Wednesday, May 20, 2020

Are Profits The Only Business Of Business - 1523 Words

Are profits the only Business of Business? What is the corporation’s social responsibility? Many might say the main idea is that a corporation must go further than carrying out their basic function of purely making profits. A corporation must create wealth in ways that avoid under minding society, and instead enrich the society it operates in. The term â€Å"corporate social responsibility† has been deï ¬ ned in numerous ways; from the constricted economic perception of increasing stockholder wealth (Friedman, 1962), to economic, legal, ethical and flexible strands of accountability (Carroll, 1979) to good corporate social responsibility to citizens (Hemphill, 2004). These disparities differ from fundamental assumptions of what corporate social responsibility involves. However, one has to keep in mind that the CEO of any corporation is legally the agent of the stockholder, and must focus on what the shareholder wants. More often than not, the shareholder would prefer profits for individual gain rather than spe nding their money on social projects. Stakeholder groups have increased their influence to enact their agendas. Using profits to fund schools and partake in fixing the environment are all great and wonderful things, but this social tax of using profits for social ends projects goes entirely against democracy. Or does it? Who should truly be held responsible for stakeholders around the corporation? Is it the responsibility of the government, philanthropists, employees, itsShow MoreRelatedIs Profit the Only Business of Business?3287 Words   |  14 PagesConcluding Arguments Concluding Arguments A discussion of the three models surrounding Corporate Social Responsibility A discussion of the three models surrounding Corporate Social Responsibility Outline Outline is profit the only business of business? is profit the only business of business? The Stakeholder Model, that was developed my R. Edward Freeman, and states that collectivist ends can be attained without collectivist needs. It is important to distinguish a stakeholder from a stockholderRead MoreEssay on Are Profits the Only Business of Business?4153 Words   |  17 PagesMGMT 570 ISSUE PAPER ARE PROFITS THE ONLY BUSINESS OF BUSINESS? CONSUMER NOTIFICATION AND PRODUCT RECALL BY KOLAWOLE OLAYINKA 03/30/2013 ARE PROFITS THE ONLY BUSINESS OF BUSINESS? Supply and demand is at the root of everything, where exchange of goods and services is involved between producers and consumers for mutual benefits. These mutual benefits involve an exchange that provides value to the consumer and profits to the producer. It is not at all farfetched to think of these as basicallyRead MoreDo you agree with Milton Friedman’s (1970) claim that :  « the only responsibility of business is to increase its profits  » ?2913 Words   |  12 Pageswith Milton Friedman’s (1970) claim that  :  «Ã‚  the only responsibility of business is to increase its profits  Ã‚ »Ã‚  ? Milton Friedman was an American economist, statistician and writer, who had a massive impact on the research agenda of the economics profession. His famous words â€Å"the only responsibility of business is to increase its profits† (Friedman, Milton. 1970) led to many controversial debates on whether businesses should have ethics or if profit should be their main  goal. Corporate social responsibilityRead MoreThe Social Responsibility of a Business647 Words   |  3 Pagesï » ¿The Social Responsibility of Business: The role of business in the society became a major aspect across business after Milton Freedman wrote the most provocative article in 1970. As an economist, Freedman stated that the main purpose of businesses is to generate profits for its shareholders. Furthermore, he argued that companies with responsible attitudes were likely to encounter increased binding constraints unlike those that lacked these attitudes, resulting in them becoming less competitiveRead MoreObjectives Of Business Essay1466 Words   |  6 Pagesobjectives of business? Every business enterprise has certain objectives which regulate and generate its activities. Objectives are needed in every area where performance and results directly affect survival and prosperity of a business. Various objectives of business may be classified into four broad catego ­ries as follows: 1. Economic Objectives: Business is basically an economic activity. Therefore, its primary objectives are economic in nature. The main economic objectives of business are as follows:Read MoreA Business s Only Responsibility1013 Words   |  5 PagesWriting (CSR Essay) appendix: A business’s only responsibility is to produce profit. To what extent do you agree with this statement? Businesses should take social responsibility in addition to producing profits. Corporate social responsibility refers to a business practices that involves participating and make benefits to society. CSR is a way of companies benefiting themselves so; business should also take social responsibility instead of only taking profit. This is because taking on social responsibilityRead MoreProfit Is Not The Purpose Of Enterprise1556 Words   |  7 PagesProfit is not the purpose of enterprise Introduction Many people mistakenly think that the purpose of the company is simply to make money. In fact, profit is actually just an important result of the existence of a company. The real reason for company existence has to be further studied. Companies need profits, but more importantly they must have the social responsibility. Companies have a great responsibility to their employees, customers, suppliers and the general welfare of society, as well asRead MoreHow A Successful Business Is Business1482 Words   |  6 PagesA successful business is business that has good entrepreneurial skills which enables them to unite production to the complex matters of demand. It also encourages them to improve on what they produce such as the quality and how they produce the product to meet the demand in the future. For example Apple, not only did they improve on the software they use but also the quality of the phone. However a firm lacking in entrepreneurship skills would risk being forgotten if they f ail to make the right assumptionRead MoreBusiness Accounting1359 Words   |  6 PagesUnit 5 Business Accounting P5 Introduction In this assignment I will be using the profit and loss accounts and balance sheet for SIGNature s business to work out the Profitability, Liquidity and Efficiency Ratios. Profitability Gross profit Percentage sales Gross Profit Sales Turnover Ãâ€"100 244200 444000 Ãâ€"100=53% Net Profit Percentage Net ProfitSales turnoverÃâ€"100 73960444000Ãâ€"100=16.66% Return on Capital Employed (ROCE) Net Profit before interest and taxCapital EmployedÃâ€"100 73960149160Ãâ€"100=49Read MoreBusiness Ethics : Ethics And Business943 Words   |  4 Pagesdiscussions in Business is Ethics. Some people believe that the decisions businesses make in interest of the business has no place in ethics and that they are essentially amoral. These businesses believe that their main objective is to simply make a profit and that it does not affect the success of the business. Whereas some businesses believe that they have to take ethics into consideration, in order for their business to be a success. Richard T. De George (1999) states that ethics and business do not

Wednesday, May 6, 2020

African American reactions to death and loss can be traced...

African American reactions to death and loss can be traced to their African roots, their centuries of slavery, their commitment to Christianity, and their post-slavery treatment in American society. Among those to explore death and dying in twentieth-century African America is author Karla FC Holloway. In her book Passed On: African American Mourning Stories: a Memorial Collection, Holloway thoroughly investigated the myths, rituals, economics, and politics of African American mourning and burial practices, and found that ways of dying are just as much a part of black history as ways of living. Holloway dug into the history of African American death through a series of interviews, archival research, and analyses of literature, film,†¦show more content†¦She also reluctantly shared the story of her son, Bem, and the way his death moved her research to the personal arena. In her conclusion, Holloway sought to commemorate through observation, ceremony, and the calling of others to remembrance and celebration. Some researchers believe that understanding how African groups buried their dead might help us better understand the early years of African American cemeteries in the American South. Africa is large and diverse, however, so such an undertaking is difficult. Increasing the difficulty was the multitude of religious beliefs once the slaves arrived on the plantations—most planters were Christians, while some blacks were Moslems and many others held other religious beliefs. Anthropologist Margaret Washington Creel has examined a range of African emotional bel iefs and religious practices to better understand slave religion. She found there were various beliefs among African Americans that dictated different ways to be buried in the South, but she found it difficult to discover the religious beliefs of African American slaves. White planters often tried to curb, or at least carefully observe, the religious training and activities of their slaves, but very few planter diaries recount the events surrounding slave burials. Death certainly was a way of life for African-American slaves and they had few opportunities to make the trip from slave settlement to cemetery for their friends and family.Show MoreRelated African American Culture through Oral Tradition Essays3405 Words   |  14 PagesAfrican American Culture through Oral Tradition African American folktales have origins rooted in West African literary and cultural forms of expression. When Africans were taken from their homeland and brought to America as slaves, they also brought with them their individual cultures, languages and customs. However, their white slaveholders suppressed this part of their heritage in them. Thus they had to find other ways of expression, mainly story telling and songs. It is incredible to see howRead MoreNotes18856 Words   |  76 Pagesthe African Experience Virtually everything that has gone wrong in Africa since the advent of independence has been blamed on the legacies of colonialism. Is that fair? Virtually all colonial powers had â€Å"colonial missions.† What were these missions and why were they apparently such a disaster? Did any good come out of the African â€Å"colonial experience†? Introduction Colonization of Africa by European countries was a monumental milestone in  ­ the development of Africa. The Africans considerRead MoreRastafarian79520 Words   |  319 PagesJamaican counter- culture that celebrates and sees redemption in Africa and rejects the European values that have oppressed a society. But prior to the advent of popular culture and especially the music recording business in the late twentieth century, its apparatus of cultural formation was controlled fully by the elite who, to a large extent, ran the educational apparatus and the economic system. But much of the country was beginning to question in earnest the structure of colonial societyRead More Jihad - A Holy War Essay6110 Words   |  25 Pages Jihad It was once a word unfamiliar to American ears. But in recent years it has become all too familiar. The actions of Muslim militants and terrorists have seared the word into American consciousness. Yet even with thousands of innocent civilians killed on American soil by Islamic terrorists, the full significance of the Muslim concept of jihad has not been grasped by the American public. In the days after September 11, 2001, American leaders rushed to portray Islam as a peaceful religion thatRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesand Paul Buhle, eds., The New Left Revisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Read MoreThe Impact of Agricultural Sector on Economic Growth in Nigeria18675 Words   |  75 PagesAgricultural Extension, Food Science and Technology, Home Science and Nutrition, Sociology, Economics, Political Science and others. For some years now, I have received tremendous support and cooperation from the staff and Associate Fellows of the African Institute for Applied Economics. Let me state my gratitude for the enabling environment which the Institute has created for my academic and intellectual work. 2.0 CONCEPTUAL APPROACH OF THIS INAUGURAL LECTURE In exploring the conceptual identityRead MoreNew World Order in Conspiracy Theory13987 Words   |  56 Pageshistorical and current events are seen as steps in an on-going plot to achieve world domination through  secret political gatherings  and decision-making processes.[2][3][4][5][6] Prior to the early 1990s, New World Order  conspiracism  was limited to two American countercultures, primarily the  militantly anti-government right, and secondarily  fundamentalist Christians  concerned with  end-time  emergence of the  Antichrist.[7]  Skeptics, such as  Michael Barkun  andChip Berlet, have expressed concern that  right-wing  conspiracyRead MoreFootball Hooliganism11213 Words   |  45 Pagesdemonstrate all kinds of violent behaviors including scuffling, sabotage and intimidation (Another sorry outbreak of the England disease, 2004). This behavior is most often based on the rivalry that exists between different football clubs or teams and can give rise to great conflicts once the matches have ended and sometimes even before that. Sometimes when these conflicts arise during the match at the stadium, the people who practice hooliganism are arrested by the police, meanwhile most of the timesRead MoreInstitution as the Fundamental Cause of Lo ng Tern Growth39832 Words   |  160 Pagesimportance of institutions by focusing on two quasi-natural experiments in history, the division of Korea into two parts with very different economic institutions and the colonization of much of the world by European powers starting in the fifteenth century. We then develop the basic outline of a framework for thinking about why economic institutions differ across countries. Economic institutions determine the incentives of and the constraints on economic actors, and shape economic outcomes. As suchRead MoreInternational Management67196 Words   |  269 Pagesgovernments to get tougher with companies in terms of oversight and accountability. The advent of social networking and other media has transformed the way citizens interact and how businesses market, promote, and distribute their products globally. The same can be said for mass collaboration efforts occurring through digital, online technology for the development of new and innovati ve systems, products, and ideas. Both social networking and mass collaboration bring new power and influence to individuals across

Analysis of Data Cloud Computing Security Problem - Free Samples

Question: Discuss about the Survey on Security Challenges in Cloud Computing. Answer: Introduction: Cloud computing can be defined as the paradigm of information technology, which helps to enable ubiquitous accessing to all types of system resources that are configurable on the Internet (Dinh et al. 2013). Moreover, the services that are of higher level could be easily and frequently provisioned with minimum managerial effort. Cloud computing solely relies on the sharing of various resources for properly achieving the economies of scale and coherence. The third-party clouds enable all the companies for focusing on the core businesses and not spending resources on the computer maintenance and infrastructure (Arora, Parashar and Transforming 2013). Cloud computing helps the organizations to reduce the costs related to IT infrastructure. Cloud computing is completely different from the traditional IT servicing. The main difference is that cloud computing is extremely elastic and resilient, whereas both advantages are absent in traditional IT systems. The second important difference is that cloud is flexible as well as scalable; however, no such feature is present in traditional IT systems. The other differences include cost effectiveness, high security and office automation; all these features are not available in traditional IT systems. The following report outlines a brief discussion regarding the entire concept of cloud computing. This report clearly depicts the description on the various cloud service models. Infrastructure as a Service or IaaS, Platform as a Service or PaaS and Software as a Service or SaaS. The two important issues related to Nectar Cloud and Oracle Cloud is also provided in report. The misconceptions related to cloud computing are discussed here. The final part of the assignment concludes with a description on the several benefits and challenges of cloud computing. Cloud Computing Model Cloud computing mainly comprises of three distinct service-oriented architecture models. They are as follows: Infrastructure as a Service or IaaS mainly refers to any type of online service, which gives the higher-level APIs that are, utilized to deference several lower level details of the infrastructure of underlying network (Garg, Versteeg and Buyya 2013). These details mainly include the location, data security, physical computing resources, data backup, data scaling, data partitioning and many more. Iaas is a virtualized infrastructure that helps all its users for executing any type of operation on that infrastructure. The hypervisors like the Oracle VM, VMware ESX and Oracle VirtualBox run this virtual machine as guest. Infrastructure as a Service can also be defined as the capability given to a client for provisioning processing, networks, storage and all other significant computing resources (Rittinghouse and Ransome 2016). Here the client could easily deploy as well as run any arbitrary software that could involve all applications and operating systems. The providers of the IaaS cloud properly supply all the resources on the demand from the larger equipment pools that are installed in the data centres. In the wide area connectivity, the clients of cloud computing can either utilize the Internet connection or the carrier clouds that are the dedicated VPNS or virtual private networks. For the successful deployment of these applications, the clients of cloud install images of operating system and the application software over the infrastructure of cloud. Within the cloud service model of infrastructure as a service, the client of cloud patches as well as maintains the application software and the operating systems (Hashizume et al. 2013). The main advantages of the infrastructure as a service or IaaS include flexibility, scalability, high security and easy maintenance. The only important disadvantage of this particular model is that it is extremely expensive and thus all organizations or enterprises could not afford this virtualized infrastructure. The best examples of infrastructure as a service or IaaS are the Amazon Web Services or AWS, Microsoft Azure, Rackspace, Google Compute Engine or GCE and Digital Ocean. Platform as a Service or PaaS: The second type of cloud service model is the Platform as a Service or PaaS. It is the specific platform-based service that gives a platform to its users for the purpose of developing, running and managing various applications without any type of complexity of maintaining infrastructure that is associated with the development and launching of an application. The cloud service model could be delivered in three distinct methods. The first method is as the service of public cloud from any provider, where the client could control the software deployment with less configuration options (Yang and Jia 2013). The cloud provider gives various servers, networks, operating system, storage, database, middleware or any other service for hosting the application of a client. The second method is as the service of private cloud within the firewall. This private service can either be an application or software. The third or the final method is as the hybrid Cloud that is to be deployed on any public IaaS or private Iaas as a service. The main objective of this platform as a service is that it provides the typical environment for its users and developers for creating, hosting and deploying applications (Herbst, Kounev and Reussner 2013). This eventually saves the developers or the users from extra infrastructure costs and complexities. The most significant advantages of this model of platform as a service or PaaS mainly include cost effectiveness, flexibility, scalability, easy accessibility and easy implementation. The only important disadvantage of this model is that it does not provide any type of security. Due to this lack of security, many organizations could not think of implementing this model (Wei et al. 2014). The best examples of this cloud model of platform as a service or PaaS are AWS Elastic Beanstalk, Windows Azure, Force.com, Heroku, Google App Engine and Apache Stratos. Software as a Service or SaaS: Software as a Service or SaaS is the software licensing model or software delivery model where the software is usually licensed on the basis of subscription and is also centrally hosted (Rong, Nguyen and Jaatun 2013). The other name of the software as a service is on demand software and was also referred by Microsoft as software plus services. This cloud service model is usually accessed by the clients by utilizing a web browser or a thin client. It has become the most common model of delivery for all the business applications like messaging software, office software, DBMS software, CAD software, payroll processing software, management information system or MIS, customer relationship management or CRM, development software, accounting collaboration, enterprise resource planning or ERP, CAD software, talent acquisition, human resource management or HRM, virtualization and many more. The main advantage of SaaS is that it is cost effective and thus could be afforded by all organizations. The utilization of this service model is extremely broad. While all the initial ASP are focused on the management and hosting of third party independent software vendor, the SaaS vendors development as well as the management of the software. The traditional client server applications majorly require the software installation on the personal computers of the client which are not required here. The most significant advantages or benefits of this software as a service or SaaS are cost effectiveness, elasticity, flexibility, scalability and easy implementation. The only issue with this service model is that security is absent. Thus, data is insecure in SaaS (Almorsy, Grundy and Mller 2016). The examples of software as a service or SaaS are the Google Apps, Cisco WebEx, Salesforce, Concur, Workday and Citrix GoToMeeting. Cloud Services by Oracle Cloud: Oracle Cloud is the typical cloud computing service that is being offered by the Oracle Corporation by providing storage, networks, servers, services and applications via a series of global networked data centres that are managed by Oracle Corporation (Cloud.oracle.com. 2018). This organization enables all of these services that are to be provisioned on the Internet. Four types of services are provided by the organization of Oracle Cloud. They are the Infrastructure as a Service or IaaS, Platform as a Service or PaaS, Software as a Service or SaaS and Data as a Service or DaaS. These four types of cloud services are utilized for building, deploying, integrating as well as extending various applications on the cloud. The platform is supposed to support several open standards like SQL, REST and HTML5, open source solutions like Hadoop and Kafka and a vast series of databases, frameworks, tools and programming languages. Amongst the four cloud services provided by Oracle Cloud Viz. Infrastructure as a Service or IaaS, Platform as a Service or PaaS, Software as a Service or SaaS and Data as a Service or DaaS, the Platform as a Service (Paas) could be directly utilized for the purpose of deployment of Java EE applications (Cloud.oracle.com. 2018). It is solely done by the PaaS Extension Control by utilizing the Java Cloud Services. The other three cloud services model, i.e. IaaS, SaaS and DaaS cannot be utilized for the purpose of deploying Java EE applications. Nectar Cloud provides scalable as well as flexible power of computing to all of its users, who have computing infrastructure, services and software or storing, accessing and even running data autonomously and rapidly (Nectar Cloud. 2018). The self-service structure of the Nectar Cloud solely helps to allow effective, efficient and fast data access and a strong platform to collaborate with others. Three types of cloud services are provided by Nectar Cloud. They are the Infrastructure as a Service or IaaS, Platform as a Service or PaaS, and Software as a Service or SaaS. For the successful deployment of Java EE applications, the module should be developed and assembled (Nectar Cloud. 2018). Next, the target server or the cluster is needed to be configured. Before deploying anything, it should be ensured that the target vision is significantly compatible with the module selected for Java EE applications deployment. Misconceptions on Cloud Computing: Cloud computing is extremely useful and significant method of transferring any information or data through the Internet. It is being utilized by several popular multinational companies worldwide. However, still few organizations; do not want to take up cloud for their business as they have several misconceptions about cloud. This is the most important and popular misconception about cloud computing. People think that cloud is riskier. There is a conception that cloud means that all the files or data are floating around the world without security. This is absolutely wrong as cloud is the representation of Internet that has the access to the programs and data (Avram 2014). An amazing backup plan is also present within the cloud; so that if any problem occurs, the data could be easily retrieved. When the information is stored virtually, the connection between the office networks and devices are broken. Thus, cloud is responsible for saving from physical emergencies or physical disasters. Thus, cloud is not at all riskier and rather it helps to store and secure the data properly. This is the second misconception regarding cloud computing. Although switching to cloud, sometimes increases the migration costs or installation costs, it saves money in the longer run. Cloud computing is utilized for the reduction of IT infrastructure management costs (Khan et al. 2013). The most significant advantage of cloud computing is that it takes up annual expenses and within that anything related to the services are incorporated. Therefore, no extra cost is incurred. Thus, it is myth and cloud computing does not incur huge costs. Another important misconception about cloud computing is the not increment in security. It is considered that cloud cannot provide extra security to any building or place (Hashizume et al. 2013). However, with the extra layers of encryption and behaviour based key management servers, an additional layer of protection is supplied by the cloud. Thus making the object more secured. The fourth significant misconception about cloud computing is that cloud is extremely unreliable and thus could not be trusted at all. This is absolutely wrong as cloud is extremely reliable and secured and can be easily utilized by all organizations (Rittinghouse and Ransome 2016). The data could be easily backed up to various locations or services, thus, giving an extra layer of protection. The fifth popular misconception regarding cloud computing is that it is considered that cloud is only a trend. All the organizations, which rely on various web applications like Amazon, Gmail and Dropbox solely utilizes and relies on the cloud computing (Dinh et al. 2013). Cloud migration has become extremely popular for all organizations and thus this is not just a trend. It is extremely flexible and could be easily customized in every business. Conclusion Therefore, from the above discussion it can be concluded that cloud computing is the safest mode of transferring any type of data or information through the Internet without any type of complexities. It helps to deliver the hosted services on the Internet. It enables the organizations in consuming the computing resources like a virtual machine or VM, storing or even applying and not to build or maintain the computing infrastructures. Cloud computing comprise of various significant benefits for its users. The most significant advantage of cloud computing is that it helps in self service provisioning. The second important benefit is the high elasticity. The organizations could scale up as the computing requirements increase as well as decrease when the demands go gown. Thus, the need for the huge investments in the infrastructure is eliminated. The third important advantage of cloud computing is that it could be easily migrated and thus is easily utilized by most of the organizations. Moreover, it is workload resilience and therefore the workload of the users are always kept running. However, in spite of having significant advantages, there are few disadvantages that make cloud computing extremely difficult to be implemented by everyone. The first and the most important disadvantage of cloud is the downtime. There is no immunity to the service outages. It is completely dependent on the Internet connection. The second disadvantage of the cloud computing is the lack of security and privacy. There is always a high chance the data would be lost with this particular technology. The other disadvantages of cloud computing mainly include it is extremely vulnerable to attacks and comprise of limited control and limited flexibilities. The above report has clearly demonstrated the clear idea about cloud definition and various cloud service models. The problems with the Oracle Cloud and Nectar cloud are also given here. Moreover, the several misconceptions are also cleared in this particular report. References: Almorsy, M., Grundy, J. and Mller, I., 2016. An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), pp.1922-1926. Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, pp.529-534. Cloud.oracle.com. 2018.Enterprise Cloud Computing SaaS, PaaS, IaaS | Oracle Cloud. [online] Available at: https://cloud.oracle.com/home [Accessed 4 Apr. 2018]. Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), pp.1587-1611. Garg, S.K., Versteeg, S. and Buyya, R., 2013. A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), pp.1012-1023. Hashizume, K., Rosado, D.G., Fernndez-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing.Journal of internet services and applications,4(1), p.5. Herbst, N.R., Kounev, S. and Reussner, R.H., 2013, June. Elasticity in Cloud Computing: What It Is, and What It Is Not. InICAC(Vol. 13, pp. 23-27). Khan, A.N., Kiah, M.M., Khan, S.U. and Madani, S.A., 2013. Towards secure mobile cloud computing: A survey.Future Generation Computer Systems,29(5), pp.1278-1299. Nectar Cloud. 2018.Home - Nectar Cloud. [online] Available at: https://cloud.nectar.org.au/ [Accessed 4 Apr. 2018]. Rittinghouse, J.W. and Ransome, J.F., 2016.Cloud computing: implementation, management, and security. CRC press. Rong, C., Nguyen, S.T. and Jaatun, M.G., 2013. Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), pp.47-54. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing.Information Sciences,258, pp.371-386. Yang, K. and Jia, X., 2013. An efficient and secure dynamic auditing protocol for data storage in cloud computing.IEEE transactions on parallel and distributed systems,24(9), pp.1717-1726.