Saturday, May 23, 2020

Online Dating and Racial Discrimination - Free Essay Example

Sample details Pages: 4 Words: 1261 Downloads: 4 Date added: 2019/02/05 Category Sociology Essay Level High school Tags: Online Dating Essay Racial Discrimination Essay Racism Essay Did you like this example? Introduction Over the recent years, technology has become a central point of everyday life. Within the last fifteen years, internet usage has gone from 400 million people to 3 billion (ICT Facts Figures). With this mass integration of technology in the human experience, the human connection has also been affected. Don’t waste time! Our writers will create an original "Online Dating and Racial Discrimination" essay for you Create order Online dating arose as a way for humans to connect romantically over the internet. Research from the Pew Research Center found that 15% of American adults have utilized an online dating application (Smith 1). An even larger amount, 41%, has reported knowing someone who utilizes online dating (Smith 3). The increasing popularity of online dating has come with both skepticism and credence. The ethicality of the methods to gain long-term relationships over online dating is questionable. The components that arise from online dating are racial discrimination, privacy, and deception. Racial Discrimination Racism is a prejudice against a race due to the belief that another (or one’s own) is superior. While research from Philipp Hergovich, with his Ph.D in Economics, and Josuà © Ortega, a researcher at the Center for European Economic Research, finds that interracial marriages can be increased through online dating (29), racism is still prominent. Data provided by the co-founder of OKCupid, Christian Rudder, shows that Asian men are the most discriminated against (Rudder,â€Å"Race and Attraction, 2009–2014.†). When being rated by women, Asian men received the lowest rating, -15% (Rudder,â€Å"Race and Attraction, 2009–2014.†). Evidence also shows that Black women are the least preferred. When being rated by men, Black women recieved the lowest rating, -54%. Professors at the Institute for Social Research, Elizabeth Bruch, with her Ph.D in Sociology, and Mark Newman also found that Asian women and White men are the most preferred on online dating appl ications. This racial discrimination gives an advantage to White men and Asian women in finding love and the entire process of online dating. Asian men and Black women are at a disadvantage and therefore may have unfair outcomes in relation to White men and Asian women. Online dating applications can also facilitate this. A research team at Cornell University, Javon Hutson, Jessie Taft, Solon Barocas, with his Ph.d in media, culture, and communication, and Karen Levy, a professor of Sociology reports that dating sites utilize â€Å"race-based filters and search tools or race-based matching algorithms† (2). These components of online dating allow users to filter out or search for specific races, which completely excludes entire races from potential partners. The excluded races therefore face an inequality that other people such as White men and Asian women do not have to encounter. This inequality may deter users from utilizing online dating for long-term relationships. Although this racial discrimination is prominent, dating websites have begun to combat this issue. Grindr, an online dating app geared towards gay and bisexual men, has begun a campaign called â€Å"Kindr Grindr† (Kindr Grindr). â€Å"Kindr Grindr† is a campaign promoting inclusivity and fights racism on their app. For this campaign, Grindr updated their Community Guidelines, including a â€Å"Zero Tolerance Policy† for â€Å"discrimination, harassment, and abusive behavior.† (Kindr Grindr) Stricter moderation policies on user profiles have been put into place as well, to protect other users from discrimination. (Kindr Grindr) Taking measures like this may reduce racism and make users feel more comfortable, but research has not yet shown the effects of this campaign. Privacy With online dating, there is a risk of privacy invasion. As technology develops, it becomes easier for one to find out virtually anything about someone. This is no different in online dating. Researchers in the Security Privacy Research Lab at the University of Washington, Camille Cobb and Tadayoshi Kohno reported an online dating user who described a time when she was discovered through something as simple as her last name. The man â€Å"used this to find her on Twitter, and followed links in her distant Twitter past to personal blog posts.† (5) The easiness in finding someone because of the internet became a dangerous thing. The user, once being rejected, began shaming the participant for her personal information (Cobb and Kohno 5). This type of harassment is the result of searchability becoming easier. Many people choose to not disclose certain information that would make them easy to find on the internet (Cobb and Kohno 6). While this can prevent the privacy risks, there are still users who disclose personal information. In Kohno and Cobb’s study, half of the participants included revealing information like their job, and 42 revealed their school (6). As seen from previous evidence, disclosing evidence like this can bring dangers to the user. Appearance and Deception The process of online dating relies heavily on appearance. In research performed by Shao-Kang Lo, an expert in behavioral science, Ai-Yun Hsieh, a faculty member at the National Taiwan University of Science and Technology, and Yu-Ping Chiu, an expert in the interaction between technology and humans, it is reported that appearance is the biggest factor that changes the demeanor of online daters (2). They report that users first look at potential partner’s photographs, and then their biographies. Furthermore, they report that 40.7% percent of the participants in their study create negative deceptions, making themselves seem less attractive, when faced with an unattractive potential partner, in order to deter these daters from matching with them (Lo, Shao-Kang, et al. 6). The bias against unattractive people can give these users a negative experience and disadvantage in online dating. This emphasis on appearance can pressure users into conveying themselves as more attractive. Researchers of the psychology of communication technologies Catalina Toma, with her Ph.D in communication and Jeffrey Hancock, with his Ph.D in psychology, report that online daters who are considered unattractive are more likely to enhance themselves, using positive descriptions and retouched or flattering pictures (9). Lo, Hsieh, and Chiu’s report adds to this, conveying that users are more likely to deceive when faced with what they believe is an attractive profile (6). The emphasis of appeareance therefore pressures users to manipulate their online presence to seem more attractive. However, Toma and Hancock found that users looking for long-term relationships are less likely to lie about their appearance (9). If users have the intention of meeting in the future, and therefore be seen by the other partner, they are unlikely to lie about or enhance their appearance. Because of this, deception is not a major threat for people searching for long-term relationships in online dating. Conclusion As online dating increases in popularity, more people begin utilize it. In a study performed by the Center for Cognitive and Social Neuroscience at the University of Chicago, it was found that ? of modern marriages have arisen from online dating (Cacioppo, John T., et al. 4). As the pool of online daters increases and diversifies, the ethics of online dating comes into question. Dating apps are not made equal for all races. Racial filters, searches, and user preferences give certain demographics an advantage over others. While online dating sites have implemented ways to combat racial prejudice, it still occurs in modern online dating. There is a major emphasis on appearance in online dating that gives people that are considered unattractive a disadvantage. This preference for attractive people pressures â€Å"unattractive† people to enhance their appearance to appeal to potential partners. However, deception is less likely for people searching for long-term relationships. Pri vacy invasion such as cyberstalking is also a widely reported issue. It is now up to the companies behind these online dating sites to implement stronger rules to ensure the safety of all users. These rules must be inclusive for people of all races, genders, and incomes, so users have equal opportunities to find love.

Monday, May 18, 2020

E Commerce A Popular Activity On The Internet - 1388 Words

E-Commerce has been a popular activity on the Internet, for it facilitates commercial acts between online service providers and individuals. The popularity of E-commerce could be reflected by the turnover of the industry. The turnover of e-commerce in Europe grew by 14.3% to reach 423.8 billion euros (about GBP 360.5 billion) in 2014, and that of the United Kingdom (UK) increased by 14.7% and reached 127.1 billion euros (about GBP 108.1 billion) in the same year (Ham, 2015). Important private information (e.g., bank information, gift card numbers) would be recorded while consumers doing online shopping and doing other E-Commerce activities. This recorded information would be stored on the servers of online dealers or be saved in consumers’†¦show more content†¦In order to prevent personal data such as bank information from being intercepted, Data Protection Act 1998 (‘the Act’) has been issued by the UK Parliament. According to the Act, doing Cyber-theft for the commission of a relevant offence (e.g. bank theft) are considered as a criminal offence and could be sentenced for five years imprisonment (Mobbs, 2003, pp.5–6). Cyber-thefts, however, are not being extinguished under the force from the Act. According to the Crime Survey for England and Wales (CSEW), there are 2.5 million incidents of computer misuse (including unauthorised access to personal information and computer virus) reported in England and Wales during the 12 months before 14th August 2015 (TNS BMRB, 2015, p.21), and 3.1 billion pounds per year was estimated to be cost by UK citizens on Cyber-crime (Cabinet Office and National security and intelligence, 2011, p.18). In order to keep the pressure on the Cyber-crime, the British government issued a policy paper of National Security Strategy in which they defined cyber-attacks as a ‘Tier One threat’ to the national security, alongside international terrorism (Cabinet Office, et al., 2015, no paginat ion). Security of E-Commerce is at the cutting edge of future commercial activity. Internet service providers and personal users are both waiting for the implementation of anti-cybercrime policies in order to protect their information from being trespassed. Apart from the public force from

Tuesday, May 12, 2020

Women Rights in Saudi Arabia - 1800 Words

English 101 Essay #1 We can do it In most of the western civilization, particularly the Americans had heard or seen this female wartime propaganda poster created by J. Miller. There is much in our art and literature that romanticizes girls and women and the role they play in our culture. Nowadays, there is around 3.3 billion female living in our world. Sadly, one in every three women worldwide are victims of sexual, physical, emotional, and other abuse during their lifetime. Being female often means being sentenced to a life of poverty, exploitation, and deprivation. Therefore there are around 1 billion abused women around the world every single year. Being an ambassador’s son, I believe it is the most fortunate and†¦show more content†¦We are living in the 21st century, and there are still traditions from the 19th century, and that is just insane. Somehow, I knew I was losing Ms. Basha’ir. I could tell she was not the same person. Her energy in teaching was slowly disappearing. Her dream to one day be freed of limitations was getting smaller each day. And I understood perfectly what she was going through. With all those restrictions I would probably feel the same way. During my free time when I would step outside from school I saw that gender segregation is common in all areas of public life in Saudi Arabia, from the more obvious places, like swimming pools in public clubs, gyms and resorts to the less obvious, such as restaurants, coffee shops and even in ice cream shops. While you will hardly ever encounter a single Saudi woman on the streets, a woman living in Saudi Arabia who would like to dine out alone in the evening can usually do so in the family area of most restaurants. I have heard and witnessed enough about this absurd way of life. I started to think how I could help Ms. Basha’ir and the only way would be throughout my father’s diplomacy. I knew that would be almost impossible since most of the women in Saudi Arabia when want to be free from such an arbitrary lifestyle so they escape to another country. And that was exactly what happened. On certain day Ms. Basha’ir did not show up for her class. We were informed that she would not be teaching anymore. We just could notShow MoreRelatedWomen s Civil Rights Of Saudi Arabia And Consultative Council ( Majlis Alshura )1591 Words   |  7 Pagesability to act upon Women s civil rights challenges in Saudi Arabia are: The king of Saudi Arabia, Consultative Council (Majlis Alshura), The Council of Senior Scholars, The National Society for Human Rights, Human Rights Advocates, The Media, Saudi Ultra-Conservatives and the Saudi women themselves. See the matrix below to get more information about it: Policy Analysis Current Situation: As the researcher mentioned above some of Saudi Arabian citizens still look down upon women and they still believeRead MoreThe Culture Of Saudi Arabia1588 Words   |  7 Pages THE CULTURE OF SAUDI ARABIA SSG LUCAS, TIMOTHY 13B40 SENIOR LEADER COURSE (003-17) THE CULTURE OF SAUDI ARABIA The Kingdom of Saudi Arabia is a very diverse group of people with a heavy religious background. The Kingdom, located on the Arabian Peninsula situated amongst a very hot and arid climate. The people of Saudi Arabia remain very family oriented and have transformed from a nomadic culture to a very wealthy and thriving nation, largely due to theirRead MoreThe Importance Of A Training Program For Women851 Words   |  4 PagesIntroduction In Saudi Arabia, there is a need to activate the participation the role of women in the development process in the community. The role of female in Saudi society is to be a good mother and a good wife. Women in any society like men, and they have the same right to work. Women are less than half of Saudi society, and the estimated proportion of women in Saudi society is about 45% of the population. They have not an important and active role in the renaissance of the community. EducationRead MoreSaudi Women s Participation For Public Atmosphere1281 Words   |  6 Pages Saudi Women s Participation in Public Atmosphere Introduction The Kingdom of Saudi Arabia is one of the most influential countries in The Middle East. It is also a key member of the Gulf Countries Cooperation, amalgamation of monarchies in the Arabian Peninsula. Saudi Arabia is currently ruled by King Salman Al-Saud was crowned as the King on January 23, 2015. Saudi Arabia is also the cofounder of The Organization of the Petroleum Exporting Countries (OPEC), which plays a significant rule in theRead MoreThe Rights Of Women And Education1645 Words   |  7 Pagesimportance. In the United States women are held at an equal level with men, we’ve fought for this sense of equality for several years and unfortunately, not all women across the world have had that same success. Women from other countries do not have half of the rights that we do here in the United States, and this is something that we seem to never really think about. Saudi Arabia is just one of the many countries around the world in which the women do not have as many rights as men do. Being a feministRead MoreArgument Essay Outline903 Words   |  4 PagesOutline I. Introduction a. Hook: Women make up one half of society. Our society will remain backward and in chains unless its women are liberated, enlightened, and educated b. Background Information: women play important role in the family, men in Saudi Arabia consider women as a second sort. c. Opposing Position: Men in Saudi Arabia believe women should enjoy their lives and follow religious customs d. Thesis Statement: women in Saudi Arabia are deprived many rights, such as driving and social restrictionsRead MoreSaudi Arabian Women And The Obstacles1620 Words   |  7 PagesAbstract THE FOCUS OF THIS PAPER WILL BE ON SAUDI ARABIAN WOMEN AND THE OBSTACLES THEY MUST OVERCOME TO ACCESS HEALTHCARE. WHAT MANY BELIEVE TO BE SHARIAH LAW CONCERNING WOMEN’S RIGHTS OF HEALTHCARE IS ACTUALLY BASED MORE ON TRADITION AND CUSTOM RATHER THAN LAW. UNFORTUNATELY, MANY PEOPLE IN SAUDI ARABIA ARE UNAWARE OF THIS AND STILL ABIDE BY THESE TRADITIONS AS IF THEY ARE LAWS. THESE PEOPLE INCLUDE MEN AND WOMEN, AND MANY HEALTH CARE PROVIDERS. IN SAUDI ARABIA, MOST OF THE POPULATION IS ULTRA CONSERVATIVERead More Fighting for Equal Rights in Two Opposite Countries Essay832 Words   |  4 PagesIt is hard to believe that in the world that we live in, there are still countries in which women fight to have their rights. In the twentieth first century, there are countries that woman, â€Å"regardless of age or marital status is required to have a male guardian. Her guardian may be her father, her husband, her uncle, her brother, or even her own son† (Mandi). In strict arab cou ntries, Saudi Arabia, women are considered inferior to men, taking to an extreme point in which female are not registeredRead MoreHow Is It Different Countries?1444 Words   |  6 Pagesand systems of stratification and inequality in Saudi Arabia and UAE. As a woman living in one county could be totally different than living in another one. Women s status could be challenging in some countries and could be easy in another. Women s status in each society and culture differs in different ways around the world. In some societies, women s status improved progressively, while in other, it dropped or remained unimproved. Saudi Arabia has its own traditions that are carried from anRead MoreCan Nine Minimum Criteria Be Used for a Democracy in Yemen and Saudi Arabia?859 Words   |  4 Pagesof the nine criteria, if not all, are irrelevant in my assigned countries, since both my assigned countries are non-democratic. Criteria one gives elected officials constitutional power to make policy. Under this criteria, Yemen and Saudi both differ. Saudi Arabia has a Shura council, which is an advisory body, but they do not enact and enforce laws, only the King can. In Yemen, there are elected officials and a parliament; however, the power they have is also limited. The second criteria guarantees

Wednesday, May 6, 2020

The Cloning Debate Essay - 1018 Words

The Cloning Debate Not so far in the future, a young boy of the age of six, dying a heart-wrenching death, will only be able survive with a bone marrow transplant. His parents will have searched near and far for a match, but none will come to their aid. The only possible way that they can produce a perfect match for their sons bone marrow is to clone their son. Unfortunately, at this time this topic is still being discussed and debated upon with the government. Their only child that has been their treasure for six years might die. A clone of their son becomes their apple of aspiration to keep the treasure from being buried. With a scenario as presented above, cloning might seem like the answer to hundreds of lives taken at†¦show more content†¦It violates the mystery of what it means to be human. Along with Jewish leaders, Protestant theologians think cloning of humans would cross the line (Herbert). Others agree with him when they think that cloning violates, the dignity both of human procreation and the conjugal union. (Vitae). Is the idea of cloning homo sapiens too surreal and abstract or should it become an everyday activity? Are we stepping in Gods shoes when we should not be or are we not stepping up to our calling? Would cloning make us God? Another major issue concerning cloning is the fact that clones would definitely face a different lifestyle than the rest of us. Some philosophers believe that the difficulties that clones would face would be different than the ones we do but not to a higher degree. Everyone is born with some future hardships in their life so it wouldnt be any different for a clone (Wachbroit). However, he also believes that there could be distinct differences between a clone and a non-clone. Things we take for granted would be confusing to a clone therefore, ...cloning thus results in ambiguities. Is the clone an offspring or a sibling? Does the clone have one biological parent or two? (Wachbroit). Following that problem comes the concern of what the clone would be called. ...clonee sounds like a good term butShow MoreRelatedThe Cloning Debate On Cloning1227 Words   |  5 PagesEva Gaetz Sec 09 Kanchan Hulasare The Cloning Debate According to Mosby’s Medical Dictionary, the term â€Å"cloning† is defined as â€Å"a procedure for producing multiple copies of genetically identical organisms or cells or of individual genes.† Researchers have conducted several cloning experiments over the years, replicating tissues, organs, and even full organisms such as Dolly the Sheep in 1997. The history of cloning dates back to the early 1900’s when Hans Adolf Edward Dreisch studied the resultsRead MoreThe Intense Debate Over Cloning753 Words   |  3 Pagespeople to realize many things their ancestors would not have even dreamed of. Cloning is absolutely one of them. Having identical twins without being born on the same they is like a dream come true. But what is cloning exactly? Cloning ,particularly in biotechnology, is the process used to create copies of DNA fragment, cells, or organisms. Attempts at cloning might go back to much ea rlier times such as the attempt made by Hans DreischRead MoreAnimal Cloning Debate Essay1045 Words   |  5 PagesAnimal Cloning Debate A clone is a genetic copy of another living organism –animal, plant or human. Animal cloning is a widely discussed issue in our society today. The question now is whether the Australian government should ban animal cloning. Many opinions are generated from this subject, such as the justifiability of cloning, and how far it should go. Religious views are prevalent, so too are numerous ethical concerns. The issue of whether or not the government shouldRead More The Debate of Human Cloning Essay4507 Words   |  19 PagesMissing Appendix The Debate of Human Cloning Human cloning has become a hot topic for debate. As we progressed one step closer to successfully cloning and developing a human being, legislators and the general public have become more concerned about the ethical and moral implications of this procedure. The federal government has been unsuccessful in reaching an agreement as to what policy to pass and enact. Thus, any current legislation on human cloning has been developed and enforced by individualRead MoreThe Controversial Debate Of Cloning2276 Words   |  10 PagesIn recent years, cloning has been a controversial topic, being highly debated by scientists, politicians, and philosophers alike while invigorating popular culture through works such as Star Wars or Aldous Huxley s’ Brave New World (Brock E-3). However, the fantastical examples of cloning to increase labor supply or selective cloning to create a caste system as these works depict, are highly irrelevant to problems society faces today with the prospect of clo ning. Current medical technology suggestsRead MoreEthical Issues Related to the Cloning Debate1389 Words   |  6 PagesThe act of cloning a human being comes dangerously close to human beings acting as God. Do human beings have the right to tamper with nature in this way? This essay explores the various ethical issues related to the cloning debate, and seeks answers to this deep philosophical question at the heart of bioethics. As a student of genetic biology and future biologist, this question also has personal relevance. Our science is evolving at a rapid pace. As human cloning becomes increasingly possible, itRead MoreThe Debate Over Stem Cells And Cloning1398 Words   |  6 PagesAbstract Stem cells and cloning are very controversial today. There are debates and arguments about it all over the internet. The idea of stem cells is to use them to help cure and prevent diseases. You can use embryonic and adult stem cells. That’s one of the reasons people argue about it, because it kills the potential life of the embryo. [Stem Cells and Cloning] Stem cells and cloning is very controversial in today s society. Some people believe it’s not a good idea because it destroysRead MoreIs Cloning Be A Debate Of Morals And Human Privileges?1477 Words   |  6 PagesHuman cloning is unethical since it steps back from human identity. In addition, it brings emotional mental damage for the cloned kid and absolutely discards the basic biological gene selection. For the most part, not a single person can manage to ignore the procedure that is made in science today. Whereas scientific research, for instance grants us information and the procedure of being able to clone human beings, which is something nobody ever assumed could be possible. After watching the movieRead MoreHuman Cloning Debate: The Fate of Frankenstein1671 Words   |  7 Pageslife. This idea, cloning, is neither new, nor mysterious it is simply the biological process of producing replicas of organisms through other means than sexual reproduction. In the United State s, consumption of meat and other products derived from cloning was approved in December of 2006, with no special labeling required. However, although there are two types of human cloning typically discussed: therapeutic or using adult cells for use in medicine, and reproductive, involving cloning human beings.Read MoreCloning : A Debate Of Morals And Human Rights862 Words   |  4 PagesIn the creation of technological advances that survives today, the dispute of cloning is ever existent as a debate of morals and human rights. People are asking if we have the right to clone humans and other animals. Cloning, the process of taking a cell from one organism, taking a donor womb cell from another organism of the same species, inserting the original cell in the donor cell, and placing the newly developed embryo inside a surrogate mother. This is an inhumane desecration of human rights

Salvia Divinorum Free Essays

Salvia Divinorum is a hallucinogenic Mexican herb known as â€Å"diviner’s mint† in the US and is typically a natural substance that has the ability to cause intense hallucinations â€Å"out of body† experiences, and a short-term memory loss. Although this substance is legal in the United States despite of the herb’s hallucinogenic properties, this stuff is generally not considered as therapeutic despite of the notion that it was also used for curing by the Mazatic, and is more likely to be use as recreational drugs by adolescents because of mind altering properties of this substance. Because of these properties, Salvia Divinorum should be classified as a potential source of restricted drugs along with Marijuana or the Cannabis sativa and products derived from this herb should be considered as restricted drugs. We will write a custom essay sample on Salvia Divinorum or any similar topic only for you Order Now A mysterious plant that is both puzzling and perplexing, this herb was described botanically by Carl Epling and Carlos D. Jativa in 1962 through the help of two Americans, Albert Hofman a chemist, and Gordon Wasson, an ethno mycologist investigating Mazatic rituals (Clebsh Barner p. 06). Growing only in the territory lived in by the Mazatic Indians of Oaxaca, Mexico; the Maztic Indians use this plant along with other ingredients for their hallucinogenic properties â€Å"in divinatory rituals† (p. 106). According to Clebsch and Barner, It was reported that if this salvia was ingested â€Å"it would produce an illusory experience† (p. 106). Apparently, this stuff when ingested produces strange feelings that could be similar to the effects of particular drugs such as Marijuana and other prohibited drugs. Daniel J. Siebert pointed out that the effect of taking Salvinorin A(an encapsulated product from salvia divinorum), includes seeing visions of people, objects, and places, and with doses above one mg user will experience out body experiences and may get up or move around with no clear awareness of their actions or behavior (p. 55). Furthermore, during the most intense phase of the experience, Siebert noted that user of this substance speak nonsense and even laugh hysterically. Siebert summarized the feelings experiences that could be had by any taking substance derived from salvia divinorum as follows: User sees objects such as yellow plaid French fries, a drawer and even ferries wheel; a visions of various dimensional objects; body loss and even identity; uncontrollable hysterical laughter; and different feelings of motion, or being twisted or pulled by forces of some kind (p. 55). From this feelings and experiences resulting from the use of salvia divinorum there is a considerable evidence that this substance could produce drugs that with effect similar or might even harmful than the effect of marijuana. The irony is that this drug is not restricted in the United States thus companies promoting drugs derived from this herb are free to promote these types of substances on the internet sites targeting younger adults and adolescents. According to information released by DEA, Drug Diversion Program entitled â€Å"Drugs of Chemical Concern: Salvia Divinorum† this substance is being smoked and its effect are described by users similar to other restricted drugs (WWW. Streetdrugs. org). Based on new pharmacological findings and the description of users of this substance, salvia divinorum should be classified as potential source of restricted drugs and that government authorities should closely monitor and act decisively against the liberal use of this substance. Just like other restricted substance that causes potential harm to the user when taken liberally, this substance are prone to abuse and may also cause potential harm to the users. While, there seems to be no clear physical benefit on the use of this stuff aside from the notion of relaxation, the abnormal behavior of the person when at the peak of experience of this drugs, is a clear indication of the potential harm this substance may cause on the users. Work Cited Clebsch, Betsy Barner, Carol D. The New Books of Salvias USA: Timber Press, 2003 â€Å"Salvia Divinorum† WWW. Streetdrugs.org http://www.streetdrugs.org/salvia2.htm Siebert, Daniel Salvia divinorum and Salvinorin A: new pharmacological findings Elsevier Science Ireland Ltd., 1994 http://www.sagewisdom.org/siebertjep94.pdf How to cite Salvia Divinorum, Papers

World Without Aids Essay Example For Students

World Without Aids Essay Acquired immunodeficiency syndrome (AIDS). Today, despite the continuing production of better antibiotics since the discovery of penicillin, we are facing an infectious disease against which all these drugs are virtually powerless. This disease is spreading inexorably, killing more people and more people each year. AIDS does not know no national boundaries and does not discriminate by race or sex. It is rampaging not only throughout the United States, but also through Africa, India, China, Russia, Europe, South America, and the Caribbean countries. Even infants and children are at risk. AIDS is similar to the bubonic plague or the BLACK DEATH that killed perhaps one-third in Europe in the 14th century. Yet, the difference from the Black Death and AIDS is that it is in slow motion because the infectious agent that causes AIDS can remain dormant in a persons body for several years before it causes illness, and because death from AIDS can be slow and drawn out once symptoms appear. AIDS is essentially a disease of the immune system. The bodys defenses are destroyed and the patient becomes prey to the infections and cancers that would normally be fought off without any trouble. In 1984 it was proved that AIDS is caused by the human immunodeficiency virus (HIV). A virus is a minute infectious particle that enters and kills the immune cells, or lymphocytes. Because it destroys the very mechanism humans rely on for protection, prior to 1996 contracting Aids was considered a death sentence. For many years, 85 to 90 percent of all AIDS patients died within three years. They might have recovered from one infection only to succumb to another a few months later. Between infections they remain weak, emaciated and unable to work or carry on normal activities. In late 1996, almost 15 years after the first reported AIDS cases, researchers made the discovery that a certain combination of newly developed drugs could substantially prolong life in some AIDS patients. But AIDS i s a fiendish virus. When researchers cleared it out of a patients bloodstream, it hid in the lymph nodes. Scientists, figured out how to banish it from the lymph nodes, they found the virus lurking in the brain. Although, there is hope for a cure because they have done some experiments isolating a gene and it has had good results in some people infected with AIDS. The area that many people are concerned is with Southeast Asia-particularly India. At 900 million, Indias population is almost double that sub-Saharan Africa, which, with 13.3 million HIV-positive adults, accounts for 60 percent of the worlds total adult infections. The major reasons for such spread in India and following Africa is the high rate of their population, poverty rate, and other risk factors all point to a likely explosion. The number of HIV infections worldwide doubled between 1991 and 1996-and that number is expected to double again by the year 2000. By the turn of the century, about 44 million people will hav e fallen victim to the virus that causes AIDS. The signs of hope do not stop by the reason of Prevention Programs which they have succeeded in reducing HIV-infection rates dramatically among young men in Thailand and young women in Uganda-two of the countries hit hardest by the3 disease. The rate of new infections have also dropped sharply among gay men in the United States, Australia, Canada, and western Europe. However, many ingredients of the AIDS epidemic are still mystery. The cause of AIDS remained uncertain for several years after its discovery. Even now, there are questions about how efficiently the AIDS virus spreads, whether it will kill everyone who gets it, and why the virus is do devastating to the immune system. Its initial spread was in the United States was among groups that are frowned upon by society-homosexuals and intravenous(drug users)- AIDS has a stigma associated with it. This makes the disease difficult to confront rationally. However, people are terrified even by the word of AIDS. The virus does not get transmitted by any body contact neither through the air. However, the disease does not pass from one person to another through the air, by sneezing, on eating utensils, by shaking hands, or through body contact in sports. There are only four ways it can be spread: through injection with a needle contaminated with HIV, which it can happen when drug addicts share needle s; by receiving a transfusion of contaminated blood; or-in the case of infant with an HIV-positive mother-having the virus transmitted through the placenta before birth, or the mothers milk after birth. For years, some people to refused to admit AIDS was a problem. Although, the disease first received national attention in 1982, when the Centers of Disease Control (CDC) noticed an alarming rate of rare cancer (Kaposis sarcoma) in otherwise healthy gay men. SOUNDING THE FIRST ALARMThree patients examined by Dr.Gottlieb were very ill. Interestingly, they had several striking features in common. All had unusual infections such as thrush, which is the growth in the throat of a fungus called Candida; or a rare type of pneumonia caused by a parasite called Pneumocystis. Also, they had been infected by less-common viruses, such as Epstein-Barr virus, which causes mononucleosis, or by cytomegalovirus (CMV). Taken together, the infections pointed to a serious defect in the patients immune systems. Sure enough, when Dr. Gottlieb drew a vial blood from each patient and measured special kind of immune cell called a T-helper lymphocyte, all three patients tests gave the same startling result. They were virtually devoid of T-helper cells, Dr. Gottlieb found. It was clear that they had seriously deficient immune systems. The three men had something else in common: they were all homosexuals. At that time it was not clear that the patients homosexuality was related to the illness; a patients sexual preference had never before been considered the determining factor of a medical disorder. That situation was about to change radically. SIGNS AND SYMPTOMS OF AIDSEarly symptoms of HIV, lasting between one and four weeks, can mimic that of mononucleosis, with symptoms such as swellings of the lymph nodes, headache, fever, loss of appetite, weight loss, sweating and sore throat. Often of these symptoms are mistaken for the flu or another viral-type infection, so people may not even be aware that they have been infected with HIV. Even if the patient has seen a doctor, the physician may dismiss the symptoms as a viral infection. In nearly all the cases, this stage dissipates due to the healthy immune systems ability to fight the initial infection. Early symptoms may include:*Herpes zoster (shingles), a skin rash that appear on the chest, abdomen, and/or back. *Herpes simplex, a common sexually transmits disease that affects the rectal, genital, esophageal regions of the body. Painful lesions can erupt into ulcerations of the area. In HIV/AIDS patients, this may become a chronic condition. *Thrush, a white coating on the walls of the mouth, gums, and on the tongue, that is caused by a fungus called Candida Albicans. *Excessive bruising and bleeding that occurs when a person develops antibodies which attack the bodys platelets-cells which help blood to clot. This condition can go unnoticed, and is often not detected until a routine blood test is performed. *Chronic or intermittent diarrhea, found both in early and late stages of HIV infection. As the immune system becomes increasingly compromised, the body is not able to fight off more serious infections that a normal intact immune system could suppress. Some of these life threatening infection include:*Pneumocystis pneumonia (PCP), caused by parasite called pneumoncytis carinii. Symptoms include fever and respiratory complications that often lead to death. *Kaposis sarcoma, a condition in which tumors of the blood vessels develop on the skin, in the gastrointestinal tract, mouth, lungs, groin, brain liver, and lymph glands. The mall, nonpainful lesions usually are a red, brown, or purple color. *Tuberculosis (TB), which can occur in both early and late stages of HIV. Symptoms include night sweats, fever, cough, and weight loss. One of the major problems with this aspect of the disease is the development of TB strains resistant to drugs, making it harder and harder to treat. *Mycobacterium avium complex, which produces fatigue, chills, night sweats, fever, weight loss, diarrhea, and abdominal pain. *HIV related lymphoma, swollen lymph glands in the neck, groin region, or under the arms. This requires radiation and chemotherapy treatment. *Toxoplasmosis encephalitis, caused by a parasite, which produces an infection in the brain leading to neuro logical impairment and seizures. Symptoms include headaches, fever, lethargy, confusion, and loss of balance or coordination. Wal-Mart Tire and Lube Observation Evaluation EssayBut with the regard of the two ways that AIDS is transmitted, blood and sex, it is clear the illness does not select particular groups to afflict. It does not matter if you whether you are a man or women, or what type of lifestyle you practice. If you are injected or transfused with contagious blood or take into your body other contagious bodily fluids, such as vaginal secretions or semen, you run a high risk of getting AIDS. Minute amounts of these fluids pose very little threat to transmitting the virus, and most nongenital fluids, such as saliva, are currently thought to pose no risk whatsoever of transmitting it. There is, however, a theoretical risk involved when any fluid is passed from an infected person, though the relative risk is extremely small. Research is still being done to prove these conjecture. 80 percent of babies HIV positive did not develop AIDS although, their mother had AIDS. HEMOPHILIACSThere are several diseases in which the blood does not clot properly. Those born with these conditions lack one of the many elements in the blood that are essential to stop bleeding. Hemophilia A is an inherited clotting disorder that afflicts men almost exclusively. In a person with severe hemophilia A, internal bleeding or bleeding into joints can lead to serious complication, possibly even death. Even small cuts clot slowly. It was persons with severe hemophilia A who were at highest risk to get AIDS. To control their bleeding tendency, hemophiliacs inject themselves with a concentrated preparation made from the blood of persons with normal clotting ability. This preparation, called Factor VIII, is credited with increasing the life expectancy of hemophiliacs in the last two decades from 35 to 55 years old. Some hemophiliacs have a mild disorder and use Factor VIII only when they actually have a bleeding episode. But all hemophiliacs depend on it at some point. Factor V III, which was life saving for hemophiliacs, suddenly turned to be an instrument of death. The preparation is made by pooling blood collected from 2,000 to 5,000donors, then concentrating it, quick-drying it, and putting it in vials. Because so many peoples blood was represented in each vial of Factor VIII, the possibility existed that at least one donor had AIDS or was harboring the AIDS organism-especially because drug users (until concerns were raised about infected donors) often sold their blood for cash. And because each hemophiliac uses 20, 30, or 40 vials of Factor VIIII each year, there was a good chance that he would encounter a contaminated vial sooner or later. IDENTIFYING THE VIRUSIn particular, no known infectious agent was capable of producing the specific destruction of the immune system that AIDS causes. Underlying all the symptoms of AIDS is one primary defect: loss of a pivotal type of white blood cells called the T4 helper lymphocyte(The role of T4 lymphocytes is to help other types of immune cells become active and do their job. Without the T4 helper cells, the immune system virtually shuts down. And in some AIDS patients there was an almost complete loss of T4 helper cells. Viruses are the most minute form of life. Some people would not even call viruses living organisms. They are many times smaller than bacteria, the other cause of human infectious disease. Whereas bacteria are independent, able to grow and reproduce outside cells of the organism they infect, viruses are parasites. In order to make more of their kind, viruses must enter the cells of the creature they infect and take over the cellular machinery. They subvert its p roductive power by making more of their own kind. The cell dies, but the virus thrives. The virus is an intracellular parasite because its structure, unlike that of a bacterium, is too rudimentary to sustain itself-it must live within another cell (Bacteria are internally complex, containing all the equipment necessary for life). Viruses contain only the genetic material necessary to propagate themselves and a tightly wrapped protective coat of proteins. These differences lead to a crucial medical distinction between bacteria and viruses. Twentieth-century medical science has developed many antibiotics drugs, such as penicillin, to combat bacterial infections. But viruses are more difficult to kill. Because they reproduce inside of our own cells, it is difficult to find a drug to stop the virus from reproducing without harming the host cell. Progress against diseases caused by viruses-such as small pox, mumps, measles, and polio-has come through vaccines, which prevent infections. Latency, means that the infection stays in a persons body for a while before it causes clinical illness. Because viruses can lie dormant inside cells, they can have long latency periods. The latency periods for AIDS-the time between exposure to the infection and the first symptoms-may be as long as eight years, but it is usually three to five years. In children the latency is much shorter, and in women it may be shorter than in men. Persistence refers to how long the infectious agent remains after it starts the disease. With AIDS it is most likely that the agent stays for the persons remaining lifetime. Despite treatment of each opportunistic infection, the immune system remains impaired. As fast as new immune cells are made they are destroyed. One tentative conclusion is that a viral ancestor of HIV evolved in Africa millions of years ago and affected monkeys. Gradually it changed to the form of HIV we see today. But this still does not explain why the virus suddenly started causing human disease in the last quarter of the 20th century. THE OFFICIAL U.S. DEFINITION OF AIDSThere are two factors which determine the category: T-cell count and history of disease of symptoms. The T-cell (officially called CD4+T-lymphocyte) is the vulnerable immune system cell the HIV virus attacks, then uses as a breeding ground. Eventually, the T-cells killed by the virus. As a persons T-cell count decreases, the risk of severe disease, or opportunistic illness, increases. The three official levels of T-cell counts are:Level 1: a T-cell count greater than 500cells/mlLevel 2: a T-cell count between 200-499 cells/mlLevel 3: a T-cell count less than 200 cells/mlThese categories are based on the lowest T-cell count registered by a person. For example, someone who once tested at 180 but later received a boost in T-cells from a new protease inhibitor would still be considered level 3. To determine the three official government classifications, symptoms are also a factor. For example, a patient is in AIDS category 1 if he or she is asynmptomat ic (no symptoms) and has a level 1 T-cell count. An AIDS category 2 patient has a level 2 T-cell count and at least one of the early stage illness but has not developed a later-stage disease, such as pneumonia or Kaposis sarcoma. In category 3-full-blown AIDS-the T-cell count has dropped below 200 and the patient has developed a later-stage disease. TREATMENT BREAKTHROUGHSThere have been so many attempts to find a solution to end with AIDS but its too complex and we know little of it, therefore its difficult to find a solution. Although, many experiments have been made for example the cocktail. Its a treatment of vaccines that combine with an AZT. However, this vaccines does work for some but for others it does not do anything. Yet, the newest discovery is that some people are born with a certain type of gene that does not develop AIDS but has the virus. So this person may pass on the Virus and have it himself but it will not affect him at all. TABLE OF CONTENTS1-INTRODUCTION2-WHAT IS AIDS?3-WHAT ARE THE SIGNS AND SYMPTOMS OF AIDS4-KAPOSIS SARCOMA5-WHY HOMOSEXUALS?6-PUZZLING SYMPTOMS7-INTRAVENOUS DRUG USERS8-HEMOPHILIACS9-IDENTIFYING THE VIRUS10-THE OFFICIAL U.S. DEFINITION OF AIDS11-TREATMENT BREAKTHROUGHSBIBLIOGRAPHY Check, William. The Encyclopedia of Health AIDS. Chelsea House Publishers; Philadelphia: 1999 Encarta Encyclopedia 97AIDS Microsoft Windows. Center For AIDS Prevention Studies:www.caps.ucsf.edu(March 1, 2000) JAMA HIV/AIDS Information center:www.ama.assn.org/special/hivhome.htm(March 1,2000) International Association Of Physicians in AIDS Care:www.iapac.org/ (March 1,2000)Science Essays

Saturday, May 2, 2020

Migrating Business Critical Applications †Free Samples to Students

Question: Discuss about the Migrating Business Critical Applications. Answer: Introduction As said by the Zhang, Cheng, Boutaba, (2010), Technology is improving being used by the several organizations across the business to improve and enable their organization performance. Krutz, Vines, (2010) suggested that One of the most effective technological innovations that have revolutionized the way business and people work in todays world in cloud computing. Implementation of the cloud computing technologies within the organization can facilities collaborative platforms from learning and research, improved services and flexibility capabilities, high efficiencies, better compliance and security and access to leading technology. As per the evaluation and findings, it is seen that the organization Commonwealth bank is presently suffered from the issues associated with the data handling and security. The observation also shows that organization functions its operations in all overall the world and most of the users are presently accessing the services through mobile devices; there fore, data theft related problems also considered the main problems for the organization. Thereby, the present report is mainly focused upon the effectiveness of the mitigation of the application and data sources into external computing in organization. Moreover the report also empathized on the security policies that could computing technology; uses to secure data or information. Apart from that the findings provides the effective conclusion and recommendation to solve the existence problems. With context to financial services Stakeholders of the organization are mainly investors in business whose actions are determined the result of the organization decisions. The stakeholders of the organizations are governments, customers, employers, investors etc. The main roles and responsibilities of the stakeholders is to make decision regarding the investment and providing the detailed requirements about the financial plan; that helps the organization to sustain in market and achieve set of objective in successful manner (Krutz, Vines, 2010).. Apart from that stakeholder of the organization also committing the necessary resources and determining the issues and risks associated with the organization. As per the findings and evaluation of the organization present scenario it is seen that the organization is not be able to provide effective security to data that hampered the organization performance in upcoming years. Interface between business stakeholders and technologist is done with the help of communication mode such as face to face communication, meeting, telephonic communication, etc. Before the implementation of the technologies within the organization main roles and reponsiblteis of the technologist to provide the all information to stakeholders regarding the project and how it assist the organization to perform effectively. Therefore the interface between the organization stakeholders and technologist is illustrated using stakeholder communication chart that is shown in below table; Stakeholders Impact stake the project what needs to be communicated risks CEO high Procedures and polices owners who find out institutional administrator procedures and policies Benefits of the implementation of the cloud computing technology and costs associated with the project (Takabi, Joshi, Ahn, 2010). Lack of clarity regarding preferred procedures. Financial management high Manage the organization financial system cost associated with the project and all of the devices, benefits in terms of finance associated with the costs Lack of budget planning Admin staffs Operate the organization new system moderate It helps the organization in order to contributes to process design as well as system and testing Worried about the workload increases and what training they will receive. Technical team They mainly helps to develop the system high how the system is developed and how testing is performed lack of knwonelge regarding the project As per the above communication chart it is seen that cost and benefits related to the project is most vital. Moreover, use of the cloud computing technology organization offers its services from anywhere and anytime. Cloud computing technology provides the office anywhere on demand delivery environment that changes the way infrastrure, desktop, LOB and storage applications are delivered to the clients (So, 2011; Chen et al., 2010; Chen, Zhao, 2012). Apart from that use of the cloud computing technology within the organization uses can simply access their data and information from anywhere via internet. The technology offers the cloud storage backup, which means the organization can stored its information in cloud and access them from anywhere at any time. As said by the Catteddu, (2010), Cloud storage and backup also provides simplicity, costs effective, removal of burden in house management and maintenance. The technology is deliver the data storage as services from the cloud provi der with the help of internet as well as billing computed on capability used in certain features. There are several benefits associated with the cloud computing technologies; Therefore, from the analysis and findings it is said that the stakeholders make an effective decision regarding the improvement of the services and incorporation of the cloud computing technology. Apart from that to implement the cloud computing technologies at workplace organization need to implements cloud computing regulatory stock take that provide an overviews of the country existing rules and regulations that implements to cloud services in Australia. The regulations cover the range of the contractual agreements, consumers protection, data protection and primary act. Security postures Security is the most vital elements for the organization and helps them to protect consumers data and information in successful manner. As said by the Catteddu, (2010), in present era most of the organization uses the past data and information to make decision in critical situations. As per the company scenario it is seen that access of the information of the organization done by the users suffering problems from accessing their own information from the organization. Moreover the observation also observed that network security also concerned one of the vital issues of the organization because the organization offers its services and products to users in both national and international market. Apart from that it is seen that the organization is suffered from the data storage issues that means to store huge amount of the data the organization needs to require extra hardware system that create high budget problems in front of the organization. Data breaches is one of the main component and organization security professionals believed that their organizations security measurements to safe data on physical devices i.e. server are low. Evaluating the scenario it is concluded that data breaching issues was more likely to occur for bank that uses the server. Hijacking of account also considered the main security issues of the organization and it is done mainly by attackers (So, 2011). Hackers or attackers continuously monitor the organizations network scenario and use of the malware code they can easily access the organization information and application software. After accessing the organization application software they modify and access the users personal information for his purpose. If the organization suffered from the security issues problems that they lose market confidence and customers satisfaction. Moreover, the analysis shows that if an organization not implements better security policies within the organization then they can hamper their organization performance and lose customers trust. Migrating organization critical application and their associated data source to an eternal cloud computing helps the organization to achieve high security, collaboration and mobility. As said by the Takabi, Joshi, Ahn, (2010), cloud computing technogly offers the organization to provide high level of the security protocol and to make sure data protection. The cloud computing technology implements high security protocols including strong access controls, data encryption technique, security intelligence. Apart from that cloud computing offers the virtualization security to the organization that means it provides the virtual server and application and it is not easy from the attackers or hackers to determine the exact location where data is stored. Apart from that the main security of the cloud computing technology is to enhance security software maintenance and mechanism. According to the Krutz, Vines, (2010), Cloud computing technology has an effectively ability to develop more soph isticated security procedures that helps the organization to secure users personal information and data. Costs associated with the cloud computing technogly are very less as compared to the physical data storage. Moreover, cloud computing technology provide application programming interface that provides organization the opportunities to customize their cloud expense better manner. Implementation of the cloud computing technology at workplace helps the organization to recover data, long term viability, investigated support, lower maintenance costs, redundancy and resilience. As per the evaluation and findings it is seen that the organization must have to implement migrate its application and data store in cloud computing technology because it not only helps them to secure its data but also achieve high users experience. In organization perspective, if they incorporate this technology at workplace then they reduces its extra hardware costs, maintenance problems and data security related problems. Apart from that accessing of the information is also done in easy manner as it provides huge amount of storage capability. Vulnerabilities, threats and consequences Risk assessment plan based on the vulnerabilities, threats and consequence Risk no Vulnerabilities threats consequences Risks summery Recommendation R001 Wet pipe sprinklers System in organization data base or data center Fire All the stored data in the database may be destroyed Fire should be activated causing water damage To check the fire system in regal basis R002 Organization users indentifies identification number no longer removed from the data center Users uses data in own purpose Integrity as well as confidentiality of organization data not authorized uses of not needed user identification could compromise integrity and confidentiality of organization data (Feng et al., 2011) in order to solve this problem in most effective and successful manner organization needs to update its data base in regular basis. On the other hand organization needs to change users password in every days. R003 Organization not updated its firewall system unauthorized users access the data and information Confidentiality and integrity of the data is hampered If the organization not implemented its firewall system in regular manner then attackers easily access the information In order to solve this problems in most effective and successful manner organization needs to implement dual firewall system in the database R004 Organization TCP packets directed at the port 1521 will hamper to stop responding Computer crime using malicious code Data integrity and confidentiality is hampered (Popovi?, Hocenski, 2010) Attackers attacks the computer network using denial of service attacks with the help of sending large amount of the package using port no 1521 could slow down the database In order to solve these problems, organization needs to impalements new updated antivirus system at workplace. R005 Password and user name are in initialization file and scripts Computer crime using malicious code Data integrity and confidentiality is hampered Password exploitation in initialization file and script could result in compromise of integrity and confidentiality of the organization data Update install antivirus system in regular manner R005 sensitive organization data is stored on USB drive Computer crime using malicious code Data integrity and confidentiality is hampered Loss of the data or information theft from USB drives could outcomes in compromise of data confidentiality Organization needs to implement high security password system in database and disable USB seating. Existing industry risk recommendations for the project As per the above risk assessment framework it is seen that risks R001 i.e. Wet pipe sprinklers System in organization data base or data center and risk R005 i.e. sensitive organization data is stored on USB drive might be occurred in the Australian multinational bank. Therefore in order to solve these problems in more effective and successful manner it is recommended that organization needs to update and monitor its security system in regular manner. From the findings it is also recommended that organization needs to implement up to date antivirus system at workplace that would helps them from the attackers attack. Data security The data flows associated with the project Identified rinks, Assess risks policies and risks mitigates Flow of the data from one end to other is shown in above diagram. With the help of cloud computing technology organization effectively send data from one end to others ends. Risks assessment and mitigation is explained in below table; Risks identification risk assessment Risk mitigation Data breach Data breach can be outcomes to loss the information and data of the organization. Implementation of the two factor authentication techniques and critical protection such as prohibiting the sharing account information (Krutz, Vines, 2010). Service or account traffic hijacking Use of this techniques in cloud computing it is too easy for attackers to hack the data and information of users accounts Implement a single sign on, end to end encryption techniques denial of service attacks accessing users information Upgrade system and in house applications Insecure APIs Manipulation of the users information and accounts done easy manner Implement SSL and TLS communication protocols Abuse of cloud services Access organization and users information easy manner (Krutz, Vines, 2010). Scope immediate services and implement dual firewall techniques Conclusion As per the above findings and analysis, it is seen that flexible costs, always on availability, high security, improved performance, improve coloration are the main features associated with the cloud computing that helps the organization to solve its existence issues in better manner (Takabi, Joshi, Ahn, 2010).. The findings shows that cloud computing have an ability to secure computer network and provide data to uses in easy manner at anytime and anywhere. Therefore, use of this techniques at workplace organization not only achieve better customers satisfaction but also reduces the complexity of the existence configuration. Moreover, from the observation it is seen that cloud computing is cost effective; therefore if an organization implement this techniques than they do not spend much amount in maintenance problems. Therefore from the findings and observation it is said that migrating business critical application and their associated data source to an external cloud hosting solut ion is the best approach for the organization. References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2010). A view of cloud computing.Communications of the ACM, 53(4), 50-58. Carlin, S., Curran, K. (2011). Cloud computing security. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011 (pp. 1-9). IEEE. Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for information security. In Web application security (pp. 17-17). Springer, Berlin, Heidelberg. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chen, Y., Paxson, V., Katz, R. H. (2010). Whats new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January, 20(2010), 2010-5. Feng, D. G., Zhang, M., Zhang, Y., Xu, Z. (2011). Study on cloud computing security. Journal of software, 22(1), 71-83. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Li, H., Dai, Y., Tian, L., Yang, H. (2009). Identity-based authentication for cloud computing. Cloud computing, 157-166. Popovi?, K., Hocenski, Ã… ½. (2010, May). Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE. Qian, L., Luo, Z., Du, Y., Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18. commbank. (2017). commbank.. [online] Available at: https://www.commbank.com.au/ [Accessed 26 Sep. 2017].