Thursday, September 3, 2020

Economic Analysis of the Wine Industry

Financial Analysis of the Wine Industry Amar Basnet People need various types of the materials so as to live everyday life some may have more significance and some may have the less significance. In current business world we can discover various types of the result of same kind and same use which is called supplement item. Diverse item has distinctive nature which depends on the utilization, quality, in light of the maker. In any case, as per the idea of the creation item are separated in 3 gatherings which are as per the following: Essential Production: Primary creation those items which are produce normally or the items which are completely founded on the nature are called essential creation. Horticulture creation is a best case of the essential creation. The grapes apple and other which is produce by the rancher is considered as the crude material for wine industry. Optional creation: If the creation procedure is connected with the assembling than it is considered as the auxiliary creation. For instance creation of the TV, vehicle, hardware things and so forth is considered as the auxiliary creation. In this creation procedure collecting process are associated with it. There are different procedure engaged with the wine creation like pulverizing, fracture, and so on which are finished with the assistance of machine which is considered as the auxiliary creation. Tertiary creation: Productions which is connected with the administrations is known as the tertiary creation. The instances of the tertiary creation are training, wellbeing offices, and so on. In ongoing year the wine has become the piece of the human life. Drinking the wine is considered as the significant custom of the advanced society. In ongoing world Spain, America France and Italy is considered as the fundamental maker of wine on the planet. Spanish wine has the great notoriety in the current wine delivering nation. The wines are created by utilizing the normally delivered organic products like grapes, apple and orange and with other product of the decision of person. Spain has significant commercial center in the current wine business world. They are one of the antiquated nations on the planet which produce wine since old period they are delivering the various characteristics of the wine with the distinctive value level. They have the 70 locale and they have the enormous wine yard they are considered as the third biggest nation on the planet in the wine creation. There are different spots which are well known for the wine creation like Valencia, Ribera, Del Duero, P enedes, and so forth. Circulation channel There are 2 sorts of the circulation divert which is found in wine industry are as per the following: Direct channel: According to this channel the maker offer the wine to client with no specialist or retailers here there is no association of the broker or operator because of this cost will be less or modest. Long channel: based on this circulation channel the wine is one produce it is given to distributer for instance to the distributer then it goes to the retailer store, for instance to shop, off-permit and other shop simply after that it goes to the client. On premise of this appropriation channel there is contribution of the diverse channel so the cost will be high when it spans to the last client. Wine creation is one of the significant organizations in the Spain. So as to deliver the wine various procedures are associated with the wine creation. It has the chronicled and social incentive in Spanish society. So as to create the wine different procedure are associated with it the procedure of the wine creation are as per the following: Reap: This is the initial step include in the wine creation. Grapes are the primary crude material for the wine first it ought to be crossbred and need to b blended well the grapes must be collected at the absolutely the perfect chance to deliver the best wine and numerous maker gather their harvest by turns in request to create the quality wine. Presently a days the expert wineries collect as indicated by the taste and shade of grapes. Smashing and squeezing: This is the second procedure that is associated with the wine creation process once the grapes or the organic products which are the crude material are reap they are squashed in the machine however so as to make the wine subjective the seeds and skin are isolated this will assist with making the quality wine and assists with including shading in wine. Fracture: This is considered as another significant procedure in wine creation. When the grapes are squashed and squeezed then the juice is removed and the juice is moved into the enormous compartment in which yeast is included and fracture process begins. It will take 10 to 30 days on; based on the nature of wines the days are resolved. Separating and maturing: Once the grapes are divided the wine are sifted when the strong and yeast has been expelled from the wine and it is dispersed in the jug and case to be matured. There are different maturing forms. It is done based on the age and based on bottle. Wine creation has the different procedures. For the achievement of the any wine industry crude material capital info and work assumes the essential job. Crude material For the wine business grapes, apple, orange and distinctive different foods grown from the ground are considered as the primary crude material. In Spain there are heaps of grapes yard and as per climatic condition grapes are great item to develop and frame monetary perspective the Spanish wine maker they select the grapes as their fundamental crude materials since they are produce in Spain and is modest. A portion of the other crude materials are sugar stick, yeast, mash, acids and tannins and various minerals. Capital information Capital alludes to the whole of the cash put resources into the business so as to create the merchandise. For the accomplishment of the wine business capital info is considered as the existence blood of the business. The fixed resources like hardware, credit from the bank, conveyance vans and engines, all the apparatuses and gear and so forth are considered as the capital contribution to the wine business. So as to work the everyday business capital information is extremely basic without the capital info the wine creation can’t push ahead. Because of this explanation we can say that capital info assumes indispensable job in achievement of the wine business. Work prerequisite For the any business subjective labor is required. In the wine business likewise qualified and experience work is required. The quality wine maker can work everyday business also as can expand the proficiency in the creation of the wine this will help in the creation of the quality wine. The wine showcase has gotten serious so as to contend in the serious market productive and qualified work power is required who has potential, which has ability to expand the proficiency in the work and required those work power who can comprehend advertise circumstance. For the any business association cost control and costing process assists with pushing ahead. This is one of the basic factors that help to maintain the business effectively. So as to deliver merchandise firm utilize crude materials, variables of the creations which are called input. The use which is happened in it is called cost. There are two kinds of the cost variable expense and fixed expense. The cost which doesn’t change with the change amount yield is called fixed cost where as the cost which change with changing yield is called variable expense. Fixed expense is regularly related with the fixed factor of creation where as factor cost is connected with variable factor of the creation. The case of the fixed expense in the wine business are wages of the staff, lease, protection, enthusiasm on the fixed capital and so forth where as the case of the variable expense in the wine business are wages of the easygoing work, costs of the power and so on in the Spanish wine organi zation ordinarily the devaluation charge for the machine, pay for the perpetual staff, protection for the organization are fixed cost they don’t change in spite of the fact that they make creation high or low. They don’t impact of the yearly planning on the grounds that once they are decide they will be same for that whole year . the variable cost change with the change with the per unit creation. The power charge is one of the genuine case of the wine business, when the creation is high then heaps of power is utilized might be during discontinuity procedure might be during smashing machine is utilized the more wine we produce greater power is utilized so it change with the evolving yield. Economy of the scale alludes to the diminishing in unit cost of an item or administration coming about because of huge scope activities, as in large scale manufacturing. This idea of the economy assists the any business association with running since a long time ago run and aides in the current serious worldwide market. In the event that the wine maker can create the enormous measure of the wine than they can purchase the huge measure of the crude materials from the maker on the off chance that they take in mass sum, at that point they can get in the less expensive cost, when the great and high innovation hardware is utilized the creation will high and creation cost will be less because of which huge size of the creation is fruitful this will help the maker the subjective beneficial item in less expensive cost. The economy of the scale can be accomplished by recruiting the new innovation machine, qualified labor, by expanding the size of organization and machine. This will help in de creasing the creation cost and assists with expanding the yield. The economy of the scale is therefore feasible in the creation by the since quite a while ago run creation. So as to accomplish the prudent of the scale the wine maker should accentuation in the expanding the fix cost and diminishing the variable expense. So the wine business ought to consistently accentuation to locate the certified work power which are notable and has understanding about wineries, ought to consistently attempt to introduce the new innovation machine which

Saturday, August 22, 2020

Si chuan earthquake Essay Example | Topics and Well Written Essays - 250 words

Si chuan seismic tremor - Essay Example particle System, uncovers that a large portion of the nearby governments in China came up short on the Decision Support System for every day the board; along these lines, in any event, during crisis circumstance, they didn't have this critical apparatus. (Liu and Ren, 2009). This proof backings my contention since it shows that there was no readiness to deal with crisis circumstances, for example, seismic tremor. Choice Support System is a pivotal apparatus in taking care of the board and crisis issues; henceforth, it ought not need neighborhood government since tremor is inclined in rustic zones (Liu et al, 2006). An article on the China Earthquake Geospatial Research Portal proposes that it was conceivable to foresee the extent, and what's more, previous analyst, Geng Qingguo of Institute of Geophysics asserts that he gave a secret composed report about his expectation of the quake to the State Seismological Bureau (Pekevski and Mavrodiev, 2008). This article is fundamental in giving proof since it uncovers that the vital organizations were cautioned of the looming quake catastrophe, yet they neglected to take important activities. Hence, they likewise neglected to set up satisfactory readiness to limit loss of lives and property pulverization. At last, a multi year UNICEF report dated May 2010 likewise shows that much could have been done to make readiness, for instance, adjusting crisis reaction activities or projects with upstream approach programs (UNICEF, 2010). This report uncovers that there were no approaches set up to manage such crises, for example, upgrading intercession in crisis circumstances require coordination of crisis programs with arrangement activities, which were inadequate for this situation. I will even now need to get proof on measurable information in regards to the level of loss of lives and associate it with poor readiness. I will likewise need to get proof on what the administration specialists state about the forecasts and their degree of readiness. These I will get from the Chinese government department’s

Friday, August 21, 2020

Governance and Risk in Finance, Term Project 1 Essay

Administration and Risk in Finance, Term Project 1 - Essay Example The full scale hazard elements can be political, efficient, social and innovative elements called PEST investigation. The large scale financial factors producing full scale dangers are cost records, trade rates, ware costs, factors of money related arrangement and so on. Be that as it may, there are sure FICO score offices who give FICO assessment to foundations from superb to poor like A.M.Best, Dun and Bradstreet, Standard and Poor’s, Moody’s, and Fitch Ratings. The Standard and Poor gives rating scale going from AAA to BBB to CCC to D. Rating lower than BBB-is considered as garbage or theoretical bond. Sound corporate administration empowers associations to control hazard previously. Antagonistic takeovers are frequently observed as from administration perspective as the danger of takeover is accepted to apply pressure on chiefs to act securing the enthusiasm of investors. Content Corporate administration can be alluded to as the structure and procedures through whic h the undertakings and business of an organization are overseen and guided so as to improve the investor esteem over long haul through upgrade of responsibility and corporate execution thinking about the enthusiasm of different partners. Hazard the board is alluded to as the appraisal, distinguishing proof and hazard prioritization. It alludes to as the impact of vulnerability on goals. Administration and hazard in money are firmly related concerns. Indeed, administration, hazard and consistence (GRC) are coordinated regarding dodging strife and holes inside an association. It is deciphered in different associations in various way. It includes exercises of corporate administration, corporate consistence with laws and guidelines relevant and enterpriser chance administration (ERM). Presentation Corporate administration doesn't give any single, acknowledged definition. It suggests the manner by which an organization can be figured out how to guarantee the entirety of its partners with the goal that they can get a lot from the income of the business or from the firm’s resources. It gives the arrangement of coordinating and controlling the organizations. In present days, corporate administration envelops the enthusiasm of investors as well as numerous partners. The explanation hidden this reality is that enthusiasm of investors must be fulfilled by considering the enthusiasm of partners as organizations responsible to the entirety of their partners are increasingly fruitful and prosperous over the long haul. Thus, corporate administration lays on the view of boosting esteem creation by organizations over long haul by releasing the responsibility to the entirety of their partners and by streamlining the arrangement of corporate administration. It is additionally founded on the financial idea of amplifying market esteem that came up short on investor private enterprise as it outlines rule to direct business as per the wants of investors and proprietor, requir ing to bring in cash however much as could be expected affirming to the fundamental standards of society as typified in nearby traditions and law. There are difficulties in current society to manage hazard properly and successfully oversee it. Worldwide Risk Governance Council (IRGC) has given certain administration instruments to successfully manage dangers. Executing such administration mechan

Saturday, June 13, 2020

Sonic Imagery in Stephen Crane’s Work - Literature Essay Samples

Stephen Crane, one of Americas foremost writers of the realist genre, frequently used a sonic aesthetic to breathe life into his descriptions of poor urban environments. In both Maggie: A Girl of the Streets and Experiment in Misery, Crane associates loud and chaotic dissonance with the poor urban community. The shared experience of loud, dissonant sounds identifies and strengthens the community within these poor urban spaces. On the other side, Crane typifies the wealthier with low volumes and pleasant music. The middle and high classes are able to escape such cacophony, and are afforded the luxury of soft, low and indistinct sound and music. Crane also highlights sound when penniless characters are reminded of their inability to elevate their own status, again portraying sound as a representational form to convey social standings. Crane’s illustrations of sound essentially give representational form to the social phenomenon of inequality. Crane’s descriptions of sound as disorderly and inharmonious amplify the chaos and suffering within the cramped confines of poor communities; this sonic discord marks and strengthens the destitute as a solidified social group. As Mary beats Maggie for breaking a plate, Jimmie listens to the hall of his apartment complex: â€Å"Above the muffled roar of conversation, the dismal wailings of babies at night, the thumping of feet in unseen corridors and rooms, and the sound of varied hoarse shoutings in the street and the rattling of wheels over cobbles, they heard the screams of the child and the roars of the mother die away to a feeble moaning and a subdued bass muttering† (Crane 10). Words like â€Å"roar,† â€Å"wailings,† â€Å"thumping,† â€Å"shoutings,† â€Å"rattling† and â€Å"screams,† convey intense volume and evoke images of disorder. The clamor of sound reflects the chaos of this poor urban community. The choice of the word â€Å"dismal† also conveys the distress of the members of this collective community, while the word â€Å"hoarse† to describe the shouting evokes the image that this individual has been continuously shouting in anguish or pain. The phrase â€Å"unseen corridors and room† communicates the ignored nature of this destitute community. Moreover, Crane describes the sounds of the tenement as cramped and collective. While there are distinguishable wails, and Maggie and Mary’s screams can be heard dying down, the descriptions of the sounds are continuously listed one after another, almost combining to form this single dissonant note that is unique to poor, suffering communities. The wailings, roars, thumping and rattling all amalgamate to create this representational form of the poor’s class standing and suffering. After Maggie dies, Mary’s loudly weeps, â€Å"rocking her body heavily to and fro, and crying out in a high strained voice that s ounded like a dirge on some forlorn pipe† (Crane 74). The rhetoric and comparisons of Mary’s voice to a lament of the dead from a pitifully sad instrument underline the sonic intensity and the extent of the pain that she experiences. Mary’s loud and exaggerated reaction acts as a calling signal for her poor urban community; her sounds summon her neighbors to gather and loudly grieve with her: â€Å"Two or three spectators were sniffing, and one was weeping loudly†¦ The women burst anew into cries as if they had been stabbed† (Crane 74-75). Mary’s ability to loudly call for her community conveys how Crane uses sound as a representational strategy to depict the poor as a collective. Mary simply needs to loudly wail, and her penniless peers come to cry and sympathize with her. In this sense, cacophony and the chaos of the sonic is a key identifier of the collective poor, and strengthens and solidifies the community. In An Experiment in Misery, Crane also gives representational form to the lower class through descriptions of sound. At a homeless shelter, the youth hears the â€Å"guttural cries, grunts, oaths† of sleeping men, and a man who, because of a nightmare, â€Å"began to utter long wails that went almost like yells from a hound, echoing wailfully† (Crane 82). Much like in Maggie, phrases like â€Å"guttural cries, grunts, oaths† and â€Å"long wails† signify pain and suffering. Furthermore, the comparison of the man’s wails to the â€Å"yells from a hound† also evokes comparisons of the destitute man and a loud mutt, essentially placing the youth and the dog on the same level. Also, similar to in Maggie, the communal cries and wails of these men indicate a sense of community or shared sense of misery within the shelter. Crane even explicitly states this idea: â€Å"The sound, in its high piercing beginnings that dwindled to final melancholy moan s, expressed a red and grim tragedy of the unfathomable possibilities of the man’s dreams† (82). The shared experience of the unpleasantly sonic links these men together. These sounds simply do not come out of individuals but represent the room’s shared sense of impossibility and lost hope. Whereas the poor must collectively suffer through cacophony, the wealthier are able to indulge in subdued, indistinct sounds and music, which only further signifies the divide between the rich and poor. When Pete takes Maggie on a date to a theatre for the middle class, they hear a â€Å"low rumble of conversation and a subdued clinking of glasses† (Crane 25). Words like â€Å"low,† â€Å"rumble,† and â€Å"subdued† indicate a pleasant level of volume, a stark contrast to the loudness that characterizes Maggie’s tenement. In the theatre, people can talk freely and not have to shout over the noise of the city – an unfamiliar concept to Maggie. In this sense, wealthier people can â€Å"afford† to carve places in the city where they have space and quiet. They have the luxury of a peaceful level of sound that the poor cannot bear the expense of. Maggie, undeniably a member of the lower class, savors this pleasantly sonic experience  œ it is a break from the chaos of home life. She also experiences the luxury of music at the theatre: she enjoys a singer’s â€Å"brazen soprano tones,† and the singer is praised with â€Å"long rollings of applause† (Crane 27). While words like â€Å"brazen,† â€Å"soprano† and â€Å"long rollings† impart a sense that the singer’s voice is loud and shrill and the audience is noisy, there is still a significant difference between the volume in the theatre and the volume in Maggie’s tenement or the shelter in Experiment. The loudness in the theatre is celebratory, whereas the uproar of poorer areas communicates a sense of suffering and pain. The singer’s audience is overjoyed with the singer’s boisterous performance. They extol her ability to command sound and showcase it to a public willing to relish in her loudness. The theatre reacts similarly to subsequent singers and the orchestra which played â€Å"noisily,à ¢â‚¬  as a small fat man begins to â€Å"roar a song† and â€Å"stamp back and forth† (Crane 29). The crowd â€Å"laughed gleefully,† and â€Å"broke out in excited applause† (Crane 29). Musical uproar is not a sign of discord for the middle and high class, but as a means of entertainment and mode of happiness. The poor does not have music. Instead, they hear the wailings of babies and hoarse shoutings. They simply cannot afford the luxury of happily listening and dancing to music in the company of a gleeful and celebratory crowd. Crane’s descriptions of the middle class enjoying low, subdued conversation and melodic and euphonious music essentially gives representational form to the lives of the middle class. Crane often pairs a sonic aesthetic with moments when low class characters are alienated and reminded of their inability to elevate their own status. When Maggie and Pete go to a bar primarily filled with the middle-class patrons, she meets Nellie, a woman who essentially undermines Maggie’s plans to marry Pete. The club’s sonic atmosphere starkly contrasts to the theatre’s: â€Å"The room rang with the shrill voices of women bubbling over with drink-laughter. The chief element in the music of the orchestra was speed. The musicians played in intent fury. A woman was singing and smiling upon the stage, but no one took notice of her† (Crane 54). â€Å"Shrill† has a negative connotation, evoking images of piercing shrieks. The music, previously a sign of excitement and celebration, is now rushed, and played with calculated â€Å"fury.† A singer is practically ignored and not applauded like the singer from the theatre. Those who attend this bar d o not indulge in the art of the sonic as they had before. Crane’s deliberate rhetoric serves as a reminder to Maggie, presumably one of the only members of the low class at the bar, of her cacophonous poor community. At this club, Nellie seduces Pete, and Maggie is unable to participate in Pete and Nellie’s conversation: â€Å"Maggie sat still, unable to formulate an intelligent sentence as her addition to the conversation and painfully aware of it† (Crane 55). Not only is sonic chaos an indicator of Maggie’s decline in the novel, but it is a harsh reminder of her low-class life – her true status. Unlike before when Maggie was able to assimilate and celebrate with the audience of the theatre, she can no longer connect with Pete and Nellie, members of the higher class. The change in the volume of sound and music in the theatre versus in the bar helps to represent Maggie’s shift from hope for joining the higher class to realization that she ca nnot. Similarly, in An Experiment in Misery, sound reminds the narrator of his alienation from the higher class and his inability to escape destitution. As the end of the short story, the protagonist wanders through New York and hears the â€Å"roar of the city† (Crane 88). This â€Å"roar† is different than the roars of Maggie’s apartment complex or the homeless shelter – that dissonance is on a smaller scale. The whole city is unfamiliar to him; he cannot distinguish certain wails and cries and he has not seen the faces and bodies of those who make such noise. In this case, the â€Å"roar of the city† further removes him from assimilating into the overall city, not just enclaves for the poor. He â€Å"confesses† himself an â€Å"outcast,† and begins to wear the â€Å"criminal expression that comes with certain convictions† (Crane 88). The dissonance of the city makes him feel alienated and less able, unlike the discordance of the shelter, a community he strongly identifies with. Part of Crane’s representational strategy essentially imparts to the reader how sound represents different forms of social status. He characterizes the poor urban community with descriptions of uproar and clamor, and emphasizes how this dissonance strengthens this community. On the other hand, Crane describes low volumes and pleasant music as a luxury that only the middle and high class can indulge in. Crane also uses cacophony as a representational strategy to humble the penniless and alienate them from their wealthier environments. The representation of sonic discordance being a mark of the poor community has not changed since Crane wrote Maggie: A Girl of the Streets and An Experiment in Misery in the 19th century. Today, urban noise pollution is worst in poor and minority neighborhoods and segregated cities, and has physically affected members of these poorer communities (Casey).

Sunday, May 17, 2020

A Country Study on the Ancient Cultures of Japan

On the basis of archaeological finds, it has been postulated that hominid activity in Japan may date as early as 200,000 B.C. when the islands were connected to the Asian mainland. Although some scholars doubt this early date for habitation, most agree that by around 40,000 B.C. glaciation had reconnected the islands with the mainland. Populating the Land of Japan Based on archaeological evidence, they also agree that by between 35,000 and 30,000 B.C. Homo sapiens had migrated to the islands from eastern and southeastern Asia and had well-established patterns of hunting and gathering and stone toolmaking. Stone tools, inhabitation sites, and human fossils from this period have been found throughout all the islands of Japan. The Jomon Period More stable living patterns gave rise by around 10,000 B.C. to Neolithic  or, as some scholars argue, Mesolithic culture. Possibly distant ancestors of the Ainu aboriginal people of modern Japan, members of the heterogeneous Jomon culture (ca. 10,000-300 B.C.) left the clearest archaeological record. By 3,000 B.C., the Jomon people were making clay figures and vessels decorated with patterns made by impressing the wet clay with braided or unbraided cord and sticks (Jomon means patterns of plaited cord) with growing sophistication. These people also used chipped stone tools, traps, and bows and were hunters, gatherers, and skillful coastal and deep-water fishermen. They practiced a rudimentary form of agriculture and lived in caves and later in groups of either temporary shallow pit dwellings or above-ground houses, leaving rich kitchen middens for modern anthropological study. By the late Jomon period, a dramatic shift had taken place according to archaeological studies. Incipient cultivation had evolved into sophisticated rice-paddy farming and government control. Many other elements of Japanese culture also may date from this period and reflect a mingled migration from the northern Asian continent and the southern Pacific areas. Among these elements are Shinto mythology, marriage customs, architectural styles, and technological developments, such as lacquerware, textiles, metalworking, and glassmaking. The Yayoi Period The next cultural period, the Yayoi (named after the section of Tokyo where archaeological investigations uncovered its traces) flourished between about 300 B.C. and A.D. 250 from southern Kyushu to northern Honshu. The earliest of these people, who are thought to have migrated from Korea to northern Kyushu and intermixed with the Jomon, also used chipped stone tools. Although the pottery of the Yayoi was more technologically advanced, it was more simply decorated than Jomon ware. The Yayoi made bronze ceremonial nonfunctional bells, mirrors, and weapons and, by the first century A.D., iron agricultural tools and weapons. As the population increased and society became more complex, they wove cloth, lived in permanent farming villages, constructed buildings of wood and stone, accumulated wealth through land ownership and the storage of grain, and developed distinct social classes. Their irrigated, wet-rice culture was similar to that of central and south China, requiring heavy inputs of human labor, which led to the development and eventual growth of a highly sedentary, agrarian society. Unlike China, which had to undertake massive public works and water-control projects, leading to a highly centralized government, Japan had abundant water. In Japan, then, local political and social developments were relatively more important than the activities of the central authority and a stratified society. The earliest written records about Japan are from Chinese sources from this period. Wa (the Japanese pronunciation of an early Chinese name for Japan) was first mentioned in A.D. 57. Early Chinese historians described Wa as a land of hundreds of scattered tribal communities, not the unified land with a 700-year tradition as laid out in the Nihongi, which puts the foundation of Japan at 660 B.C. Third-century Chinese sources reported that the Wa people lived on raw vegetables, rice, and fish served on bamboo and wooden trays, had vassal-master relations, collected taxes, had provincial granaries and markets, clapped their hands in worship (something still done in Shinto shrines), had violent succession struggles, built earthen grave mounds, and observed mourning. Himiko, a female ruler of an early political federation known as Yamatai, flourished during the third century. While Himiko reigned as a spiritual leader, her younger brother carried out affairs of state, which included diplomatic relations with the court of the  Chinese Wei Dynasty  (A.D. 220 to 65).

Wednesday, May 6, 2020

Imagine a land, untouched by modern civilization, its...

Imagine a land, untouched by modern civilization, its resources untapped, its plants grow wild and its animals roam free. It is the last Ice Age, and much of the planet’s water supply is locked up in sheets of ice spanning across the globe. A land bridge by the name of Beringia has emerged from the depths of the Bering Sea, and what was once a foreign land is now the setting for thousands of years of discovery, settlement, and the birth of the country we now call the United States of America. The first people to make the trek across Beringia from the Asian continent were believed to have been following game, hunting, and trying to survive. It took hundreds of years for these first nomads to make their way across North America, and hundreds†¦show more content†¦Every new native settlement varied slightly, but what remained constant was the heavy reliance on hunting, foraging, agriculture and more importantly, trade. They relied on trade to acquire items such as food an d supplies that could not be made readily available. These settlements grew into vast populations with some reaching as many as 20,000 inhabitants. Complex societies formed with social norms and Hierocracies, while small towns turned into primitive cities. These civilizations, with time, would come and go as new tribes would form and the native people would continue to advance. The native people relied heavily on their ancestral stories passed on from generation to generation. The elders would speak to those willing to listen. Story telling became the elder’s transfer of wisdom, the younger natives’ way of gaining the most important knowledge about life, and a form of entertainment. The land was their most critical asset; it was the hand that fed them, it was the rain that rejuvenated their withered plants, the floods that came from their sacrifices to the gods, and the forces of nature that were weaved so intently into their beliefs. The land was everything. They enc ountered many obstacles, but through their wisdom and keen sense of survival, the indigenous people of the Americas persevered. They had no knowledge of what lied beyond the oceans that bound them, but they remained content with what theyShow MoreRelatedOrganisational Theory230255 Words   |  922 Pagesrigorous theoretical argument with application and consideration of how managment practice is formed and shaped by ideas and concepts. The authors have brought their wealth of experience and understanding and provided the field with an imaginative resource to address the dynamics between theory and practice. Dr Susanne Tietze, Bradford University, UK The key to success for managers is not only to be result oriented but also to be wise in their decision making. This requires that they have a deeper

An Investigation of Risk Management Practices in Electronic Banking

Question: Discuss about An Investigation of Risk Management Practices in Electronic Banking? Answer: Identification and evaluation of the IT security risk Security threats to the IT structure can be regarded as a champion among those benefits that are generally traded off the most as revealed by the Report on 2014 Verizon Data Breach. The inspiration driving why the main focus is put on the databases as regularly as would be prudent is entirely clear: they fill in as the center of any affiliation that is able to uphold the reports from the clients and, what's more, other mystery information on business (Aljawarneh, 2011). Most important security risk in the operation of Auto Spares and Accessories Limited (ASA) Phishing: This is an exceptionally well known method for accessing the classified data of the true blue client. Regularly this strategy is received by the unapproved client. In the vast majority of the cases, the fraudster joins a connection of hyperlink with the email and after that, it is sent to the authentic client (Yu et al. 2011). The minute client taps on the hyperlink or opens the connection considering it to be verifying malware gets infused in the framework. Next time when the client would include in the online exchange, the malware would begin taking the private and secret information and data. Excessive and Unused Privileges: At the point when some individual is surrendered database preferences that outdo the needs of their occupation work, these focal points can be abused. For the test, a worker of the bank whose occupation necessitates the authority to alter essentially contact data of the record holder may mishandle unnecessary database preferences and augment the record correspondence of an accomplice's record (Imperva, 2015). Further, when some individual alteration parts within an alliance or spurns it in light of current circumstances, reliable his or her path rights to sensitive information don't change. Privilege Abuse: Customers might mistreat authentic database advantages for the purposes that are generally unapproved. Consider an inward restorative administration's application used for observing solitary records of the patient using an interface that is the custom web (Baracaldo and Joshi, 2013). The web application conventionally limits customers for watching the social protection history of an individual tolerant various patient records could be found in the meantime, and electronic copies are not allowed. Malware: Computerized gangsters, developers bolstered by state, and the spies make the use of consolidating in order to cut edge level of diverse ambush systems, for instance, embedding the malware with the additional phishing messages. With the help of this method, they get the chance to be prepared to assault the vulnerable data of the affiliations (Pilling, 2013). Along these lines, the honest to goodness customers transform into the certain setback of these social affairs of software engineers as they frequently stay unmindful of such activities. Exposure of Storage Media: Support stockpiling media is routinely and absolutely unshielded from strike. Accordingly, different security breaks might have integrated the burglary of tapes and circles of database support. In addition, powerlessness to survey and sieve out the activities of executives having low-level right to use to fragile information can place the data at risk (D'Agostino and Wilshusen, 2011). Taking appropriate measures for safeguarding fortification copies of fragile data and filter out the most astoundingly extraordinary customers is a data best practice of security, and additionally instructed by multiple regulations. Use of Disposed and the Databases Wrongly Configured: It is elementary to locate the unprotected and unmodified databases, or to discern databases that yet have some of the recordings for sure and parameters for setup. Aggressors have the knowledge of the means to shove these susceptibilities to dispatch strikes against the affiliation (Yu, Kim and Unland, 2011). Sadly, affiliations routinely struggle to keep on centered of maintain the database setups despite the availability of the patches. Average issues join high mounting and workloads abundances for the relevant database heads, mind boggling and dull needs for examining the patches, and the test of finding a bolster window to cut down and make a try at what is consistently named a business-essential system (Durbin, 2011). Sensitive Data managed improperly: Various associations fight to carry on an exact load of their related databases and the essential data things contained within them. Tricky data in these databases will encounter the perils provided the needful controls and assents are not completed. Denial of Service: This is regarded as an assault exceptionally broad in nature in which the true blue clients are unable to obtain the information within the utilizations of system (Kiltz, 2011). Few of the procedures arrive to execute such a situation. An extremely basic strategies is to redevelop the assets recognized with the main server by throwing enormous number of questions or with a little amount of inquiries that are all around made and proficient to devour the assets of the framework in an unbalanced way (Pilling, 2013). As an unavoidable result, in either of the cases the primary servers begin starving and get to be inert and even crash additionally now and again. Controlled Proficiency of Education and Security: Within the security regulations are not becoming according to the data improvement and controls, keep up approaches, or synchronize the frames of scene response. As revealed by a report, 30 percent of burst scenes of data, the key hidden driver was designated the "human component" toward the end of the day, an insensitive delegate or contractual work. Multiple affiliations generally are not very much equipped to entail a security break (D'Agostino and Wilshusen, 2011). Routinely this is an outcome of the nonattendance of eligibility required to execute security controls, keep up the approaches, or organize the scene response frames. Mitigation strategy of these risks ASA can adopt Six different classes of arrangements can be arranged in that give the patches and settles against the security dangers specified above and along these lines gives the commendable best practices. Mitigating for DoS: Escalated Understanding of the vulnerabilities that can risk the databases through data implantation is to an awesome degree required. Malware might try to misuse the database exposures that are hidden, and thus making them an accommodating target. The Denial of Service (DoS) ambush to the application-layer can be engaged by the powerless guidelines of check by permitting the passage to a particular database without necessitating a mystery key (Kiltz, 2011). Mitigation of Risks from wrongly configured databases: Scoring of the perils is fundamentally performed taking into account the severity of the susceptibilities as well as on the affectability of the information (Turiel, 2011). The standards for the Severity are to be subject to recognized frameworks like the Common Vulnerability Scoring System (CVSS). Alternate points of view like the threat, organization, and investigation of the vulnerabilities could be sorted out by the peril score. Under this situation, more noteworthy scores of peril would compare to the infusion of the data (Mansfield-Devine, 2011). Mitigation of the Vulnerabilities: On the off chance that any weakness is discovered and the database merchant have not yet discharged a scrap, a reply for the virtual fixing has to be utilized (Lesk, 2013). These fundamental patches would keep on conflicting the activities to make use of the receptiveness without the necessity of real fixes or adjustment to the current setup of the server until and otherwise they get crushed (D'Agostino and Wilshusen, 2011). Mitigation from malware and virus attacks: The hosts contaminated by the malware could be recognized in order for keeping these devices from obtaining the doorway to the helpless data in the databases as well as to the unstructured information stores too (Hipgrave, 2013). Recognize and Categorize Susceptible Data: The articles, columns and the qualities of the databases can be examined to pinpoint the powerless information (Turiel, 2011). The arrangements of information order could be utilized that are familiar with different sorts of information like Visas, mail addresses, and the character numbers adequate all across the country, and which the custom information sorts can be included with also (Baracaldo et al. 2013). Mitigation Solution for external data: The long haul procedures of information archival could be robotized. Arrangements that could be intended for chronicling information intermittently to the frameworks for outside mass stockpiling ought to be utilized (Imperva, 2015). The decision for the discretionary pressure, encryption and sign before the archival ought to likewise arrive. Mitigation Solution for Phishing: The defenseless information ought to be encoded the whole way across the situations of the database non-uniform in nature (Genera, 2015). This empowers one to defend both generation and recuperation documents of databases. Thereafter, the action and get to control to the vulnerable information from the clients fit to get to the databases at the OS and levels of capacity must be inspected. Mitigation from excessive and unprivileged access: The staff of data security is to be contracted who are sufficiently gifted in IT Security and have satisfactory involvement in the usage, organization, and observing of security answers for ensures against an expanded arrangement of dangers both inside and outer (Baracaldo and Joshi, 2013). The instruction and preparing continuous in nature are additionally essential for creating learning. Risk Assessment Procedures In the previous task module, the identification and evaluation of the potential risks that lay underneath the IT operations of Auto Spares and Accessories Limited (ASA). The next phase after the successful identification of the risk is that the ASA must develop an effective and efficient method to handle the risks. After analyzing the risks in the dedicated web based architecture of ASA, the risk needs to be treated and monitored. Treating and monitoring the risks to control the harms known as risk assessment process. Managing the risk in ASA follows different procedures like developing a way to spot the risk from happening or accepting the risk by assigning some tasks to other entities and neutralizing it (McNeil, Frey, and Embrechts, 2015). In ASA, the potential risks are identified and then treated to minimize them. Evaluating the data protection procedure in the ASA Treating and evaluating Phishing Activity in ASA: Phishing in ASA is treated as a vital threat to the customers as well as the company for the transaction. Phishing attacks are anonymous and steal the users banking ID and password without their knowledge. Since APA is considering the to make their online purchasing of products totally online based; the security and protestation against simple phishing or the more advanced spear phishing are necessary. In ASA, phishing activity can be controlled by guarding their single computer connected to the network from spam messages and ensuring that no personal financial data is never being communicated through emails or insecure hyperlink websites (Hong, 2012). The Security system of ASA always needs to update with firewalls and antivirus to protect the system from new and advanced attacks. Regular monitoring for phishing attacks is needed. Treating Excessive and Unused Privileges: ALL the data in ASA is backed up in a single database. It is highly recommended to secure the database from any risk. The excessive usage of the database can be controlled by revising the security control of the database and the access policies (Akanji, and Elusoji, 2014). Since the database is also accessible to the customers to search through different products, the integrity and isolation of the database must be ensured. The segmentation between the various sub-databases of the single database architecture needs to be protected by the firewall. Regular update and checking of any unusual activity in the database will help in preventing the risks involved. Privilege Abuse: According to ACFE (Association of Certified Fraud Examiners), a typical corporation loses about 5% of their annual revenue every year because of privileged access to their employees (Thakkar, 2015). In order to stop the privilege abuse in ASA, the number of privileged accounts is ASA database needs to be reduced. The ASA need to train their employees efficiently about the different attacks and the practice of logging out of their account. PUMA (Privileged User Monitoring and Access) should be installed in the ASA IT system to monitor every activity of the user (Ramstrom, 2013). Treating Malware: All the data and information about the different product in ASA warehouse is stored in the single database architecture connected to a single computer. The malware poses a constant threat to the system that effect in identity risk, loss of information and security (Zhang-Kennedy, Chiasson, and Biddle, 2014). To protect against malware attack, the computer need to protect with robust security management system with software with regular updates and monitoring. A secure ISP (Internet service provider) must be entrusted with for online transaction. Security in the telecommunication system of ASA is a must because all the conformation and the queries are dealt through the telephone. Treating Storage Media Exposure: The magnetic tapes used to store the data from the stock database must be utilized in a clean environment and updated regularly. Storing the magnetic disk in protected area in will protect them from data loss and in the case of thefts (Galliers, and Leidner, 2014). In ASA, a single computer is connected to the network. It must be ensured that no external device like portable hard disks and pen-drive are connected to the computer. Regular and routine check on the storage media will prevent the risks of information loss. Treating the Database Faulty Configurations: The database that is initially configured in ASA system has a glitch in it. The database duplicated each and every record by itself every time the database is updated. This prevents redundancy in the database. The database design and operations need to configure correctly to stop anomalies in the database (Power and Kramer, 2015). Regular monitoring and checking need to perform in the backup databases as well to check for any data loss and faulty configuration resulting in defective results. Treating the Denial of Service Attack: In ASA, the Dos attack in the system will not effect in losing the information. The Dos attack in the system will prevent the authorized users from accessing the network. This will result in a great loss in terms of time and revenue. In ASA, since a single computer is connected to the dedicated system, the administration needs to know the complete detail of the database as well as system configuration in case of DoS attacks. Only the monitoring the network will not prevent the DoS attack (Tan et al., 2014). To prevent DoS attack, a strong firewall must be installed on the system that checks through every level in the architecture and report to the administration whenever a single doubt arises. All the users of the ASA online dedicated services must completely now about the tasks they are doing and their configuration. In the case of DDoS (Dedicated Denial of Services) attack, when the flooding attack comes from different IP addresses, it becomes difficult to block the every single IPs. In the case of emergency, ASA must develop an Emergency Operating Procedure (EOP) to deal with the situation (Bevilacqua, Ciarapica, and Paciarotti, 2012). Regulation and Recommendation applicable to ASA According to Legislation.gov.uk (2016), the Data Protection Act 1998, revised and brought to action from 2nd January 2016, ASA is obliged to follow the strict rules as applies to the Data Protection Act (Adelola, Dawson and Batmaz, 2014). Concerning the current UK legislation act, the ASA must lawfully use the data and only for the purpose of online transaction made by the customers. The Data Protection Act also states that ASA must not keep the personal information provided by the customer must not be held any longer till necessary. It is the authority of ASA to keep the data and information safe and to ensure the information provided by the customer for the transaction and buying of Auto spare parts must not be transferred without sufficient protection and security outside the Economic area of Europe. The Computer Misuse Act 1990 (Legislation.gov.uk, 2016) secures the computer data and programs from unauthorized access. The Act also defines the act of accessing the computer with th e intention of doing a crime is also referred as a crime. To abide by the Data Protection Act, ASA must follow some rules during the transfer of order and personal data. The personal data if recorded or is processed while the transfer is caught by the Act. To protect the data of ASA, the personal information must be regularly updated and eradicate the unnecessary data from the database. The IP address while receiving and sending orders must be tracked to verify the source of data. Every time, any personal data is uploaded to the system must be adequately stored, verified and filed. A powerful, robust security management system and firewall must be installed by ASA to protect the information provided by online customers. To protect the Computer Misuse Act, the authentication, and verification all the user of the computer is essential in ASA (Fafinski, 2013). Physical Security Issue in ASA Apart from the digital data and risks in information management, APA is prone to the physical security issue. The physical component of ASA is a single PC connected to a secure and dedicated web service that is connected to a backup database of the information. ASA also uses a telephone for clarification of any doubts by the customers and has two identical printers used for printing the invoices and receipts. In most of the cases, it is seen the data remains vulnerable due to irresponsibility and ignorance of the employees. The ASA employee must be verified and authenticated every time they log into the computer. Training of the employees is required about strong password protection and related risks involving with them. Access to the ASA warehouse must be controlled with the identity authentication techniques like the biometric scanner, smart cards or magnetic cards. Efficient and effective sensors and alarm system ensuring informing any risks (Whitman, and Mattord, 2013). By instal ling a fire control system in ASA will prevent the loss of data and revenue in case of emergency. A good communication system between the employees of ASA must be developed to inform the ASA to prevent any theft and fraud. Implementation of Security Policy in ASA The ASA online system of selling its goods is venerable to different risks and threats. Protecting and monitoring the database from data losses and malicious threats is one part of the security. For the overall protection of ASA in every aspect, a strong security system needs to be designed and implemented (Fernandez-Buglioni, 2013). The IT policy will be able to authenticate the access of information, application of the personal information available in ASA database, modify the existing data, removing unnecessary data, and even obstructing the access of data by unauthenticated users. The designs of the security system of ASA follows a particular procedure- Investigation of the security issues and risks in the ASA and identify the objective and mission of the organization. The logical design phase provides a model to bring all the solutions regarding security in one place. In the next stage of physical design, the necessary technologies and techniques are gathered to implement the design in the implementation phase. After the successful implementation of the process the areas o further enhancement of the security is focused. Figure1: Process of Design of the Security Policy (Source: Lincke, 2015, pp-128 ) Investigation: After the thorough investigation of the IT system in ASA, various vulnerable areas were identified. The back-up database used by the ASA automatically duplicates every entry in the system. The ASA system does not have any e-mail facility setup for customer queries and support. The two identical printers used are not solely for invoices. The ASA website is directly connected to the ASAs accessories stock database that makes it a vulnerable place for an attack. Initially, the database were controlled by a web hosting company but nowadays it is controlled by ASAs employee. The untrained employees pose a risk. The network of ASA is comprised of only one PC, and there is no back facility for DoS or any other severe condition. The security system of ASA both Physical and Software are weak and does not have a potential security (Abdou, English and Adewunmi, 2014). In order to store the customers personal information including banking details and addresses within the ASA by st rictly following the Government rules and regulation, a strong security system is evident. Analysis: The investigation process has thrown light into the loopholes present in the current security system of ASA. The analysis of the given condition showed that ASA is endangered against the human errors or the mistakes committed by the employees of ASA. The ASA has no intention of increasing the number of workers that has technical knowledge. There is a great an area of competitors trying to access the system and collect data. This put the ASA system vulnerable to threats. For not having any firewall or strong security ASA is under continuous attack of various malware. Having a DoS attack and hardware failure will prove to be disastrous since ASA has no backup or infrastructural support (Basile et al., 2013). The different types of equipment, including the backup database and the in formations, can be easily moved without any authorizations. Logical Design: The security system design for ASA must be effective and efficient. The security policy and the system designed can authenticate and authorize the user and every employee of ASA. The security system is designed keeping in mind the security policy of UK legislations. The logical design made for ASA also controls the physical security the entire network element as well as the auto spare parts in the warehouse. The design also covers the acquisition of information system and the operations management process. Physical Design: The physical design of the security system of ASA includes the authentication and authorization of the employees at every level in ASA. The physical security needs to increase by installing CCTV cameras and identification of the employees by biometric scanner. This will decrease the chance of misplacement of assets within ASA and minimize the chance of theft (Baker, and Benny, 2012). The number of computers in the network needs to increase for smooth operations, time utilization and handle large traffic online. Implementation: Studying the logical and physical Design for the security system, an advanced more secure system was installed in ASA. The warehouse of ASA is secured by the CCTVs by observing every activity in real time. The systems and software of the network are updated, and the firewall is activated. The antivirus software is also upgraded to meet the security need. The architecture of the database is redesigned to prevent the duplicity of the users information. The connection of the website directly to the stock database is changed to prevent the malware attack. Since ASA would not be hiring more employees, the training program of the existing employee is initiated. Maintenance: The security system of ASA is implemented successfully, and full system is under complete observation for further enhancement of the system. Access to ASAs stock The IT department of ASA needs to divert their focus on the security including the authentication and authorization of their employee. The security access to the ASAs stocks includes the passwords verification. The strong formulation of a password is required so avoid the amateur guessing. A strong password can be formed by combining numeric and alphabetical values and, at least, one special symbol. In a case of password loss, access can be recovered email verification using OTP. The strength of the password can be determined by various softwares that include data encryption. Furthermore, complex password entropy algorithm can be implemented while auto-generation of a password. Contingency Planning for Human Resources In the training program, the employees will be educated about the different risks involved in the system and case of emergency how to deal with them. In the case of absence of the staff in any situation, a backup system needs to be initiated also been developed. In the case of system failure, a contract has been made with the web-hosting company to look after the stocks of the website temporarily. Gathering and Record of Information A CCTV (Closed Circuit Television) need to be installed in ASA to look over every activity in the warehouse. The database also records the login and logout details of every verified user. The login verification will be done with fingerprint verification in the warehouses. Furthermore, the authentication and identification of user in ASAs system will be accomplished with verified userid and password. Scheduling Audits The database of the website will be regularly analyzed and detect for any malfunctions. ASA has schedule different audits every month to ensure the standard procedure been adhere to. References Abdou, H., English, J. and Adewunmi, P., (2014). An Investigation Of Risk Management Practices In Electronic Banking: the case of the UK banks.Banks and Bank Systems,9(3). Adelola, T., Dawson, R. and Batmaz, F., (2014), December. Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case. InInternet Technology and Secured Transactions (ICITST), 2014 9th International Conference for(pp. 234-239). IEEE. Akanji, A.W. and Elusoji, A.A., (2014). A Comparative Study of Attacks on Databases and Database Security Techniques. Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems.Network Security, 2011(3), pp.12-15. Baker, P.R. and Benny, D.J., (2012).The complete guide to physical security. CRC Press. Baracaldo, N. and Joshi, J. (2013). An adaptive risk management and access control framework to mitigate insider threats.Computers Security, 39, pp.237-254. Basile, C., Canavese, D., Lioy, A. and Pitscheider, C., (2013), February. Improved reachability analysis for security management. InParallel, Distributed and Network-Based Processing (PDP), 2013 21st Euromicro International Conference on(pp. 534-541). IEEE. Bevilacqua, M., Ciarapica, F.E. and Paciarotti, C., (2012). Business process reengineering of emergency management procedures: a case study.Safety science,50(5), pp.1368-1376. D'Agostino, D. and Wilshusen, G. (2011).DOD faces challenges in its cyber activities. Washington, D.C.: U.S. Govt. Accountability Office. Durbin, S. (2011). Information security without boundaries.Network Security, 2011(2), pp.4-8. Fafinski, S., (2013).Computer Misuse: Response, regulation and the law. Routledge. Fernandez-Buglioni, E., (2013).Security patterns in practice: designing secure architectures using software patterns. John Wiley Sons. Galliers, R.D. and Leidner, D.E., (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Hipgrave, S. (2013). Smarter fraud investigations with big data analytics.Network Security, 2013(12), pp.7-9. Hong, J., (2012). The state of phishing attacks.Communications of the ACM,55(1), pp.74-81. Imperva, (2015).Cyber Security Leader | Imperva, Inc.. [online] Available at: https://www.imperva.com [Accessed 26 Dec. 2015]. Kiltz, L. (2011). The Challenges of Developing a Homeland Security Discipline to Meet Future Threats to the Homeland.Journal of Homeland Security and Emergency Management, 8(2). Legislation.gov.uk, (2016).Computer Misuse Act 1990. [online] Available at: https://www.legislation.gov.uk/ukpga/1990/18/contents [Accessed 9 Jan. 2016]. Legislation.gov.uk, (2016).Data Protection Act 1998. [online] Available at: https://www.legislation.gov.uk/ukpga/1998/29/contents [Accessed 9 Jan. 2016]. Lesk, A. (2013). Comment on Comparing proteins by their internal dynamics: Exploring structurefunction relationships beyond static structural alignments by C. Micheletti.Physics of Life Reviews, 10(1), pp.33-34. Lincke, S., (2015). Designing Information Security. InSecurity Planning(pp. 115-133). Springer International Publishing. Mansfield-Devine, S. (2011). DDoS: threats and mitigation.Network Security, 2011(12), pp.5-12. McNeil, A.J., Frey, R. and Embrechts, P., (2015).Quantitative Risk Management: Concepts, Techniques and Tools: Concepts, Techniques and Tools. Princeton university press. Pilling, R. (2013). Global threats, cyber-security nightmares and how to protect against them.Computer Fraud Security, 2013(9), pp.14-18. Power, M.A. and Kramer, R., Symbion Systems, Inc., (2015).Process control method with integrated database for electronically documenting the configuration, modification and operation of a controlled process. U.S. Patent 8,996,449. Ramstrom, C.J., Computer Associates Think, Inc., (2013).Privileged activity monitoring through privileged user password management and log management systems. U.S. Patent 8,516,107. Tan, Z., Jamdagni, A., He, X., Nanda, P. and Liu, R.P., (2014). A system for denial-of-service attack detection based on multivariate correlation analysis.Parallel and Distributed Systems, IEEE Transactions on,25(2), pp.447-456. Thakkar, J., (2015). DATABASE SECURITY ENCRYPTION: A SURVEY STUDY.Management,1(4), pp.379-383. Turiel, A. (2011). IPv6: new technology, new threats.Network Security, 2011(8), pp.13-15. Whitman, M. and Mattord, H., (2013).Management of information security. Cengage Learning. Yu, J., Kim, M. and Unland, R. (2011).Database systems for advanced applications. Berlin: Springer. Zhang-Kennedy, L., Chiasson, S. and Biddle, R., (2014). Stop clicking on update later: Persuading users they need up-to-date antivirus protection. InPersuasive Technology(pp. 302-322). Springer International Publishing.