Tuesday, December 31, 2019

The Effects Of Different Types Of Physical Activity And...

In the previous chapters, we discussed the effects of different types of physical activity and exercise training on prevention and treatment of Alzheimer’s’ disease. We will now discuss the effects of cognitive training on improving the general and specific cognitive abilities of Alzheimer’s disease patients by initially focusing on the studies using cognitive training alone as a therapeutic intervention, and subsequently, contrasting the efficacy of this intervention against the combined physical activity and cognitive training protocol. Studies use three main cognitive-based approaches including cognitive stimulation, training, and rehabilitation. However, in some works, researchers tend to use these terms interchangeably . To clarify this confusion in terminology, we will provide a precise definition for each term. According to Clare et al, Cognitive training consists of a series of repeated standardized tasks aimed to trigger a specific cognitive function such as memory and attention. Cognitive rehabilitation, on the other hand, has a patient-centered approach and solely focuses on cognitive weaknesses of the subjects and attempts to improve their ability in performing daily life activities. Finally, cognitive stimulation is the least specific training and consists of a wide variety of social activities targeting improvements in global cognitive performance (i.e., thinking, concentration and memory) as well as social interactions . Characteristics of usual interventionsShow MoreRelatedThe Marketing Research of Bra inquiry33782 Words   |  136 Pagesresearch provides detailed information related to Belgian psychologists that were found. The same counts for golf clubs. Extra information about Belgium includes Word documents containing information about Belgian ADHD support groups and Alzheimer s disease support groups, additional to this PDF files include information about patients with Mental Health problems in Belgium. These .pfd files are taken from Belgian federal statistics website. Unfortunately, not much information was not foundRead MorePet Therapy3042 Words   |  13 Pages The origin of animal-facilitated therapy can be traced as far back as 18th century. The York Retreat, founded in 1792 by the Quaker merchant William Tuke, was cited to be the first use of animal-facilitated therapy. Instead of harsh forms of treatment, the York Retreat emphasized positive means to control behavior. Animals could be found all over the retreat, and the patients were encouraged to learn to care after them. The York Retreat is used as a model today in the form of animal-facilitatedRead MoreSymptoms And Symptoms Of Anxiety9666 Words   |  39 Pagesmomentarily flash through your mind, bringing with them feelings of fear. The more you think about these feelings, the more fear seems to come as a result. Your nervous system may become disturbed and your stomach may also feel the effects of these negative thoughts. Your general physical health can suffer greatly as a result of anxiety. Anxiety is a vicious cycle; the more you dwell on the negative thoughts and sensations, the more follow as a result. The feelings that follow will then you will dwell uponRead MoreSmart Home Technology10920 Words   |  44 Pagesis unprecedented, without parallel in human history. The 21st century is witnessing even more rapid ageing than did the century just past. Population ageing is pervasive, a global phenomenon affecting every man, woman and child. Different countries are at very different stages of the process, and the pace of change differs greatly. For example, Japan has experienced very rapid ageing to which it has had to quickly respond. Countries like Australia are experiencing a more gradual process where they

Monday, December 23, 2019

I Am John Fitzgerald Kennedy s Inaugural Address

The date read January 20, 1961 on the front page of the Washington Times. As I tossed my newspaper onto my bureau and stood in the mirror, I shifted my tie back and forth, repeating; â€Å"the world is very different now† (â€Å"Inaugural Address† 1). These were the words I would present in my inaugural address just hours away. I have ideas-- principles that will change lives, views that will transform a nation, and philosophies that will evoke peace in today’s modern world. I will strive for my fellow Americans to â€Å"ask not what your country can do for you--but what you can do for your country† (1). I am John Fitzgerald Kennedy, a Harvard graduate, a Navy man, a former Congressman, a Senator, and now the 35th United States President. I will drive†¦show more content†¦These students are willing to pick up their bags and fly across the world to gain new experiences. Therefore, I began to advocate at universities, one such as the University of M ichigan. I began promoting this program as a candidate back in 1960. I spoke to a crowd of 10,000 â€Å"challenging American youth to devote part of their lives to living and working in Asia, Africa, and Latin America† (Burner 1). Statistically, American youth is an unstoppable breed. The willingness to serve is overpowering and stems further into younger and younger generations. Humanity is a powerful force. Immediately after my speech, a petition was created with over 1,000 signatures supporting my ideas with pledges ready serve. â€Å"Since then, more than 150,000 citizens of all ages and backgrounds have worked in more than 130 countries throughout the world as volunteers in such fields as health, teaching, agriculture, urban planning, skilled trades, forestry, sanitation, and technology† (Burner 1). I wanted to pursue widespread change. I proposed bills such as the Alliance for Progress which gave 21$ billion in loans to Latin America for schools, hospitals, and o ther service developments. I shot for the Equal Employment Opportunity (10925) to put a stop to racial discrimination in the working class. Finally, to lower the criticism of so few women working in administration, I asked Eleanor Roosevelt to chair the Commission on the Status of Women (Kreiser 1). I constantly work to

Sunday, December 15, 2019

Business Studies Free Essays

What does the nature of business mean ? Usually, when filling out some kind of form, â€Å"nature of business† refers to the type or general category of business or commerce you are describing. For example, if you worked at McDonald’s, the nature of your business is food services. â€Å"Nature of Business† means what type of business your are doing? like Wholesale, Retail or Service, Manufacturing, Marketing, etc. We will write a custom essay sample on Business Studies or any similar topic only for you Order Now If you want more specific, then HBA wholesale, Car Service, Furniture manufacturing, health Drinks Marketing, etc. The nature of business, means what exactly your business is doing and what is the service/product you are offering. For example the nature of â€Å"Walmart† as a business is â€Å"Retail† and the nature of â€Å"Microsoft† is â€Å"Software. † Internal and External Influences on businesses The external environment includes those factors over which the business has little control, such as government policy, technology, economic conditions and social attitudes. The internal environment includes these factors over which the business has some degree of control, such as products, location, resources, management and business culture. External Influences on business  ·Economic  ·Financial  ·Markets  ·Competitive siuation Technological  ·Institutional  ·Political  ·Legal  ·Social  ·Geographic If you had a shop and everyone decided to go to another shop that would be an econmic disaster! If this continues for a month then the business would close, employees would be laid off, and landlords and suppliers will not be paid. Charasteristics of boom perios – Higer lever of employment -Inflation may increase – The level of spending by consumers increases as they have more confidence in the economy Characteristics of recessi on period – Unemployment levels rise – Inflation may remain stable or fall Wages are less likely to rise as employers – The level of spending usually decreases Internal influences on Business – Product – The types of good and services will affect the internal operations of a business, The product influence and the size of the business -Location -A good location is an asset and will lead to high levels of sales and profits and a bad location is a liability that adversely affects sales and products  ·Location Factors – Visibility, promixity to customers, promixity to suppliers and promiximity to support devices -Management- Resource management -Business culture Failure to SME failure  ·Failure to plan  ·lack of information  ·leaderhsip skills  ·inaccurate record keeping  ·new taxes  ·not enough sales  ·economic turndown  ·staff difficulties Success to SMEs  ·Entrepemtual abilities How to cite Business Studies, Essay examples Business Studies Free Essays string(63) " his knowledge of management in a unique and different manner\." This helps in increasing productivity and efficiency and minimization of wastage of time/cost. Due to power feature most of the times, Mr., Ram, operates on double shift in order to complete target production. We will write a custom essay sample on Business Studies or any similar topic only for you Order Now He is able to achieve target but at higher cost. Mr.. Ramie’s main consideration is cost cutting . So he concentrates more on producing goods with fewer resources. He is unable to achieve target production. Mr.. Joy uses minimum resources to chives target production and is also able produce goods is at lower cost. A) In the above case two important aspect of management have been highlighted, which are alike two sides of the same coin. Identify those two aspects. B) Identify the principle of Payola being followed in Learner’s Ltd. (c ) Identify the principle of payola being followed in Learner’s Ltd. (d) Though Mr.. Ram and Mr.. Ihram have failed to achieve both the aspects identified in part (a) above, yet they strives to achieve the same. Identify the value being highlighted. Answer: (a) The two concepts referred above are † efficiency† and â€Å"Effectiveness†. (b) Mr.. Joy, has considered both the aspects. C ) Principle of order (d) Respons ibility : By taking care of one’s own responsibility and striving for achieving efficiency and effectiveness. 2. Management of EX. Ltd. Fulfills all its objectives and the organization is able to work effectively and efficiently. It is using environment friendly methods of production and disposing off the waste material either by recycling it or using the same for landfill in such a manner that the aquatic life is not disturbed. Thus it also provides employment opportunities to the disadvantaged sections of the society. It was also decided that the remuneration payable to the disadvantaged sections Of the society should be fair to both employees and the employer. (a) Identify the objective of Management of EX. Ltd. Which it want to fulfill by ongoing the above activities. (b) State the other two objectives that the management of EX. Ltd. Should fulfill. (c ) Identify the principle of payola being referred in the above case. (d) Identify any two values which EX. Ltd. Wants to communicates to the society through its above stated activities. (a) the objectives of management of EX. Ltd. Which is wants to fulfill by doing the above stated activities is social objective. (b) (l) Organization objectives and (II) personal objective. (c ) (l) principle of ‘Remuneration of employees’ (d) (l) Sensitivity towards Environment: By using the waste material for cycling and landfill. (II) Responsibility : By providing employment opportunities to the disadvantaged section of the society 3. Raja Ltd. Is engaged in manufacturing electrical appliances. The company has been facing lot of problems for the last few months because of chaos between two departments two departments biz; Production Department for delayed production. However, Production Department blames sales Department for poor sales. The force can integrate the two Departments is missing. Moreover in the production department both the management’ and the ‘ workers’ do not realize the importance of each other. There is no corporation, Mutual confidence and sense of goodwill between the managers and workers. (a) Identify the missing force in the above case. (b) Identify which principle of Taylor is being referred above. (c ) List any two values which can be cultivated among the employees by using the force identified in (a) above. A) Coordination (b) Cooperation, Not Individualism (c ) (l) Cooperation : By integrating all group efforts. (II) Unity : By ensuring that all activities aim at accomplishment of organizational goals 4. EX. power Ltd. Set up a factory for manufacturing solar lanterns in a emote village as there was no reliable supply of electricity in rural areas. The revenue earned by the company was Increasing day by day, so the company decided to increase production to generate higher sales. For this, they decided to employ people from nearby villages as very few job opportunities were available in that area. The company alias decided to open schools and crà ¨ches for the children of its employees. (I) identify the and explain the objectives of management discussed above. (II) State any two values which the company wanted to communicate to the society. (I) The objectives of management referred to are: a) organizational objectives These refer to the utilization of human and material resources considering the interest of all stakeholders. (b)Social objectives These refer to the creation of benefit for various constituents of the society. If an example has explained survival and growth as objectives of management instead of organizational objectives, full credit is to be given) (II) Values which the company wanted to communicate to the society are : (Any two) (a) providing employment opportunities (b) Development Of backward regions. (c ) Providing basic amenities to employees. D )Concern for the environment. ( or any other correct value) 5. Mega Ltd. Was manufacturing water- heaters. In th e first year of its operations , the revenue earned by the company was just sufficient to meet its costs. To increases the revenue, the company analyzed the reason of less revenue. After analysis the company decided. (l) To reduce cost by shifting the manufacturing unit to a backward area where labor was available at a very low rate. (II) To start manufacturing solar water – heater and reduce the production of electric water- heaters slowly. This will not only help in covering the risk, but also help in meeting other objectives too. (a) Identify and explain the objectives of management discussed above. (b) (a) The objectives of management referred to are: Organizational objectives (b) Social objectives these refer to the creation of benefit for various constituents of the society. If an example has explained survival and growth as objectives Of management instead of organizational objectives, full credit is to be given ) (II) Values which the company wanted to communicate to the society are: (a) Providing employment opportunities (b) Development of backward regions. C ) concern for the environment. (or any other correct value) 6. AR Raman is the first In dian to to win Oscar award for his composition ‘Jaw Ho’ His composition of music is unique and different as he has used the singing notes in a manner that is entirely his own interpretation. Like A. R Raman, Mr.. Rakes , General Manager in wave Ltd. Uses his knowledge of management in a unique and different manner. You read "Business Studies" in category "Papers" All the employees working under his guidance are happy and satisfied because of his behavior. He everyday rewards/ appreciates the employees for coming office on time, performing their signed tasks with best of their capabilities. Moreover, Mr.. Rakes treats all his employees as fairly as possible. He does not discriminates his employees on the basis of sex, religion, caste, belief etc. (a) Identify the nature of the management highlighted above. (b) State two others ways in which nature of management can be explained. C ) Identify the values that Rakes wants to in calculate in his employees . Also explain how? (a) Nature of management highlighted above is ‘Management is an art’ (b) The other ways in which nature of management can be explained are : (l) The Management as science and; II) Management as profession. (c ) Principle of ‘equity’ (I) Good behavior in human interaction : Because all employees working under his guidance are area happy and satisfied because of his behavior. (II) Discipline/Punctuality: By rewarding the employees who come in t: mime. (Ill) Responsibility : By rewarding the employees for performing their assigned tasks . . Pizza Home is a chain of stores making pizzas, located at different states of India. Earlier the process of making the entire Pizza was assigned to individual worker. And thus, the standard regarding taste, quality, shape etc. As not uniform and the company was not getting good response from customers. The company decided that instead of assigning the whole job of making pizza to one employee, different employees were give n the task of making pizza bases, preparing toppings , baking of pizza, packaging etc. The effects of all the employees are directed towards the achievement of common organization goals. As a result, each employee has gained perfection and specialization in his job and improved his efficiency and effectiveness. It was also decided that every branch of Pizza Home all over India Would austerities first Ten baked pizzas to poor people. (a) Identify the principle of Payola being followed by pizza Home. OR Identify and explain the principle of management being followed Pizza Home. (b )latently the feature of management being referred above. (c ) Identify the value being referred above. (a) Division fork (b) Management is a Goal oriented process (c ) Respect towards the poor: By distributing first ten baked pizzas to poor people. . Tanya Sahara and Salaam Khan, having same educational qualifications, are working as Managers in Alfa Ltd. The management of Alpha Ltd. Enables it to provide better quality goods services generating employment opportunities, increasing wealth of nation etc. Tanya Sahara belongs to a rural area where employment opportunities area very less wherea s Salaam Khan belongs to an urban area Ignoring many other differences between the two, management of Alfa Ltd. Appointed then as Assistant Manager, On the same salary packages of RSI. 45,000 per month. A) Name and briefly explain the principle of management being followed in the above case. (b) identify the value which Management of Alfa Ltd. Wants to communicate to the society. C ) identify the value which management of Alfa Ltd. Wants to communicate to the society. (a) Principle of Equity’ (l) the principle of equity implies that similar treatment is SSL_Jeered to employees in similar positions. (II) According to this principle, managers should be fair and impartial while dealing with their subordinates and there should be no discrimination on the basic of sex, religion, language, caste, belief, nationality etc. Ill) Equity is essential to create and maintain cordial relations between a manger and his subordinates. (b) Management helps in Development of the Society. C ) Eq uity By not discriminating on the basis of gender, Caste, religion region and sex providing equal opportunities to grow. 9. Zee Ltd. Was not performing well. After detailed analysis it was discovered that workers of the production department were not satisfied with the behavior of Mr.. Jay the production Manager as workers were forced to work for long hours without any rest. Keeping this in view this the management decided his M. B. A from MM Mandated. Mr.. Ajar analyzed the work which involved heavy manual labor. He allowed small pauses to the workers so that they could recharge their energy for optimum contribution. He also conducted a detailed analysis on the environment in which the business exist and thus he used to change the goals, plans, policies according to the needs of the environment. (a) Name the technique of scientific management adopted by Mr.. Ajar. (b) He further desires to find out the best ways of doing a job. Suggest him the technique of scientific Management. (c ) Identify the feature of management being referred above. (d) State the ‘Values’ which Mr.. Ajar want to communicates to the society by allowing small pauses to workers. (a) Fatigue study (b) Method study. (c ) Management is Dynamic Function d) Respect towards employees/Humanism/ Sympathy 10. NNE of the principles Of scientific management emphasis that there should be a complete mental revolution on the part of both management and workers. Workers and managers should know the importance of each other. Both the groups should good understanding between them. (a) Name and explain the principle of scientific management involved above. (b) Fool emphasized team spirit Of unity and harmony among employees. Name and explain the principle. (c ) Name the common values emphasized in (a) and (b) above. (a) Harmony not discord : Taylor has emphasized that there should be complete harmony between the workers and the management since if there is any conflict between the two, it will not be beneficial either for the workers or the management. Hence, both management and workers should realize the importance of each other. (b) E spirit De corps : According to Fool, † Management should promote team spirit of unity and harmony among employees†. In order to achieve organizational objectives, Management should promote team work and coordination. (c ) (l) Harmony (II) Cooperation 1 1 -One of the principles of scientific Management emphasizes that † to make he employees learn the † best method† Of production, training to workers is essential†. It further emphasizes that each person should be scientifically selected and the work assigned to the employees should suit their physical, mental and intellectual capabilities. (a) Name and explain the principle of scientific management involved. (b) Name the principle of scientific management which is concerned with selecting the best way of performing a job through application of scientific analysis and not by intuition or hit and trial methods. (c ) Name the value emphasized by following the principles in part (a) above. ) Development of each and every person to his or greatest efficiency and ability. Taylor emphasized that to attain efficiency, steps should be taken right from the Efficient employees produce more to earn more. (b) Science not rule of thumb. (c ) (l) Growth for all (II) Prosperity for workers and company 12. Shanghais ( a foreman of Hair Ltd. ) is given the responsibility of meeting production target of 1 ,OHO TV. Sets in a month. The target can be completed by p lacing 100 workers under him. Presently, only 80 workers are working under him. He is not giver the authority to employ 20 more workers. Hair Ltd. Fulfills financial needs, social needs and higher level needs of these employees. As a result, he fails to meet the target. (a) Which principle of Payola is not applied here? Or Which principle is being violated in the above case. (b) Explain in brief the principle which should be applied in the above case. (c ) Identify the objective of management being referred above. (a) Authority and Responsibility (b) there should be balance between authority and responsibility. If an employee has been assigned any responsibility, he must be given sufficient authority to do his job efficiently. (c ) Personal Objectives. 3. Ship enterprises is a small organization manufacturing cloth and jute bags. It follows the functional organizational structure. There is separate department for finance, marketing production and Human resource. These departments are well co- ordinate there is a congenial work environment and employees are happy and satisfied . The employees and encouraged to develop and carry out plans for improvements in the organization leading to a feeling of ownership among them. Besides, the company provides nutritious and hygienic lunch tit its staff and a good creche facilities for its employees children. A) Name any one feature and one principle of management highlighted in the above case. (b) Identify any two values which Ship Enterprises wants to (l) Management is an intangible force (II) Initiative (b) Fulfilling social responsibility/ Concern for the health of the employees : By providing nutritious and hygienic lunch to all the staff and creche facility for the children of its employees’ 14. BBC Ltd. Was involved in business of manufacturing leather and selling products under a famous brand ‘X’ workers worked according to their past experiences as per the traditional methods. To meet the increasing demand or its product, and in order to keep the market share, the existing workforce was instructed to analyses their work scientifically work overtime, which resulted in many problems. The department, which was previously producing one type Of product, was asked to produce more than one type of products which leads to overlapping and wastage. Small jobs were combined into bigger jobs. The efficiency of workers declined due to increased workload . At times, the workers worked under many superiors and everything in the factory got misplaced due to interference of many persons, which caused hindrance to the activities. This reduced the team spirit among the workers. Lowered their morale as they felt cheated and indiscipline was induced. Intelligent employees stopped themselves to develop carry out plans for improvements. Resultantly, Quality of products declined and market share decreased. How to cite Business Studies, Papers

Saturday, December 7, 2019

Principle of Information Security Case Study of PeopleSharz

Question: Discuss about thePrinciple of Information Securityfor Case Study of PeopleSharz. Answer: Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study.Information management,51(2), pp.217-224. Introduction The report depicts the problems that has been raised in an organization namely as PeopleSharz, an internet startup company, founded in the year of 2012. In order to develop its position in the competitive marketplace the organization is willing to adopt different business strategies. During analysis it has been found that the website of the company was attacked by the external hackers and the confidential data from the storage area are shared publically. In order to achieve financial stability PeopleSharz has started to analyze the technical problems of the organization. The background of the organization and related problems will be illustrated in this report. The reason behind hacking and dependencies and the critical success factors to the job will also be demonstrated in this report. Background and the Problem Analysis PeopleSharz, an Internet startup company founded in the year of 2012 and the founders of the company are Peter Tweet and Mark Bukerzerg. On 21st April, 2016 the website of the organization was hacked by the hackers and in a teleconference the shared data by the hackers are analyzed and found to be real. From the teleconference the organization came to know that the shared data are similar to the confidential data stored in the database of the organization. The hackers were successful to steal the data from the storage (Rodrigues et al. 2013). Due to this reason the security statement established by PeopleSharz is facing several questionnaires. The main reason behind the hacking was lack of data security or improper usage of encryption keys. The data stored in the database of PeopleSharz used public symmetric key for data encryption but the key was shared key and thus it become easier for the hackers to use the shared key (Fernandes et al. 2014). In order to decrypt the data hackers easily used the shared key. Improper data encryption was the major reason of data hacking. Cryptography is referred to as one of the major area of concern for every organization to maintain the security of the data. Nowadays, the networks used by different organizations are taking global form and information stored in the database is becoming digital (Mahajan and Sachdeva 2013). As information play the vital role, thus open communication channels and stealing of sensitive information are becoming the main target for the hackers. The modern set of cryptography provides robust technology set. However, many benefits and challenges are identified related to encryption (Deligiannidis, et al. 2013). It provides four basic services regarding information security. Encryption technique was used to secure the information and the communication from the unauthenticated users. Authentication is another helpful tool of encryption process which provides authentication such as MAC and digital signature. Digital signature helps to prevent spoofing, snooping and DOS attacks. In addition to this, PeopleSharz encrypted its network traffic to avoid the threat vectors. Introduction of digital signature, and cloud based platform SaaS, PaaS, IaaS to enhance the level of data confidentiality (Li et al. 2013). The website is required to be developed with the help of SSL/TLS. Different operational procedures are adopted to develop the data security of the system. However, PeopleSharz is a startup internet based company, thus the cost estimated or the budget of development was not enough to implement cloud based solution and digital signature process to keep the security of the data. Lack of usage of data security package is one of the major reasons behind the data hacking. The administration or top level management team of PeopleSharz was not using proper data encryption technologies. Virus attacks or malicious attacks on the system administration helped the hackers to steal confidential data from the data storage (Fernandes et al. 2014). The database management system used by the organization must have been used encryption key. By using this technology only the authenticated users access the data stored in the storage. Data disruption, deception, active attack, passive attacks are the different kinds of attacks or hacking methodologies. Analysis of the Threats During threat analysis of PeopleSharz different threats are identified and these are as follows: Malware: This is the acronym of malicious software. Malware can either be software or a virus or a worm as well. The hackers generate programming codes and transmit it through website or network to the users device (Parashar and Arora 2013). If the user access those websites or network then the virus carried out by the site will attack the stored data. Computer virus: This s referred to as virus because it can travel from e infected device to another. Dishonest people generally use this kind of programs to attack the confidential data of an organization or any personnel (Bernstein, Lange and Schwabe 2012). Virus is also capable to delete data, store data or edit data rather virus can even change the content of the data. Rogue security software: This is a special kind of advertisement that forces one user to access the link. Generally, when people uses any kind of social media it has been found that sometimes advertisement regarding popup windows opens and forces the users to click on that particular link (Ren, Wang and Wang 2012). As soon as the user clicks on that link, unwanted malicious generates and attacks the data stored in the files of the device. Crypto wall 2.0 is an incident of data hacking where the users were unable to reassess their data until or unless they provide bit coins to the hackers (Boyle 2014). Botnet: This is referred to as a group of computers connected through a single internet network. Each single device connected to the device is known as zombie computer (Chen and Zhao 2012). This kind of attackers generally attacks the devices by using email or spam. The objective of DOS attack is to bring down a website application by overloaded user request rather it can be said that sometimes it has been found that one website is requested by many users and after each access the data stored in the website can be hacked by the hackers. Trojan horse: This is referred to as software that might attack by simple operating an application or by downloading. If any device is attacked by the Trojan horse then it can do everything (Singh 2013). Different records stored in the database of an organization, can be hijacked and those data can be used by any one regardless of the location and the geographical boundary of the users. Malicious spyware: The malicious spyware is generally used to describe different Trojan applications. The cyber criminals might used this kind of spyware to hack the confidential data of whether any organization or any individual (Deligiannidis, et al. 2013). Over the internet the recorded data can send back to the cyber attackers. Whenever, the top level management team of an organization wants to monitor the workflow or any employee, and then they use this kind of spyware to track the flow of the data. Spam: This is an electronic junk mail (Mahajan and Sachdeva 2013). The users devices might get attacked by the hackers by the usage of this kind of spam. If any user tries to access the spam mal then the other mails stored in the drive of the machine can be hacked by the attackers. Rootkit: In order to achieve administration level access a computer network uses the Rootkit (Bernstein, Lange and Schwabe 2012). It is basically a collection of tools that that used to access the administration level records. This can be installed by the criminals in the users device so that they can access the data from the storage. For exploiting data from the storage this can be used by the cyber criminal or hackers. Mitigation process: In order to mitigate this issue it is recommended to PeopleSharz to adopt the best suited encryption process. The public and private keys used by the organization should have to be shared by nature so that only the authorized users can access the data whenever required (Parashar and Arora 2013). However, it can be said that, they are needed to adopt cloud based technology to resolve or fix the issues of Botnets and Trojan Horses. Additionally, the strong configuration and restricted connectivity is required to be adopted to improve and enhance the efficiency level of data protection. Dependencies and Critical Success Factors to the Job In order to develop the efficiency of an organization, an organization is required to depend on the stakeholders of the organization. The users and employees of an organization are interviewed to collect different sorts of information associated to the security breaches. Host: It can be said that if the reasons of data breaches are the host providers then they are responsible for this process (Boyle 2014). Nevertheless, if the host providers are not the actual responsible person, then also they will suffer due to the violence occurred. Administration: They are the top level management team of PeopleSharz. The board of directors are also part if the administration. It is necessary for them to be aware of all the legal rules and regulations regarding privacy and security (Chen and Zhao 2012). Due to hacking massive part of PeopleSharz are affected very badly. The data stored in the database management system of the organization are hacked and publically released. Improper application of encryption key is another reason thus the administration is also responsible for the attack. Consumers: The consumers of the product of PeopleSharz are affected very badly. The attackers not only attacked the confidential data rather they shared it (Kumari and Chawla 2015). The consumers are facing technology based challenges as the hacked data are financial and personnel by nature. Employees: The employees working for PeopleSharz are mostly responsible because they were not aware of the technical terms regarding data security (Singh 2013). The rules and regulations needed to be followed by each and every employees working for the company to keep the data security. Recommendations In order to improve the security management process for PeopleSharz, certain recommendations are needed to implement. These are as follows: Secured data transition: PeopleSharz is a start up internet based company, and it needed to provide security to data during transaction from host to client. As the current system does not possess proper data security thus they must focus on transmission time data privacy. Proper encryption tools: In order to encrypt data proper encryption tools are needed t be implemented. The system does not possess all the tools thus; PeopleSharz should adopt required algorithms of data encryption. Cloud based management: Cloud based management system is needed to be implemented as it is cost effective and secured by nature. Service oriented network virtualization towards convergence of networking and cloud computing should support the SOA architecture. Secured architecture: The architecture of PeopleSharz is needed to be secured enough so that unauthorized users cannot hack the data from the data storage easily. Conclusion From the overall discussion it can be concluded that, PeopleSharz has not maintained all the rules and regulations that are needed to be implemented to keep the data security. Different wrong things involved in the system, are identified and the mitigation process regard that is also mentioned in this report. The hackers hacked all the confidential data from the database of PeopleSharz and almost all the associated people such as employees, administration, clients and host providers are found to be responsible and affected by the attacks. Moreover, in order to mitigate the problems or in order to improve the security management process, certain mitigations are also mentioned in this report. References: Bernstein, D.J., Lange, T. and Schwabe, P., 2012, October. The security impact of a new cryptographic library. InInternational Conference on Cryptology and Information Security in Latin America(pp. 159-176). Springer Berlin Heidelberg. Boyle, M., 2014. Information Assurance Standards: A Cornerstone for Cyber Defense.Warfare,13, pp.8-18. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Deligiannidis, L., Wiseman, C., Yun, M. and Arabnia, H.R., 2013. Security Projects for Systems and Networking Professionals.Emerging Trends in ICT Security, p.111. Deshmukh, D., Pasha, A. and Qureshi, D., 2013. Transparent Data Encryption--Solution for Security of Database Contents.arXiv preprint arXiv:1303.0418. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Incio, P.R., 2014. Security issues in cloud environments: a survey.International Journal of Information Security,13(2), pp.113-170. Kumari, S. and Chawla, J., 2015. Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security. Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), pp.131-143. Mahajan, P. and Sachdeva, A., 2013. A study of Encryption algorithms AES, DES and RSA for security.Global Journal of Computer Science and Technology,13(15). Mohamed, E.M., Abdelkader, H.S. and El-Etriby, S., 2012, May. Enhanced data security model for cloud computing. InInformatics and Systems (INFOS), 2012 8th International Conference on(pp. CC-12). IEEE. Nafi, K.W., Kar, T.S., Hoque, S.A. and Hashem, M.M.A., 2013. A newer user authentication, file encryption and distributed server based cloud computing security architecture.arXiv preprint arXiv:1303.0598. Parashar, A. and Arora, R., 2013. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3, pp.1922-1926. Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud.IEEE Internet Computing,16(1), p.69. Rodrigues, J.J., de la Torre, I., Fernndez, G. and Lpez-Coronado, M., 2013. Analysis of the security and privacy requirements of cloud-based electronic health records systems.Journal of medical Internet research,15(8), p.e186. Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19).