary Rainbow is a metaphor for the display of public grief and is significant because it acts as the basis for the poem’s aesthetic purpose. A rainbow is a familiar phenomenon that is often regarded as beautiful and elicits certain emotional responses. It’s an ordinary occurrence and almost every human has seen a rainbow once in their life, just as most people have experienced the emotion grief. Sadness is a part of day-to-day life, yet, when it is displayed in public, like the rainbow, it’s seen as peculiar. The mentioning of â€Å"uniforms† that are â€Å"back in the crowd† represent conformity and how people blindly accept enforced ideals, especially those surrounding masculinity and the repressing of emotions. The men in uniforms â€Å"try to seize† the man, further evolving the idea that expressing grief in public is not expected of a true man. The event has caused a disruption, even though it’s just a natural, cathartic human response to grief. This elevates the occurrence to something supernatural: The men in uniforms do not know how to react, so they attempt to stop him, conveying that even though an everyday emotion is being publicly expressed, it has disrupted the conformist way of everyday life. The exploration of the human condition and how people yearn to feel accepted within Australian society is also shown through deliberate referencing to real life locations, repetition of allusions and use of Australian idioms, which creates a sense of understanding among Murray’s audience. Through using social hubs and gatherings within Sydney, Murray creates a sense of familiarity with his Australian audience: â€Å"The word goes round Repins, the murmur goes round Lorenzinis†. Australian idioms such as â€Å"fellow† are also used, which adds another layer of familiarity. These allusions help mimic the effect of realism and allow the reader to identify with the poem and feel connected with it. The idea of a man weeping in a public place, acting as a reflection on Australian masculine ideals, is demonstrated through Murray’s use of Judeo-Christian discourse and symbolism, which adds a sacramental element to the occurrence. The weeping man is constructed as some kind of prophet someone who has the courage to openly express his feelings in a primal way. His tears are redemptive, cathartic and regenerative, breaking through the carefully composed ideals constructed by people in the city and the Australian attitude to the privacy of grief. Phrases and words such as â€Å"judgements of peace†, â€Å"a halo† and â€Å"Paradise† make the event a somewhat spiritual experience and suggest a Judgement Day scenario. Similar to Jesus, who wept in the Garden of Gethsemane, the man weeping in a public place demonstrates how he is breaking the masculine ideals which engulf Australian society.​ Les Murray’s poetry uses language in a specially skilled and sensitive way to communicate particular aesthetic and ideological purposes. The degradation and commodification of Aboriginal culture is criticised throughout Inside Ayer’s Rock where Murray demonstrates how misrepresentations and twisted stereotypes have devalued their traditions and sacred icons, such as Uluru. On the other hand, An Absolutely Ordinary Rainbow reflects on the masculine ideals that are held up in Australian society and champions how ordinary human experiences can be something sacramental. Murray has unquestionably been a major figure in contemporary Australian literature and continues to be a cultural critic through his poetry.​

Sunday, May 17, 2020

The Effects Of Divorce On Children And Children - 1548 Words

The Effects of Divorce on Children Mikele J. King Medaille College Abstract The current divorce rate suggests that one out of every two marriages will end in divorce. This paper is a critical literature review that explores the hypothesis that divorce has detrimental effects on children. Six different risks have been suggested to cause the differences in an increased need for help between divorced family children and two-parent family children: parental loss, economic loss, more life stress, poor parental adjustment, lack of parental competence, and exposure to conflict between parents. This paper examines the research on how divorce negatively effects children, and explores the unanswered question of how it effects them through young adulthood. Introduction Divorce is the legal ending of a marriage between two people. The current divorce rate is 50%, meaning one out of every two marriages will end in divorce. The objective of this paper is to conduct a critical literature review by examining various studies and meta-analyses of children who experienced the divorce of their parents. The goal of this review is to support the idea that divorce has detrimental effects on children, as well as examine how it effects them through young adulthood. In 1991, Amato and Keith examined whether or not there were differences between children who live in two-parent families versus children who live in divorced families. They reviewed 92 studies involving 13,000Show MoreRelatedThe Effects Of Divorce On Children And Children1255 Words   |  6 Pages The effects of divorce on children Throughout time, people from all over the world have chosen to live together, or â€Å"get married†. Marriage is a beautiful thing, but there are some couples who are unable to maintain their relationship, because they choose divorce as a solution to cope with the problems between husband and wife. Although divorce can be solution to cope with problem between the husband and wife, it still has dangerous effects especially on their children. Children with divorced parentsRead MoreChildren Of Divorce And Its Effect On Children913 Words   |  4 PagesChildren of Divorce Children of divorce are numerous, the effects of their biological parents separation and subsequent divorce has lasting effects on their behavior, academics, and their emotions. No one seems to care about the prevalence of divorce in society today; it is no longer considered taboo. Every year more than half of all marriages between a male and female end in divorce (Weaver Schofield, 2015), and data from the 1990 census states that over one millionRead MoreThe Effects Of Divorce On Children And Children1540 Words   |  7 Pagesterminated today due to divorce rather than death (Rasul, 2006 p. 30). Although an ancient tradition, divorce rates have been skyrocketing, and the current rates are virtually unprecedented in any industrial society. Many factors might lead to a divorce, and they include: conflicting cultural backgrounds, age differences, child presence, and many more (Schoen, 1975 p. 548). In this research paper, I will attempt to examine the effects of divorce on children, and try to examine how children learn to cope withRead MoreThe Effects Of Divorce On Children And Children900 Words   |  4 PagesDivorce in and of itself does not harm children; it is the intensity and duration of the conflict between parents that negatively impacts a children adjustment. After a divorce or separation, it isn’t uncommon for children to display some behavioral issues. A child acting out shouldn’t come as a complete surprise because after all, a divorce is a challenging obstacle for the entire family to go through. Behavioral issues in children of divorce can range from mild acting out to destructive behaviorRead MoreEffects Of Divorce On Children And Divorce1460 Words   |  6 Pagestoday’s world, most people accept divorce or separation as a way of life. Parents are unaware or do not understand the damage it can have on their children. However, in some instances, it is better to get out of an abusive relationship because that can be as toxic as divorce. On average, 50% of children who are born with married parents, will experience divorce before the age of 18 (Children and Divorce Baucom, 2010-2017). Along with divorce statistics, 40% of children in America are raised withoutRead MoreEffect Of Divorce On C hildren1068 Words   |  5 PagesEffects of Divorce on Children While divorce may reduce strain on a failing marriage, it may cause damaging effects on the children. Often times parents are too concerned on the marriage to notice the effects on children. From the way parents react in front of the children to new marriages all can directly affect the daily lives, and behavior of children. Though, there are ways to mitigate some of the issues that can come with divorce, possibly avoiding some of the effects all together. UnfortunatelyRead MoreDivorce And Its Effects On Children1296 Words   |  6 Pages50% of all the children born to married parents today, will experience the divorce of their parents’ before they are eighteen years old. Divorce in and of itself doesn’t necessarily harm a child, but the conflict between parents does. A child’s behavior correlates directly with the effects of their parents’ separation. Deep emotional wounds are created before, during, and after divorce and separation. It is rare that you find a child that actually wants their parents to separate, unless the marriageRead MoreDivorce : The Effect On Children1084 Words   |  5 PagesNicole Halterman Professor Tausch CTI 102 D Written Communication 4 October 2014 Divorce: the Effect on Children In today’s society, divorce has become a normal occurrence. Married couples today are getting divorces due to many different reasons; conflicts in the marriage, a loss of romantic feelings, perhaps a spouse is having an affair, or other types of problems. Most divorces have children that are really young and due to their age, they do not have any idea how to deal with this type of situationRead MoreDivorce And Its Effects On Children1343 Words   |  6 Pagesknow that the divorce rate in the United States hovers around fifty percent, including forty percent under the age of 21. In that fifty percent one of every six adults is likely to go through a divorce twice. Not only does divorce affect the adults involved, but forty percent of children in the United States will experience parental divorce (Portnoy, 2008). Children with divorced parents struggle with negative consequences emotionally, mentally, and academically compared to those children from intactRead MoreDivorce And Its Effect On Children998 Words   |  4 PagesDivorce has become very popular in the United States. According to the U.S. Census Bureau, on average 50% of marriages result in a failed marriage. This percentage has been at it’s all time high. Not many couples have sustained a successful marriage in present days. Divorces have been around for a long time, and unfortunately kids have always been affected the most according to their age. As a result of divorce, there are many children that have to go through this situation at a very young age

Wednesday, May 6, 2020

The Internet Has Improved Education - 1329 Words

The internet has improved education because of its immediate access to an abundance of information. According to State Univeristy in the article, †Technology in Education - School† states, â€Å"Students once relied upon local and school libraries and their printed reference materials to research topics. Now, however, computer technologies provide access to digital versions of these references–and to libraries worldwide. Encyclopedias on CD-ROMs provide information, digital images, video, and audio, and also provide links to websites where students access tools such as live web cameras and global positioning satellites. Dictionaries and thesauruses are built into word processors. Through the Internet students can gain access to a wide variety of primary and secondary sources, including government documents, photographs, and diaries† (par.22). In other words, having access to the internet in a classroom is really beneficial to the students. Technology gives s tudents the advantage to search up what they are looking for and are provided with plentiful of information. Technology serves as an easier and faster way to look for information on a specific topic. The internet has a lot to offer, especially for students. It gives them the advantage to have the information they need at their fingertips. They are provided with an abundant amount of web pages that they can use to find information to help them complete a research paper. Stephen Mando writes in the article, â€Å"Advanced TechnologyShow MoreRelatedThe Impact Of Technology On Education833 Words   |  4 PagesImagine the education without technology, how hard is that? Technology is very important to the students now. Students and their teachers get in touch from anywhere. Also, achieving other learning objectives such as make assignments and students turning in through the internet by using digital media such as email. The idea of e-learning is not a new idea. Many of the higher lea rning institutions are making efforts in ensuring that distance learning is the method to keep in touch with some of theirRead MoreEssay on Better Technology Means Better Education834 Words   |  4 PagesBetter Education In recent years computers have opened many new opportunities for students and teachers. Technology has advanced past books and black boards. There are more and more computers going into schools everyday. With the world changing into a computer world teaching how do to use technology is necessary. With the new tools that teachers use learning for students is not only more interesting but, more fun. The Internet has helped education leaps and bounds. With the Internet we areRead MoreThe Internet Impacts The Lives Of Every Global Citizen1520 Words   |  7 PagesThe Internet impacts the lives of every global citizen. With wireless internet present in everything from department stores to restaurants, it is evident that people today need the internet just about any time of day. A smartphone would not be considered a smartphone if it lacked Internet access or social media sites. The world today is so interconnected and informed due to the efficiency of the Internet. The introduction of the Internet changed the world for the better with many great improvementsRead MoreImportance Of Internet Education Essay1749 Words   |  7 PagesWhat is the importance of Internet Education and how does the Internet affect our lives? The importance of Internet Education is that it has changed the way students are being taught in schools. It also helps Teachers and Students learn with better and easy learning styles. According to James Wright, â€Å"Teachers use the Internet to supplement their lessons, and a number of prestigious universities have opened up free online lectures and courses to everyone.† (Wright, 2015, para.1). It is easier forRead MoreThe World Wide Web As A Practitioner s Perspective1458 Words   |  6 PagesAccording to Mark Pallen, â€Å"The world wide web is the crowning glory of the internet, providing a uniform, user friendly interface to the net.† The world wide web is the system that connects the internet together, and therefore connects the entire world. Without the interface of the world wide web, the internet would simply be a collections of ones and zeros, not the place of communication, learning, and collaboration it is. The world wide web was the most influential improvement of the 1990s becauseRead MoreVerizon Benefits From A High Customer Retention Rate1481 Words   |  6 PagesSTAKEHOLDER ENVIRONMENT Customers Verizon benefits from a high customer retention rate. The company has the highest customer retention rate in the communication industry. According to a recent Consumer Intelligence Research Partners survey Verizon s customer retention rate is greater than that of their main competitor ATT. Customers choose to stay with Verizon due to the company s reliable network. This reliable network gives Verizon a competitive advantage and is a result of the companyRead MoreWendy Chang Rapid evolution of modern600 Words   |  3 Pageswhich changed the whole world. As the society progresses, technology is becoming more and more advanced. Most people would think that the use of internet changed our life totally. Looking back decades ago we never realized that how our life changed due to the technology. The development and improvement of technology has greatly improved our lives. It has led to a far better, easier and very comfortable life for the people. Nowadays we cannot imagine life without technology because it makes life moreRead MoreBenefits And Limitations Of Network Systems1551 Words   |  7 Pagesnodes. Network systems have greatly improved our lives, work and how we communicate. From shopping to how do business things have become quicker, cheaper and easier. Accessibility has improved as a lot of network systems can be accessed anywhere there is internet. Considering the fact that the internet is accessible in most places it means networks can be acce ssed in most placed. Another huge positive of networks are cost reduction. Everything that we did before has become a lot cheaper to do, althoughRead MoreEffects Of Technology On Society792 Words   |  4 PagesTechnology has improved the world. There are many ways that technology has improved the world such as, improving education, healthcare, improvement on communication and etc. Technology advances show people a more efficient way to do things. For example, peoples education has improved by being able to search new things through the web or getting an online tutor for help. Students are able to take online courses instead of taking regular classes. Technology also benefits us with better education becauseRead MoreComputers, Wifi And Tablets1718 Words   |  7 PagesPriscila Ibarra Stone Period 6 18 March 2016 Executive Summary Computers, wifi and tablets have resulted in student success while in school. â€Å"Wi-Fi has become a universal expectation among students, and their attitudes towards technology are a good indicator of broad changes underway in how we as a society learn, work and communicate,† said Edgar Figueroa, executive director of the Wi-Fi Alliance, the global trade organization representing the Wi-Fi industry. Nearly 75% of US college students believe

Tuesday, May 5, 2020

Policies Procedures For Sony Cyber Attack-Myassignmenthelp.com

Question: Discuss About The Policies Procedures For Sony Cyber Attack? Answer: Introduction A cyber attack was faced by the Sony PlayStation on 11th April in the year 2011. The data breach hacked all the personal details of at least seventy seven million users and their access was also lost (Garrie and Mann 2014). The personal details that were lost included the user name of the customers, their residential addresses, email addresses, date of births, passwords of PlayStation and their usernames. The profile data of PlayStation, their history of purchase and their billing addresses with all the security questions were also hacked. The worse situation was that Sony was not able to understand if the details of their customers credit cards were also breached or not. All the details of case is stated in this report. This report elaborates the details of the Sony PlayStation cyber attack. It gives a detail view on the scenario including the time line, the person mainly responsible for the data breach and the companys response related to the data breach. It also deals with the implications of the cyber security attack that was faced by Sony. The related policies and the procedures that can be initiated by the company to mitigate the attack on the cyber space of Sony PlayStation. And lastly a personal review is given what is cyber security about and a clear review on cyber security. Details of the Sony PlayStation Cyber Attack Scenario including timeline Six years before from now, in the year 2011 PlayStation Network of Sony Company faced a data breach which hacked all the personal details of at least seventy seven million users and their access was also lost (Shackelford, Fort and Charoen 2016). This data breach of hacking the data of PlayStation was considered as the largest hacking that was ever faced by the gamers in the world. The impact of the data breach that happened resulted in- as short term impact to stop access of all the online services of PlayStation for weeks and as long term impact Sony had to gain the trust of the customer back. The story began with the hacktivist group that was umbrella termed which made the attack on Sony PlayStation with DDOS (Distributed Denial of Services) attacks. The attack had made the PlayStation of Sony to come down to its knees several times in the year 2011, April to privacy breach (Kirsch 2014). The PlayStation 3 of Sony was hacked by George Hotz, an American developer on 2nd January 2011. Sony made unforgiveable legal actions against Hotz which made the anonymous very upset. The anonymous group said that the information which Hotz gave was very useful about how to run games that were pirated, way of running homebrew software. The anonymous group declared that they were stopping the attack as because their intension was not to attack the gamers of the Sony PlayStation (Prakash and Dasgupta 2016). Their main motive was only to attack Sony. But again on April 19 2011, PlayStation was again hit by the group of anonymous people. This time the attack was more dangerous. After two days of the attack, Sony got to know that the attack was done and declared the PlayStation as offline. On April 21, Sony tweeted to all its users that the PlayStation was facing some of the problems regarding the online network services and it will remain unavailable until further notice (Chatfield and Reddick 2017). They also said that their support teams were investigating the problem cause which included all the outside parties. Their engineers are trying to solve the problems as soon as possible and regain the services. After working for five days Sony declared that the PlayStation would not come online for three weeks more. The customers could not come online before 48 hours as was declared by Sony (Gupta, Vashisht and Singh 2016). The next day, on 24th April, Sony again apologized for the time it is taking to regain and declared that a severe problem has taken place and investigations are going on regarding its network. Sony has not confirmed that the personal data of their customers were at risk. A week after the accounting, Sony came to know the actual cause of the problem they were facing (Watkins et al. 2015). The engineers of Sony kept on working for hours and their customers were reassured continuously. On 26th April, Sony finally declared about the data breach that has actually taken place. They announced that the personal data, credit card number of millions of people were lost. Sony admitted that they were still investigating on the incident and are trying to resolve the problem as soon as possible. Responsible for occurrence data breach The personal details that were lost included the user name of the customers, their residential addresses, email addresses, date of births, passwords of PlayStation and their usernames (Rao, Chen and Dhillon 2014). The profile data of PlayStation, their history of purchase and their billing addresses with all the security questions were also hacked. The worse situation was that Sony was not able to understand if the details of their customers credit cards were also breached or not. Sony tweeted to their customers that the details of their credit cards may also be lost if they have provided them to the network site (Chaisiri, Ko and Niyato 2015). This made their customers more tensed about the data breach. Because all the systems of Sony failed they were not able to communicate with their customers. They could only aware the PlayStation users after one week of the attack that had taken place. All the posts that were posted on the chat logs by the hackers were all declared by Sony. The hackers insulted the outdated security of Sony (Carley and Morgan 2016). This was considered as the biggest security breach. Sony also had to give clarification about why it took a so much long time to inform its customers about the data breach that had taken place. On this regard the director of Sony Patrick Seybold explained there is a difference between the situation about when the company faced the intrusion and about when they got to learn that the details of the customers were at risk (Crimmins et al. 2015). On 19th April, the company came to know about the intrusion that had taken place and all the services were shut down immediately. Experts were bought from outside to look into that matter and declare the scope of incident. It took several days to analyze the situation and after all these investigations, it was known that the customers information were at risk. They shared the news of data breach as soon as they got to know with all their PlayStation customers. Sonys Response After Sony announced the occurrence of data breach, the user of PlayStation tried to change their passwords of their account. They were unavailable to change their passwords as because the servers were all closed. After the identification of data breach, first class action of lawsuit was filed in between 24 hours (Balushi, Ali and Rehman 2016). Analysts worked on how to regain the trust of the customers which was the huge task for Sony at that time. No users would trust Sony because of the data breach that had taken place. The PlayStations remained offline during those days when analysis was going on. The government of United Kingdom promised and weighed an investigation from the commissioners office. Head of Sony Company had posted an open letter seeking apology to the customers about the intrusion that has taken place. Till date, there was no information about the details of credit cards of users was stolen or not (Pournouri and Craven 2014). They were still working on that sector which made the users of PlayStation more worried. New strategies of maintaining the security of the cyber space was implemented by Sony on May 1st 2011. More apologies were also offered to the customers of PlayStation of Sony (Bradshaw 2015). On a compensation basis, the owners of PlayStation 3 and PlayStation 4 were offered with two games free per systems with an additional offer of subscription of free PlayStation Plus for a month. Sony also promised to have a protection on identity theft free for a year. The offer pleased the customers to some extent. Implications that lies behind the attack of Sony PlayStation The data breach that took place in Sony PlayStation created a danger and a burden to the enterprises of America (Chamotra, Sehgal and Ror 2016). The previous data breaches, Home Depot and Target that took place were not such vulnerable as the data breach that took place in 2011. The attacks that took previously mainly related with less damage that was mainly related to repair the relationships with the harmed parties. A lawsuit was auctioned from the customers or the employees whose personal data was breached and the networks were strengthened to prevent the network from further attack (Mangla and Panda 2013). The data breach that took place in 2011 was very different from all the other data breaches that took place regarding the PlayStations of Sony. The user of PlayStation tried to change their passwords of their account (Deibert 2014). They were unavailable to change their passwords as because the servers were all closed. The impact of data beach lead to hacking of 77million PlayS tation, which lead to a loss of 171 million dollar and also the Sony PlayStation website, was down for almost a month. Out of the 77 million hacked accounts, 12 million users credit cards were encrypted. The impact of the hack lead to access of the full names, e-mails, home addresses, credit card numbers, PlayStation login details and the passwords of all the 77 million users. On 4th May, Sony reported on the Blog of PlayStation about all the queries that the customers were having (Bou-Harb, Debbabi and Assi 2014). They said that they were following four principles regarded to the data breach that has taken place in their PlayStations. The principles were Act with caution and care. The related and valid information were provided to customers after the verification of breach. Their obligations to their customers were Sonys responsibility. Work with the authorities of law enforcement. Explanation for Delaying in Giving Information The attack of data breach on the PlayStations of Sony happened 19th April, 2011. Sony posted a blog on 26th April explaining why it took such a long time to give their PlayStation users information about the data theft (Karanja 2017). They said that there is a difference between the situation about when the company faced the intrusion and about when they got to learn that the details of the customers were at risk. On 19th April, the company came to know about the intrusion that had taken place and all the services were shut down immediately. Experts were bought from outside to look into that matter and declare the scope of incident. It took several days to analyze the situation and after all these investigations, it was known that the customers information were at risk (Zarate 2015). They shared the news of data breach as soon as they got to know with all their PlayStation customers. Criticism faced by Sony As a conclusion, Sony had to face criticism in many sectors in regards the data breach that had taken place. Firstly Sony delayed in giving warning about the data breach that had taken place. Up to one week, they had no idea about what had actually happened. They came to know about the occurrence of data breach after one week it had already occurred. Even after that they had no clue about the credit card credentials of the customers. These lead to second criticism of the company (Dwyer 2015). The company was unable to detect about what number of details were actually lost in the data breach. The full names, e-mails, home addresses, PlayStation login details and the passwords of all the 77 million users were already stolen but they were not sure about the credit cards details of the PlayStation Users. Thirdly the British Information Commissioner Office also criticized Sony for not keeping the details of the users safe (Selznick and LaMacchia 2016). They said that if a company owns the personal details of their users, then it is the duty of the company to look at their security first and Make the security more prominent and strong. Compensation to the Users On a compensation basis, the owners of PlayStation 3 and PlayStation 4 were offered with two games free per systems with an additional offer of subscription of free PlayStation Plus for a month. Sony also promised to have a protection on identity theft free for a year. The offer pleased the customers to some extent. Legal Action that was taken against Sony A lawsuit was proposed in regarded to the PlayStation data breach of Sony. Adequate encryption process and firewalls were suggested to use in the network system of Sony PlayStation (Trusky 2016). Legal actions were also taken against Sony for not keeping the details of the users safe. They said that if a company owns the personal details of their users, then it is the duty of the company to look at their security first and Make the security more prominent and strong. Cyber Security Policies and Procedures for Sony PlayStation Cyber Attack Cyber Security Policies The policies that can be considered to cover the gap of cyber security in Sony PlayStation have new sets of insurance products that can help to cover the risks. Companies are available that provide insurance policies to control the risk factor of related to cyber space in PlayStation of Sony. To fill the drawback that Sony have in regards with the security of their PlayStation user can be fulfilled by the insurers that provide policies of cyber risk (Marshall and Rimini 2015). The policies that are offered by the insurance companies are data compromise coverage, network risk, data coverage of the computer systems and also other cyber liabilities. Policy related to Network Protection and internet Liability are the standard policy that are promulgated by the company of insurance that provide security to the companies that needed insurance. The menu based policies that are included in the agreement of ISO are: Liability regarded with publishing website Liability that are regarded to network security Restoration and replacement of data Cyber extortion Expenses and incomes of the company Data breaches have become very common in this present digital world. To save the money and the valuable information of the customers of PlayStation, Sony should introduce some data breaches security. The impact of data beach lead to hacking of 77million PlayStation, which lead to a loss of 171 million dollar and also the Sony PlayStation website, was down for almost a month. Out of the 77 million hacked accounts, 12 million users credit cards were encrypted (Kelic et al. 2013). The impact of the hack lead to access of the full names, e-mails, home addresses, credit card numbers, PlayStation login details and the passwords of all the 77 million users. To save all these information, insurance companies should be hired so that the data can be kept safe. The policies that should be followed in maintaining the cyber space threats are: Getting started with the idea of policy The policy that is related with the cyber security of Sony PlayStation can range from a single sheet and can be extended up to a fifty page documentation that arise awareness of the users. The document should consist of all the policies from setting up of a secure network to maintenance of the network. If a robust plan is to be made to secure the network of Sony PlayStation, then the document explaining all the policies of the company should be clearly made (Bradshaw 2016). The institute on SANS provides templates to create such policies. The cyber security policy of the Sony should always be documented, maintained and reviewed on regular basis. All the important areas of Sony PlayStation that are related to network should be clearly mentioned in the policies. Compliance Taking help of the federal government gives a roadmap to develop the cyber security plan of Sony PlayStation. The company should work within the law of the government (Sree and Bhanu 2016). Such organizations known as the HIPAA security rule are used to implement and maintain the procedures and policies for protecting technology and data of Sony PlayStation. Infrastructure The company should have well maintained policy for maintain the infrastructure of the company. This provides Sony to create a safe guard against the security of the company. They must ensure their PlayStation users a safe and secure network data transfer. The information that is controlled by the policy of the cyber security is as: The types of security program that is to be implemented building of a secure and safe network. The layered security of the environment must be protected by using firewall, anti exploit software, anti malware and also antivirus. To put a limit a limit on the attack on the surface and to plug the vulnerabilities of the applications, patches and updates are to be applied by Sony PlayStation. Correct frequency should be set and other updates should be done that are enclosed in internet applications. All the data should be automatically backed up by some implemented software. Such software should be implemented by Sony to keep a backup of all the data of their users of PlayStation. The policies should clearly mention the responsibilities and the roles of the employees (Aviles 2015). The policies that are included are: the person who issued the policy and person who is responsible to maintain those policies, the person responsible for policy enforcement, the person responsible for giving training on awareness of security, the person responsible for resolving the incidents of security and the way to control them and lastly the person responsible to control and right of the admin. Cyber Security Controls The priority should be given to all the functions that are related to security control of Sony PlayStation. The targeted threats are increasing day by day in this present world of digitization. The security functions mainly emphasize on what to do to mitigate the control of cyber security that comes on Sony PlayStation (Wilkinson 2013). The SANS Institute provides security mitigation control to all such organization that needs the help of for mitigating the risk on cyber security. Such 20 areas are mentioned where controls for mitigating risks are needed by the SANS institute. They are as follows: For software and hardware secure configurations must be done on laptops, workstations, servers and mobile devices Unauthorized and Authorized Devices inventory Unauthorized and Authorized Software inventory Continuous Remediation and Assessment Vulnerability Security of Application Software Capability to Recover Data Malware Defenses Control on Wireless Access To Fill the Gaps Proper Training is given and Assessment for Security Skill is done Network Devices must have secure configurations such as Routers, Switches and Firewalls Administrative Privileges should be used in a controlled way Control and Limitation of Protocols, Network Ports and Services The need to know are based on Controlled Access Data Protection Management and Response of the Incident Penetration Tests and also Exercises of Red Team Engineering related to Secure Network Analysis, Monitoring and Maintenance of Audit Logs Controlled Access Boundary Defense Table: Critical Control by SANS Institute The Sony PlayStation should adopt all the 20 areas of mitigating the control risk so that the data breach does not take place in future. There are steps that are approached by SANS Institute to reduce risk with the control measures are stated as follows: Step 1: The assessment of initial gap is performed which determines what is to be implemented Step 2: A roadmap is developed that are used to select specific controls and implement all the phases. Step 3: Control of First phase is implemented that identifies the tools to repurpose and utilize fully. Step 4: Control must be integrated to operations that focuses mainly on mitigation and monitoring and also proposes new processes. Step 5: Manage and Report all the progress that is implemented against the roadmap that was developed in step 2. After that step 3 and step 5 are followed Table: Steps to Reduce the Risks Review on Cyber Security According to my aspect of view, cyber security is body of processes, designed practiced and the technologies that are needed to protect device programs, data and network from damage, unauthorized aspects and attack. Security of Information technology is refereed as cyber security. According to me, the Sony PlayStation cyber security data breach took place due to drawback of not using a correct policy and procedures for the security of data. Preventive methods, policies and procedures should have been taken to control the data breach. First of all a data breach took place was known to them after one week after the attack. They were not aware about their network security and the person who is responsible for the maintenance of security of the data of the users of PlayStation should be aware (Huso 2015). The types of security program that is to be implemented building of a secure and safe network should be implemented. The layered security of the environment must be protected by using f irewall, anti exploit software, anti malware and also antivirus. To put a limit a limit on the attack on the surface and to plug the vulnerabilities of the applications, patches and updates are to be applied by Sony PlayStation. Correct frequency should be set and other updates should be done that are enclosed in internet applications. All the data should be automatically backed up by some implemented software. Such software should be implemented by Sony to keep a backup of all the data of their users of PlayStation. The user of Sony PlayStation can to know about the data breach much after the occurrence of the data breach. Conclusion The case study deals with the data breach of Sony PlayStation that has occurred in April, 2011. The data breach that took place in Sony PlayStation created a danger and a burden to the enterprises of America. The previous data breaches, Home Depot and Target that took place were not such vulnerable as the data breach that took place in 2011. The attacks that took previously mainly related with less damage that was mainly related to repair the relationships with the harmed parties. A lawsuit was auctioned from the customers or the employees whose personal data was breached and the networks were strengthened to prevent the network from further attack. The data breach that took place in 2011 was very different from all the other data breaches that took place regarding the PlayStations of Sony. The user of PlayStation tried to change their passwords of their account. They were unavailable to change their passwords as because the servers were all closed. The impact of data beach lead to h acking of 77million PlayStation, which lead to a loss of 171 million dollar and also the Sony PlayStation website, was down for almost a month. Out of the 77 million hacked accounts, 12 million users credit cards were encrypted. The impact of the hack lead to access of the full names, e-mails, home addresses, credit card numbers, PlayStation login details and the passwords of all the 77 million users. This report sheds light on the details of the Sony PlayStation cyber attack. It gives a detail view on the scenario including the time line, the person mainly responsible for the data breach and the companys response related to the data breach. It also deals with the implications of the cyber security attack that was faced by Sony. The related policies and the procedures that can be initiated by the company to mitigate the attack on the cyber space of Sony PlayStation. And lastly a personal review is given what is cyber security about and a clear review on cyber security. To serve the user with secured network should be the main objective of company and to fulfill those all companies should take initiative. References Al Balushi, T., Ali, S. and Rehman, O., 2016. Economics of Cyber Security and the Way Forward.International Journal of Cyber Warfare and Terrorism (IJCWT),6(4), pp.41-57. Aviles, G., 2015.How US political and socio-economic trends promotes hacktivist activity(Doctoral dissertation, Utica College). Bou-Harb, E., Debbabi, M. and Assi, C., 2014. On fingerprinting probing activities.computers security,43, pp.35-48. Bradshaw, S., 2015. Combating Cyber Threats: CSIRTs and Fostering International Cooperation on Cybersecurity. Bradshaw, S., 2016. CHAPTER EIGHT: COMBATTING CYBER THREATS: CSIRTS AND FOSTERING.Cyber Security in a Volatile World, p.105. Carley, K.M. and Morgan, G.P., 2016. Inadvertent leaks: exploration via agent-based dynamic network simulation.Computational and Mathematical Organization Theory,22(3), pp.288-317. Chaisiri, S., Ko, R.K. and Niyato, D., 2015, August. A joint optimization approach to security-as-a-service allocation and cyber insurance management. InTrustcom/BigDataSE/ISPA, 2015 IEEE(Vol. 1, pp. 426-433). IEEE. Chamotra, S., Sehgal, R.K. and Ror, S., 2016. Honeypot Deployment in Broadband Networks. InInformation Systems Security(pp. 479-488). Springer International Publishing. Chatfield, A.T. and Reddick, C.G., 2017, June. Cybersecurity Innovation in Government: A Case Study of US Pentagon's Vulnerability Reward Program. InProceedings of the 18th Annual International Conference on Digital Government Research(pp. 64-73). ACM. Crimmins, D., Falk, C., Fowler, S., Gravel, C., Kouremetis, M., Poremski, E., Sturgeon, R.S.N., Zhang, Y. and Liles, S., 2015, March. US Bank of Cyber. InProceedings of the 16th Annual Information Security Symposium(p. 30). CERIAS-Purdue University. Deibert, R.J., 2014. Bounding cyber power: Escalation and restraint in global cyberspace.Organized Chaos: Reimagining the Internet. Dwyer, T., 2015. Data Governance. InConvergent Media and Privacy(pp. 118-159). Palgrave Macmillan UK. Garrie, D. and Mann, M., 2014. Cyber-Security Insurance: Navigating the Landscape of a Growing Field, 31 J. Marshall J. Info. Tech. Privacy L. 379 (2014).J. Marshall J. Info. Tech. Privacy L.,31, p.i. Gupta, S., Vashisht, S. and Singh, D., 2016, February. A CANVASS on cyber security attacks and countermeasures. InInnovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016 International Conference on(pp. 31-35). IEEE. Huso, C., 2015. To Show, or Not to Show-That Was the Question: A Discussion regarding the First Amendment Issues Implicated by the Sony Pictures Entertainment Cyberhack the Interview Debacle.J. Bus. Entrepreneurship L.,9, p.235. Karanja, E., 2017. The Role of the Chief Information Security Officer in the Management of IT Security.Information Computer Security,25(3). Kelic, A., Collier, Z.A., Brown, C., Beyeler, W.E., Outkin, A.V., Vargas, V.N., Ehlen, M.A., Judson, C., Zaidi, A., Leung, B. and Linkov, I., 2013. Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks.Environment Systems and Decisions,33(4), pp.544-560. Kirsch, C., 2014. The Grey Hat Hacker: Reconciling Cyberspace Reality and the Law.N. Ky. L. Rev.,41, p.383. Mangla, V. and Panda, S.N., 2013. Spectrum of Cyber threats Available Control Mechanisms.International Journal of Advanced Research in Computer Engineering Technology (IJARCET),2(4), pp.pp-1439. Marshall, J.P. and da Rimini, F., 2015. Playstation, Demonoid and the orders and disorders of Pirarchy.Krisis: Journal for contemporary philosophy. Pournouri, S. and Craven, M., 2014. E-business, recent threats and security countermeasures.International Journal of Electronic Security and Digital Forensics,6(3), pp.169-184. Prakash, C. and Dasgupta, S., 2016, March. Cloud computing security analysis: Challenges and possible solutions. InElectrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on(pp. 54-57). IEEE. Rao, A.A., Chen, L.F. and Dhillon, J.S., 2014, November. A preliminary study on online data privacy frameworks. InInformation Technology and Multimedia (ICIMU), 2014 International Conference on(pp. 15-20). IEEE. Selznick, L.F. and LaMacchia, C., 2016. Cybersecurity: Should the SEC Be Sticking Its Nose under This Tent.U. Ill. JL Tech. Pol'y, p.35. Shackelford, S.J., Fort, T.L. and Charoen, D., 2016. Sustainable Cybersecurity: Applying Lessons from the Green Movement to Managing Cyber Attacks.U. Ill. L. Rev., p.1995. Sree, T.R. and Bhanu, S.M.S., 2016. HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and DempsterShafer theory with MapReduce.Security and Communication Networks,9(17), pp.4341-4357. Trusky, A.R., 2016.Friend or foe? The societal benefits and cyber risks of video games(Doctoral dissertation, Utica College). Watkins, L., Silberberg, K., Morales, J.A. and Robinson, W.H., 2015, October. Using inherent command and control vulnerabilities to halt DDoS attacks. InMalicious and Unwanted Software (MALWARE), 2015 10th International Conference on(pp. 3-10). IEEE. Wilkinson, C., 2013. CYBER RISKS: THE GROWING THREAT. Zarate, J.C., 2015. The Cyber Financial Wars on the Horizon.