Tuesday, December 31, 2019

Aristotle s Highest Good Theorem - 1037 Words

Phil 100 A01 Essay 2 Aristotle’s Highest Good Theorem When Aristotle first published his work entitled â€Å"Nicomachean Ethics†, you can imagine that numerous philosophers, scholars, and ordinary citizens were deeply contemplating his idea of the Highest Good Through the actions of virtue and reason, the act contemplation satisfies Aristotle’s characteristics as the Highest Good Being a self-sufficient, and complete activity, the ability to understand our function as human beings through contemplation achieves the Highest Good Aristotle’s characteristics for the Highest Good fall under these guidelines: i) It is desirable for itself ii) It is not desirable for some other good iii) All other goods are desirable for its sake Taking this definition into account, it’s obvious numerous people (including myself at times) seek happiness through other means. Many focus on obtaining pleasure, wealth, and/or honour. While widely desirable, they are means to happiness, and thus, are desirable for themselves, desirable for some other good, and other goods are not desirable for their sake. By this evaluation, Aristotle concludes that these aspects could not constitute the Highest Good. Aristotle believes that he who achieves the Highest Good is â€Å"not for some chance period but through a complete life† (Nicomachean Ethics, 1001a10). Aristotle’s idea of looking at one’s life at a whole, as opposed to scrutinizing over minor events, may constitute some degree of delayed pleasure and may beShow MoreRelatedImportance of Education Knowledge in Islam10950 Words   |  44 Pageswitness to a true celebration of knowledge. That is why every traditional Islamic city possessed public and priva te libraries, and some cities like Cordoba and Baghdad boasted of libraries with over 400,000 books. Scholars have always been held in the highest esteem (respect) in Islamic society. Libraries in Islamic Cities and in European Cities 1. Islamic culture valued literacy. In the ninth century, the library of the monastery of St. Gall was the largest in Europe. It boasted 36Read More4g Communication22481 Words   |  90 Pagesacross distinct service environment in different frequency bands. †¢ Lack of end-to-end seamless transport mechanism spanning a mobile sub-network and a fixed one. However, the demand for higher access speed multimedia communication in today s society and the limitations of 3G communication service wave the path for 4G mobile communication. Architecture of 4G: One of the most challenging problems facing deployment of 4G technology is how to access several different mobile and wirelessRead MoreLogical Reasoning189930 Words   |  760 Pagesreasoning has been enjoyable for me, but special thanks go to my children, Joshua, 8, and Justine, 3, for comic relief during the months of writing. This book is dedicated to them. For the 2012 edition: This book is dedicated to my wife Hellan whose good advice has improved the book in many ways. vi Table of Contents Preface.........................................................................................................................................................iii Copyright

Monday, December 23, 2019

Women in Early Colonial Australia The first 100 years

In the first 100 years of colonial Australia women of all status and race were a marginalised segment of society; considered inferior to and for the use and support of men (Summers, 1975), (Dixon,1999). It is not surprising therefore that historical accounts of women’s activities between 1788 and the late 1800’s, whether white, black, convict, or free, are much less documented than those of men. The accounts that have been recorded, however, point to women from substantially different ages, cultural backgrounds, education, health, social stations, and personal histories holding various amounts of power (or lack of) and acting within varied and fluid physical and social environments (Macintyre, 2009), (SBS, 2012). In this short essay we will present a very superficial account of these women’s experiences. The three main categories of women in this dangerous environment and social landscape were: (1) white convicts and young orphan girls; (2) free white settlers and military wives; and (3) Aboriginal native women (Macintyre, 2009). White convict women and young orphan girls were seen by many (both men and women) as breeding stock for settlers. Male colonists needed women as wives, mothers, sexual partners, and domestic servants. Often convict women were viewed as depraved unattractive incourageable whores (Summers, 1975), (Dixon,1999). Those cast out were often sent to houses of correction termed â€Å"Female Factories†. The factories also acted as female hiring depots where theShow MoreRelatedIntroduction Of Rail And Wallangarra1419 Words   |  6 PagesIntroduction: Rail and Wallangarra The earliest presence of rail travel in Australia began in 1854, first developed within states to link major settlements with various resources. The idea of intercolonial transportation began circa 1855: a network of railways systems crossing the country and connecting major settlements. Railways slowly expanded as settlements developed further inland, with rail essential in bringing farm and mining produce to capital cities and ports. Wallangarra, a town situatedRead MoreHealth Equality3685 Words   |  15 PagesHEALTH EQUALITY: A COMPARATIVE ANALYSIS OF AUSTRALIAN ABORIGINALS , TORRES STRAIT ISLANDERS AND THE FIRST NATIONS OF CANADA INTRODUCTION Equality in health implies that ideally everyone should have a fair opportunity to attain his or her full health potential and, more reasonably, that no one should be disadvantaged from achieving this potential. Based on this definition, the aim of policy for equity and health is not to eliminate all health differences so that everyone has the sameRead MoreCompare and Contrast - Women5945 Words   |  24 Pagescontrast women 100 years ago and women today. I. Intro 1. Womens lives have changed enormously this century and the actions of women themselves have played a vital role in the transformation. Putting women back into history is about giving individual women their history, but it should also be about making some collective sense out of womens divergent experiences. 2. At the beginning of the century most women were invisible in society, whatever their class.. II. Clothes a. Clothes 1. 100 years Read MoreHistory of Security Essay example3164 Words   |  13 PagesThe Beginning When security first started it was the job of every person to watch there own property and belongings. (Kelly, 2005) If there was a grievence it was handled by the individual or a small group of people. It was not until 2100 b.c. that things were codified by Hammurabi, also known as the King of Babylon. (King, n.a.) Hammurabis Code includes the Code of Ur-Nammu, Laws od Eshnunna and Lipit-Ishtar Isin, than later codes were added including Hittite laws, Assyrian laws, and Mosaic LawRead MoreReview Of Related Literature : Marriage Migration2045 Words   |  9 Pagescommon. Among the different types of migration, there is a subcategory of migration called Marriage Migration. Marriage migration is defined by Aurora De Dios as â€Å"a collective term referring to cross-border marriages, which often involves women migrating to the home country of their husbands.† According to Albert Esteve, Joan Garcia, and Robert McCaa s Comparative Perspectives on Marriage and International Migration, 1970-2000: Findings from IPUMS-International Census Microdata Samples,Read MoreSocial Determinants of Health10939 Words   |  44 Pagesemotional wellbeing and mental health. The history of colonisation is addressed, the subsequent devastation of Indigenous Australians, and their resilience and struggle to claim equality and cultural recognition, and to shape the present. Indigenous Australia is made up of two cultural groups who have shared the same struggle, yet often when using the term Indigenous, a Torres Strait Islander history is absent. In this chapter both cultures are equally presented. Brief overviews are given of pre-contactRead MorePhilippine Religion3656 Words   |  15 Pagesof how religion retains its central role in society.[2] ------------------------------------------------- Ancient indigenous belief Animism, is the term used to describe the indigenous spiritual traditions practiced in the Philippines during pre-colonial times. Today, a handful of the indigenous tribes continue to practice it. The traditions are a collection of beliefs and cultural mores anchored more or less in the idea that the world is inhabited by spirits and supernatural entities, both goodRead MoreWine Consumption Essay examples6888 Words   |  28 Pagesthey have 30 acres of vines planted and another 100 acres at Mornington vineyard is planted with 70 acres of vines, with the ability to produce a variety of wine styles. Eddy and Frank are backed by an experienced team, with 50 employees in total. The winery currently produces 500,000 cases per year, but has the capacity to expand considerably. In Australia they sell for an average of $15 per bottle. 1-d. Product/sRead MoreMigration in the 19th Century5601 Words   |  23 Pagesinhabitants saw emigration, as the only possible solution to avoid the crisis of overpopulation, which would have left them with no or little income. Especially men left their home country for a better occupation, whilst women stayed at home or followed later (Dr. C. Cassar). In the early years, emigration was primarily an escape from the misery at home. After a while the need to go abroad was found in all social classes, but with different ambitions, being the eager of survival or the desideratum for aRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesHartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Michael Adas, ed., Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: Solidarity Remembered Janis Appier, Policing Women: The Sexual Politics of Law Enforcement and the LAPD Allen Hunter, ed., Rethinking the Cold War Eric Foner, ed., The New American History. Revised and Expanded Edition E SSAYS ON _ T WENTIETH- C ENTURY H ISTORY Edited by Michael

Sunday, December 15, 2019

Applying Management Theories Free Essays

Company A was initially formed as a group of engineering students to undertake the project of modifying and coding a Boot to automatically move around a maze as quickly as possible. The group was formed by Dry S. Watson, the project supervisor. We will write a custom essay sample on Applying Management Theories or any similar topic only for you Order Now The group consisted of four students: J. Peters, A. Shabbier, A. Mohammed and O. Added. The students began their project through the organized Company 1 meetings. In their first meeting they were introduced to each other, though J. Peters was absent, which disadvantaged him later in the project. The group cited that their first action would be to organize a group meeting in the week, before the next company meeting, a good pro-active decision. It was observed that no leadership took place in the group with everyone inputting questions that the group could not answer. The Part D students were then able to answer some questions. In the meeting the group did not discuss project strategy, but discussed sensor systems, there was no clear sensory system decided with A. Shabbier wanting to research into sonar systems and A. Mohammed continuing research into IR sensors and QUIT sensors. Over the next two weeks the group began to realize their task and formed their project structure based on the diagram, [ Figure 1 ]. The strategy overall was carried out well throughout the group, as they became more aware of mistakes that may have occurred without the plan and check stages. Once the strategy was in place, the Plan section was implemented. Within the plan stage the group took into account the following factors for equipment choice: Cost, Complexity and Acceptability. An example of this method was the choice of sensors, the group decided to use IR sensors, as they were cheaper than sonar systems, they were the east complex of all the systems and achieved the groups’ requirements. This decision making process was very powerful, as it gave the groups specific criteria that they had to uphold and it prevented members from verging off topic, which they were prone to doing. Figure 1 – Plan check do act (PICA) model A main failure of the group however, was that they did not choose a project leader. Their failure resulted in a leaderless structure to the group, immediately disadvantaging the group, as there was no one to make key decisions. This can be seen by tensions formed in the group with regards to sub-systems. The group decided to create sub-systems and allocate a person per sub-system, though this was a sensible systematic approach (though it could have been improved by using at a job design chart, such as in [ Figure 21). Breaking down the sub-systems affected the group with some tasks much simpler and straight forward than others. This process led to J. Peters and A. Mohammed wanting the same roles. The decision was made by the rest of the group that A. Mohammed would be better suited to the desired role. J. Peters had little contact with the group up until that point and this showed in the groups’ decision. J. Peters was left with the difficult task of producing the interim report for the group. This was a poor decision by the group as it meant that they issue also arose from the sub-system approach, where during one week; more than one member of the group was absent. This led to a halt in progress of the project in the areas where team members were away, as absent team members knew their role, but the other team members did not. This should have been factored into the projects’ risk contingency plan; however this was yet to be created by J. Peters. This failure resulted in a week without progress and certainly created tension not only thin the group, but between the group and supervisor as well. A better strategy would have been to split the design into sub-systems, but within each sub-system, tasks could be created and given to members of the group, allowing more than one group member to have knowledge of each sub-system to ensure progress continues. What sequence? Who else? How to interface with the facilities? Environmental conditions? How much autonomy? Skills? Where to locate? Tasks? Figure 2 – A Job design chart, enabling users to identify each role After the fourth week it was clear that A. Shabbier had taken charge of the project, which could be a positive factor of not immediately selecting a group leader, as it allowed time for the more dedicated person the project to take control, effectively becoming the natural leader. His indecision however, led to a long delay within an exercise the group carried out. A requirement that the group made was to increase the speed of the robot. The group originally removed the wheel and replaced it with a larger wheel increasing the speed, a good idea; however, their plan did not consider that they were not allowed to remove parts from the Boot. Therefore the approach taken by he group was to use their project PICA strategy and they were able to modify the wheel by creating an extension to use the original wheel as a shaft for a larger wheel. This shows good initiative from the group, however the issue should not and would limitation control. The group would have been better to choose a product design strategy, where they generated a concept, which they could feedback to the supervisor in a company meeting, who could then evaluate the groups’ design, making sure it is suitable for the set requirements. This would make sure the design fits the requirements and if not, it could be improved until it did. The groups’ strategy for their hardware sub-system had certain requirements, one of which included a LED display. The display was a creative concept as many ideas in the group were; however there was a delay in delivery (due to the University) which the group had not planned for. This delay was unplanned for with no risk contingency plan in place. This therefore meant the group had to alter their Giant chart to their needs at that time. This was poorly planned, as a better Giant chart would have had extra time allocated for work that could not be completed at the specific time. How to cite Applying Management Theories, Papers

Saturday, December 7, 2019

Challenges in Cyber Security For Business

Question: Discuss about the Challenges in Cyber Security For Business. Answer: Literature Review Scope and Objective The information and communication industry has evolved greatly over the last three decades. Technology has taken control of a significant part of everyday activities, especially in business. At present, all businesses have integrated their operations with the use of information technology. Case in point, when it comes to communication, delivery of services and also manufacturing, information technology takes control in such operations. However, the positive contribution brought forth by the use of technology has invited a myriad, problems with the major one being cyber-attacks (Antonucci, 2017). Most businesses have reiterated that their number one enemy on their network are the sinister individuals who try to intrude their system for altering, exposing or deleting momentous information that has a great value to a company. This means that issues that relate to cyber security will increase as technology advances. The act of business protecting their information communication technolog y systems is referred to as cyber security (Singer and Friedman, 2014). Cyber security can be an arguably ambiguous term that may mean privacy and surveillance. However, it should be understood that cyber security is precise and that it is a significant tool for business people to protect their privacy and deter unauthorized surveillance into their systems. The management of risks of the information system is depended on three important factors that include the threat. The threat is who is attacking the system. This is the individual or group of individuals that have ill motives towards a company. They can be disgruntled former employees or any individual. Another factor is vulnerabilities. The weakest points in the system of a company are one of the entry points for the individuals who are seeking to infiltrate into a system (Graham, Howard and Olson, 2011). The third factor is the impact of the cyber-attack. There is an array of expected impact after an occurrence of a cyber-attack such as loss of information and altering of information (Bayuk, 2012). With the above knowledge, managing cyber security in business organizations comes with many challenges that are not limited to data loss, breach indicators, application control among others. This paper focuses and analyzes the available literatures regarding challenges of cyber security in businesses. Comparative Analysis of the Different Literatures. Reasons why cyber security is a challenge in business With the advent of the problem related to cyber networks in business, most businesses have ensured that they have strengthened their cyber security capabilities in the last five years. According to Rajagopal and Behl, (2016) there have been a lot of processes which are used to implement and prioritize information technology security risks and also the development of mitigation strategies to ensure that such mishaps do not happen. This means that a lot of companies have dedicated a significant amount of finances to ensure that their information is protected. Santanam, Sethumadhavan and Virendra, (2011) affirms that desktops environment have been made wide open different from what they were before the proliferation of cyber-attacks. Alexander (2012) believes that as at now, the computers used in organizations have been disabled from their use of USB ports, and also their webmail services have also been disabled. The way business use technology is the reason why protecting the cyber-att acks is becoming more difficult. At present, a lot of business value has migrated online where digital data has have become more prevalent. For instance, most businesses have ensured that customers can ask for services online also pay through the same media. For this reason, cyber criminals are finding more reason why they should continue with their heinous act. The more the businesses are insisting on the issue to do with online transactions, is another reason that an incentive is created to cyber criminals to tap into systems of businesses. It is an open secret that companies are experiencing more cyber-attacks per hour but unable to speak loudly about the matter as it would scare away their customers (Glasgow, 2003). Another reason why protecting a business from cyber-attacks is the way customers are expecting the business to be more widely accessible. Customers expect that with the advancement in technology, the business is supposed to make their purchases simpler through the use of mobile application services and the use of portables which prevent the customers from traveling large geographical distance so as to get a service. Case in point, customers expect that they ought to use mobile phones with applications related to the business they seek services from since they use mobile phones in their daily personal lives Forsyth and Kalman, (2013). The customers fail to realize that the increasing use of web-based services increases the insecurity regardless of the simplicity of the services that the internet provides. Hackers use and target devices that are unprotected such as tablet and mobile devices which are used to access to a business network hence gaining access. The supply chain in business is interconnected greatly to allow customers and suppliers to have streamlined flow of goods and services. Companies are encouraging vendors and Logistics Companies to join their networks for the purpose of increasing their sales. According to Shoemaker and Sigler, (2015) his engagement of interconnected supply chain is putting organization network and system at risk of cyber-attacks. Cyber criminals can pause as one of the individuals in the supply chain thus giving them an opportunity to investigate and find a vulnerability in a system. Tighter integration of business partners is a good course that can increase a performance of business. However, there must be policies and other security measures in place to ensure that the communication network is protected from cyber criminals Bisogni, Cavallini, and Trocchio, (2011). Some companies have reiterated that on-site contractors of the software that is used in sharing information can have access to confiden tial documents. For this reason, most companies especially the large ones, are against their employees sharing information using web-based services. The cybercriminals have become more sophisticated as more business has discovered ways to protect their systems from attack. As at now, more cybercriminals act as service providers. They approach businesses as people who are capable of protecting their networks. When they are given an opportunity, they have all the access they need from organizations. This makes it hard for an organization to protect themselves from cyber-attacks since they are not aware of what triggered the attack. Consequently, they are not aware of the vulnerability of their network that acted as a conduit of the attack. Human Beings as Cyber Securitys Weakest Link Cyber criminals are more than willing to obtain momentous information from organizations. Case in point, cyber criminals have infiltrated banks by having one of their own within the financial institutions. When cyber criminals have an essentially authorize access to a system they are in a better position to be able to siphon all kinds information they need for their unknown reasons. In many cases, long-term employees also pause risks to an organization system. A lot of times the management of a business usually think that the intrusion of a system is accused by an outside. They fail to realize the same people who work in their organizations may be the risks. This is a clear indication that human beings are the weakest link when it comes to cyber-attacks (Wittkop, 2016). Vendors are other potentials when it comes to the cyber security of a business. This is because vendors are given unlimited access to very important data that concern organizations. For instance, a vendor that is concerned with the establishment of a database will be trusted with enormous data and files of an organization so that they can feed into their database. If such a vendor poses as a cyber-criminal the access to important information of an organization would not be a problem. Also, it will be impossible for an organization to discern whether the information is stolen from the system. Human beings in their way are different regarding having their agendas and influences. Human beings trust other human beings especially when it comes to business. It will be a bad show that a management of a company does not trust the employees that are working for that company. When there is trust, it is easy for individuals in an organization to be motivated and achieve optimal performance. However, the issue of trust has been overrated in business. This is because there is no amount of firewalls and security topologies that can withstand an authorized user. This implies that an authorized ill-motivated user is the most dangerous component to the security of a system Borum, Felker, Kern, Dennesen and Feyes (2015). To mitigate the problem of having employees being the greatest weakness in a cyber-security, measurement is significant. This means that business should formulate ways that track employee behavior both online and the normal individual behaviors which can indicate cyber-crime in progress. For instance, those employees who work after the working hours, those who access customers data, and those who register low-performance rates are the ones to look closely at, such behaviors are not normal for any employee in any organization. Cyber security is not necessarily on the technological aspect but also humans play a large role if not the biggest in the realization of cyber-attacks. Through training employees, everyone will have a clue of cyber threats and can act as a watchdog to an organization. Gaps Identified and Conclusions Many of the literature regarding cyber security in business fail to talk about the issue of cyber kill chain which is used by intruders as their model in heinous operations. The cyber kill chain seven phases that start from Reconnaissance where the intruders check weak system to infiltrate, Weaponization stage is where an entry point to a system is identified, and the third stage is Delivery where the malware is put into the system. Exploitation, Installation, Command Control and the action proceed in the remaining stages. Most authors have failed to explain the type of policies that should be important in ensuring that cyber security is realized. However, the details of cyber security will vary from one department to another in an organization. This means that each head of a department will have a different understanding of cyber security where a leader will pass on to those that one manages (Weiss, 2007). The policies and terms in an organization regarding cyber security should carry a lot regarding information, the members of an organization should be braced with how to detect a cyber-threat and ways to control a cyber-attack to gain access to a system Herath, and Rao, (2009). Businesses should ensure that workshops and training regarding cyber security are conducted on a regular basis. This will ensure that the challenges of cyber security are given an upper hand regarding issues that deal with a business thus become relevant among the employees. It should be noted that each person in an organizati on is a better position to ensure that the network security of a business is tight. This is because they interact closely among themselves and they are in a position to note that one of their own who is behaving in a very peculiar way. Expanding the knowledge of the members of an organization assists in ensuring that there is a unified effort in fighting cyber-attacks. Rittinghouse and Hancock, (2003) believes that when an employees acquire skills that help them in programming and prevention a cyber-attack in progress, then it means that even a cyber-criminal who pauses as an employee in such a company will have a difficult time in executing cyber-attack activities. A well-informed team of employees can ensure that they identify unusual activities in a system and they can inform the information technology department of the malicious activities. The information technology will then be able to protect all the systems in an organization at a very first rate this giving no chance to a cyber-criminal. Businesses should understand that cyber-attacks are inevitable hence resilience is a virtue that they need to uphold. Tremendous technology has proven that business can on a verge of realizing their economic potential. However, the same technology acts as a threat that can be able to bring any business to its knees. Dimase, Collier, Heffner and Linkov (2015) believes that for an organization to achieve resilience the most significant question that they need to ask themselves is the kind information they have to lose and the specific data that are momentous in carrying out their operations. When these questions are understood, businesses will be in a better position to develop a cyber-security posture which will be able to protect the most important data that once they are in unauthorized hands, will be detrimental to a business. It should be noted that cyber-criminals look for critical data in a system of organization in which to gain access to. This will enable them to black mail a business by threatening to realize such information to the public. This means that core data in business should the most protected. In conclusion, as more values have migrated online, business are coerced to have innovative ways in which they can conduct their businesses and also interact with their customers and other partners such as suppliers. For this reason, cyber-security challenges will continue to increase. Also with advancement and the increase in sophistication of information technology, cyber-criminals are finding new ways in which they are able able to infiltrate networks of organizations. This means that organizations should formulate solutions that cut across strategies, operations and technological functions to be in tandem with the changing technology. To manage the challenges that are brought forth by cyber-security, the management of organizations should make cyber-security an important initiative in an organization. Consequently, human beings have been identified as the prolific contributor to the cyber-attacks. Cyber criminals currently pose as employees who work in organizations thus having a uthorized access to critical information of the business. The recruitment of employees should be an extremely serious process. Also, it is imperative that a behavior of an employee should be checked on a regular basis so as to keep track of any unusual activity which might be a threat to the system of a company. As long as the technology keeps advancing cyber-security will still be prone to many challenges. References Alexander, D. 2012, "Cyber Threats in the 21st Century", Security, vol. 49, no. 9, pp. 74. Antonucci, D. (2017).The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities. 1st ed. John Wiley Sons, p.113. Bayuk, J. (2012).Cyber security policy guidebook. 1st ed. Hoboken, N.J.: Wiley, p.29. Bisogni, F., Cavallini, S. di Trocchio, S. 2011, "Cybersecurity at European Level: The Role of Information Availability",Communications Strategies,, no. 81, pp. 107 Borum, R., Felker, J., Kern, S., Dennesen, K. Feyes, T. 2015, "Strategic cyber intelligence",Information and Computer Security,vol. 23, no. 3, pp. 320. Boss, S.R., Kirsch, L.J., Angermeier, I., Shingler, R.A. Boss, R.W. 2009, "If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security",European Journal of Information Systems,vol. 18, no. 2, pp. 152. Dimase, D., Collier, Z.A., Heffner, K. Linkov, I. 2015, "Systems engineering framework for cyber physical security and resilience", Environment Systems Decisions, vol. 35, no. 2, pp. 295. Forsyth, C. Kalman, L. 2013, "A RISING TIDE", Legal Week, vol. 15, no. 14, pp. 14. Glasgow, B. (2003). Information technology insights: CIDX moves with cyber security. Chemical Market Reporter, vol. 263, no. 2, 33. Graham, J., Howard, R. and Olson, R. (2011).Cyber security essentials. 1st ed. Boca Raton, FL: Auerbach Publications, p.51. Herath, T. Rao, H.R. 2009, "Protection motivation and deterrence: a framework for security policy compliance in organisations",European Journal of Information Systems,vol. 18, no. 2, pp. 107. Rajagopal, and Behl, R. (2016).Business analytics and cyber security management in organizations. 1st ed. IGI Global, p.50. Rittinghouse, J. and Hancock, B. (2003).Cybersecurity operations handbook. 1st ed. Amsterdam: Elsevier Digital Press,p.498. Santanam, R., Sethumadhavan, M. and Virendra, M. (2011).Cyber security, cyber crime and cyber forensics. 1st ed. Hershey, PA: Information Science Reference, p.33. Shoemaker, D. and Sigler, K. (2015).Cybersecurity. 1st ed. Stamford, CT: Cengage Learning, p.33. Singer, P. and Friedman, A. (2014).Cybersecurity. 1st ed. New York: Oxford University Press, p.35. Wittkop, J. (2016).Building a Comprehensive IT Security Program. 1st ed. Berkeley, CA: Apress, p.89. Weiss, J. 2007, "Cyber Security in the Control Room", Power Engineering, vol. 111, no. 9, pp. 38-38,40,42,44.