Wednesday, August 26, 2020

Antigone Aristotle

Samaritan Albert Mr.. Jordan Antigen Fear/Pity Fear and Pity Shown In Antigen The Greek Philosopher Aristotle characterized disaster as a type of dramatization that brings out dread and pity in the crowd. The unfortunate play Antigen clashes that definition on the grounds that despite the fact that pity Is evoked all through the play, present day crowds experience issues encountering dread since they neglect to recognize the job destiny plays In their regular day to day existences. Toward the finish of the play pity can be felt towards Croon on the grounds that his better half and child passed on and It was his fault.When Croon discovers they kicked the bucket he shouts, â€Å"Oh feel sorry for! All obvious, and beyond what I can hold up under. Gracious my significant other, my son† (109-111). Both Creek and present day crowds can identify with the torment, feeling of misfortune, even blame felt when a friend or family member bites the dust. Pity could be evoked in either crow d through this connection. In spite of the fact that pity can be felt for Croon by either crowd, present day crowds make some hard memories encountering dread while understanding Antigen. When Croon understands his defeat had come, he says, â€Å"Whatever my hands have contacted has come to nothing.Fate has carried all my pride to an idea of dust† (137-138) The notice of destiny causing the destruction of a sad man would have caused dread in Greek crowds since they understood the job destiny played in their lives and that everybody is bound to a specific destiny that is wild. Present day crowds frequently feel just as they can control their own destiny, which is the reason they regularly experience difficulty understanding the dread any catastrophe should inspire in them. Pity can be felt for Antigen when Screen's men discovered Policies body and took Antigen to Croon.When the guard returns Antigen to Croon he says, â€Å"Just along these lines, when this young lady found th e uncovered body, and all her adoration's work squandered. She sobbed, and cried on paradise to damn the hands that had done this thing. And afterward she brought more residue and sprinkled wine multiple times for her sibling's ghost† (38-42). This can totally make any crowd have sympathy for Antigen since she put her family over the state, realizing she could get in a difficult situation, and in light of the fact that she gets In inconvenience, feel sorry for Is inspired in either audience.Pity could likewise be felt for her since she burled her sibling and it was destroyed. In spite of the way that pity can positively be felt for Antigen by both current and Greek crowds the same, dread for her can't really be felt by present day crowds. Close to the furthest limit of the play Antigen says, â€Å"You would feel that we had just languished enough over the revile on Oedipus: I can't Imagine any distress that you and I have not gone through†(2-5) This would summon dread I n a Greek crowd since they accepted more In condemnations and destiny than a cutting edge crowd would.Greek crowds would feel dread for Antigen since they accept that the scourge of Oedipus would prompt her downfall. Present day crowds accept less n reviles and destiny than a Greek crowd would so they would not feel a similar dread a Greek crowd would feel while understanding Antigen. Hansom's circumstance could inspire feel sorry for all through present day and Greek crowds since he battled to spare his arms about her midriff, mourning her, his adoration lost underground, shouting out that his dad had taken her away from him† (6(:)- 63) Either crowd could identify with the emotions Hammond is experiencing.Even in the event that they can't relate precisely, they despite everything feel distress for him since he is clearly disturbed. While Hammond inspires a lot of pity all through the play, he doesn't bring out dread into the crowd. Dread may be evoked into a Greek crowd when Croon says to Hammond, â€Å"Let her discover her better half in damnation. Of the considerable number of individuals in this city, just she has disdain for my law and broken into it. Do you need me to show myself powerless before the people?Or break my sworn word? No, and I won't. The ladies dies† (23-28) This may have evoked dread in Greek crowds in light of the fact that Croon is blowing up and will not allow Antigen to live. This would concern a Greek crowd more than present day crowds in light of the fact that the scourge of Oedipus would make Antigen kick the bucket at any rate, and Greek crowds would recognize that her passing would be the destiny fated in view of the curse.Modern crowds would not recognize that her destiny would be the reason for her demise because of the revile and that Screen's choice fixed her destiny, so they wouldn't feel dread. In outline, Aristotle definition would be right for the Greek crowds of his time, yet not for present day crowds. While Antigen summons feel sorry for in either crowd, it doesn't inspire dread into present day crowds on account of their absence of recognizing the job destiny plays in their lives.

Saturday, August 22, 2020

Tok Reflection the Mouse Who Ate the Cheese Essay Example

Tok Reflection: the Mouse Who Ate the Cheese Paper Tok Reflection: the Mouse Who Ate the Cheese BY IBstudent1996 TOK Reflection: The Mouse who Ate the Cheese The short story The Mouse who Ate the cheddar, by Stuart fowler (1993) builds up the goals that are focused on the idea of conviction and information, and how they these two ideas are frequently hard to separate. It is precise to express that Bill realized that he saw the mouse eat the cheddar, since he physical saw the mouse ingesting the cheddar and there wasnt the chance of lack of clarity of Judgment, since he was calm and no psychological issue was referenced during the closeness of the tory. We will compose a custom exposition test on Tok Reflection: the Mouse Who Ate the Cheese explicitly for you for just $16.38 $13.9/page Request now We will compose a custom article test on Tok Reflection: the Mouse Who Ate the Cheese explicitly for you FOR ONLY $16.38 $13.9/page Recruit Writer We will compose a custom article test on Tok Reflection: the Mouse Who Ate the Cheese explicitly for you FOR ONLY $16.38 $13.9/page Recruit Writer In spite of the fact that on account of Alice it isnt erroneous to express that she realized the mouse ate the cheddar, its not out of the question to state that she accepted so. The essential thinking fixated on this idea is that Alice didnt genuinely observe or hear the mouse take-up the cheddar; she just made a suspicion in regards to the mouse eating the cheddar. Without checked verification , it isn't exact to express that Alice state the mouse eat the cheddar, since she just accept this perfect dependent on applied rationale and conviction. The other two people present inside the story Virginia and Adrian who additionally guaranteed to since they realized the mouse ate the cheddar just of off the reason that a power source (Bill) had let them know. Along these lines it isn't suitable or sufficient for them to express that they realized they saw the mouse, just which they accept. In spite of the way that they educated through an individual they characterize as dependable and solid, they despite everything face the locale of uncertainty; since they couldn't observer the mouse eating the cheddar through them going about as the essential source. The main person who denied accepting or realizing that the mouse ate the cheddar was George the property holder of the house where the gathering was held. His thinking behind his position was Justified by that of feeling and his confidence in the exterminator. However, he neglected to think about how conceivable it is that the exterminator could have been have wrong or that Just as of late these nuisances had started to attack his home. The main way George would know and be persuaded that a mouse was available inside his house was on the off chance that he had seen it with his own eyes, disposing of the chance of uncertainty. The main conceivable condition that everybody at the gathering would have realized that the mouse had ate the cheddar, was on the off chance that they were to all observed it with their own eyes, in a calm state, Personally, I accept that here is a perceptible distinction between an individual knowing something and think something. All together for an individual to realize I accept that they should observer it direct, without the chance of whatever could perplex their psychological state. In spite of the fact that there are circumstances where this vital cant consistently be accomplished, I accept that there must be more than one source expressing something very similar. To just conviction something has consistently been a troublesome idea for me to identify with, since to accept people must go up against the likelihood that their conviction has the likelihood to not be right. Alongside this, multiple occasions the idea that will be accepted doesnt hold the total truth because of the chance of discernment and inclinations. Regularly I believe that people misjudge the goals of conviction with information, characterizing their own conviction as truthful, without considering the possibility that their erroneous and false. nougn, tnls likewise presents tne Tact on wnetner or not a people Deller valid or not can De characterized as information. At long last, the goals that are focused on conviction and information are frequently hard to separate, it is regularly vigorously relating on an individual own observation and point of view on the addressed theme.

Friday, August 21, 2020

Psetting in Connecticut

Psetting in Connecticut A brief intro Last Wednesday, I left MIT to compete at the 2016 Eastern Sectional Figure Skating Championships in Simsbury, Connecticut, the final qualifying segment for the 2016 U.S. National Championships in mid-January. Wednesday I’m done with my last class at 3pm, and return back to my dorm to take a nap. 1.5 hours later, I wake up and start frantically packing. I call an Uber to get to the bus station, and get stuck in traffic. Rush hour in Boston is awful. I should have just taken the T. I might even miss the bus at this point. It takes 35 minutes to get to South Station, a 3.5 mile drive from campus. I sprint to get on the bus 3 minutes before the departure time, 6pm. I make it on. It’s a smooth and comfortable ride to Hartford. I start looking through the 18.02 pset that is due at 12:45pm the following day, and realize I left my pencil case in my suitcase. Oops. I end up just looking through my notes and thinking through potential ways to solve the problems. I take a nap, and I’m in Hartford in 2 hours. I call an Uber to get to my hotel in Simsbury, a 20 minute drive. I arrive at the hotel, and am initially told I can’t check in since I’m under 21. Welp. Everyone else I know is staying at the official hotel a 20 minute drive away. So I talk to the manager and am allowed to check in as long as I promise not to go to the restaurant and bar downstairs. Sounds like a plan. My room is beautiful! But then I realize I haven’t had dinner and need carbs to power through the night. My only option left is to call room service. So I order chicken alfredo, and watch some cooking contest on TV while I eat. Now it’s time to pset. It’s 10pm, and I have 75% of the pset left to do. I chug along and get through most of the problems. The last few take a few more hours to get done. I keep chugging along until I get some form of an answer, and call it a day. I definitely should have started this earlier. 3:30am. I can’t think anymore. Time for bed. Thursday 9:45am. My alarm wakes me up, and I snooze until I realize that breakfast ends at 10am. So I quickly get dressed, brush my teeth, and run downstairs. It’s just like a normal school day. I make it to the restaurant, grab some food from what’s left of the breakfast bar, and gobble up. At 11:30 I have a Skype call with a casting agency for an ad campaign I might take part in. I take a nap, and wake up in time and take an Uber to the rink for my 20-minute on-ice warmup at 3pm. After that, I my coach drives me to a nearby cafe and I pick up a sandwich, eat, and rest before the first segment of the competition, the Short Program. From my friends back home, I find out that I made it onto the icenetwork.com homepage with a highly unattractive picture of the opening of my Short Program 6pm. It’s showtime. I’m first to skate. “Representing the Skating Club of Boston in Boston, Massachusetts, here is Kevin Shum…” I step onto the ice, and take my position in the center of the ice. My music begins, and I skate towards my first jump. I go up into the air, and suddenly open up. I miss the opening jump, and will get no points for it. Uh oh. My mind goes into panic mode, but I force myself to focusâ€"focus, focus, focus. I manage to skate cleanly after that, and end up in second place. Hanging out with other skaters after my event. But after the event, the scores change, something that rarely ever happens, and move up to first. I have no reception at the ice rink, and there’s no wifi either. I can’t call an Uber. I can’t get back to my hotel. A skating mom offers to drive me back to my hotel, and then I’m introduced to Curran O. 13, now a grad student at Yale. He’s competing at the Senior level, and hoping to qualify for Nationals as well. As it turns out, he’s staying near my hotel, and offers to drive me back after his practice. Yay! We grab dinner at one of the few restaurants in the area, and I’m back to the hotel. I have a 8.01 prepset/skills challenge due at 8:30am the next morning, so it’s time to get to work. I’ve missed the day’s lecture and relevant material that’s covered in the prepset, so I ask my friend for notes. After that’s done, it’s 2am. Time for bed. Friday I wake up, and it’s 11:30. I’ve missed breakfast completely, and do some warming up in the hotel gym before the restaurant opens for lunch. I order some steak tips, and Curran picks me up from the hotel, and we head to the rink. It’s again time for my 20-minute on-ice warmup. Afterwards, I take a nap in the rink’s cafe, and it’s time to compete. For the most part, I skate well, but I make two mistakes near the end of my program. I end up second in the Free Skating portion of the event, but first overallâ€"and qualify for Nationals! I’m glad it’s over. With skating, psets, classes, and extracurriculars, I’ve had stressful, pressure-cooked week. I’m ready to head back to home. I acquire the password for a secret wifi network through a mutual friend, call an Uber, and am on my way to the bus station. The only food place that’s open is Subway, and I get a 6-inch sketchy meatball marinara. Food is food. I get on the bus, and it’s full. I manage to find an empty row near the back of the bus. Halfway through the ride, four people around me start bickering at each other, and it escalates quickly. They start shouting and threatening to fight. One of the four calls the police, and another bystander intervenes. The cops pull over the bus, and we all sit on the bus waiting for them to figure it out. The cops, in the end, arrest 2 of the 4, and we’re back on our way to Boston. We make it, an hour plus after the schedule arrival time. I take a final Uber back to Burton Conner, and I’m back home. Time for bed. :)

Sunday, May 24, 2020

An Essay on the Illiad - 868 Words

The American University in Cairo Department of English and Comparative Literature 506 Greek Classics- Dr. Doris Shoukri Essay Exam- Part II of Midterm The poet is a ‘student of his culture’ and thus both The Iliad and The Odyssey are directed sources of their own period. Select any one episode or scene from either of the poems as one that you feel is most memorable. What does it tell about Homeric culture? A writer is a reflection of his age. A work of art is considered a mirror of the customs, culture, and concepts of the age to which it belongs. Homer’s writings are a true representation of this. His Iliad and Odyssey both reflect the old Greek culture, yet in Homeric touch. The meantime the Greek gods and goddesses are†¦show more content†¦The first physical presentation of Hector as a warrior is in Book VI. In this book, Homer writes one of his master scenes: that of Hector’s speech to his wife and son. This scene is considered to be a master scene due to many reasons. The reader is first introduced to Hector as a human, not as a warrior. Although Homer’s description at the opening of this scene suggests he is to continue with Hector the warrior, he shifts the focus to a very sincere husband/ wife speech. The scene opens with Homer’s description of Hector as ‘Great Hector of the flashing helmet’. The reader is able to see the reflection of the Sun on Hector’s helmet; a scene full of glory. Then, Homer zooms to describe the husband/wife relationship between Hector and his wife. This conversation started with this fatherly look of Hector to his son: Hector looked at his son and smiled, but said nothing. Andromache, bursting into tears, went up to him, put her hand in his and said: ‘Hector, you are possessed! This determination of yours will be the death of you. You have no pity on you little boy or luckless wife†¦ so Hector, you are father and mother and brother to me, as well as my strong husband†¦ Andromache was trying to stop Hector from going to the war and fight because this means he is to die, she is to be a widow, her son an orphan, and might be taken by the enemies. Hector’s response to his wife perfectly reflects the culture of the age. Hector does care about his wife and son, yet he has aShow MoreRelated Achilles in The Illiad is not a Hero Essay1009 Words   |  5 PagesAchilles in The Illiad is not a Hero   Ã‚  Ã‚  Ã‚  Ã‚  In the introduction of the Essential Illiad given by Sheila Murnaghan, Achilles is labeled as â€Å"the greatest of the Greek heroes†. In classic mythology a hero is a person of great strength and courage celebrated for bold exploits and is often the offspring of a mortal and a god. Achilles was the greatest fighter among the Greeks or Trojans and feared no man in battle. He was also the offspring of a mortal and a god so by classic mythology definitionRead MoreThe Greeks and The Illiad Essay examples1378 Words   |  6 PagesThe Greeks and The Illiad The Iliad was a masterpiece of a work, which entertained and gave a description of how the Greeks lived out their lives in battle and at peace. The Iliad, by Homer, is an epic classic set in Ancient Greece. The story ,in its own, contained the use of epic characteristics, which reveal further characteristics of the Greeks. A large influence on the book, was the Greeks religious and mythological stance along with their strengths and weaknesses that were alsoRead MoreRole of Wrath in the Illiad Essay1787 Words   |  8 PagesNiraj Khatiwada Seminar Paper Mr. Davis amp; Ms. Davis October 29, 2012 What Role Does Wrath Play In The Iliad? The very first line in the Iliad states the main theme of the whole story, as Homer asks the Muse to sing of the wrath of Achilles. This wrath, all its occurrences, transformations, influences, and consequences, unfold the devastating events in the Iliad. Initially the book starts showing people in a normal state of life, but the main story of Homer’s Iliad, however, startsRead MoreThe Character of Achilles in Homers Illiad Essay1511 Words   |  7 PagesFor centuries now, the character of Achilleus, the great Achaean warrior, has been a subject of major debate among those studying Homers classic epic The Iliad. Ironically, though there is very little physical description of Achilleus in The Iliad, he is perhaps the most thoroughly developed character in the epic. It seems as though Achilleus has a tendency to make a very strong impression on the reader, and often a bad one at that. Those who dislike Achilleus in particular attack his overpoweringRead MoreThe Heroic Code1182 Words   |  5 Pagesmade. Warriors also cannot just think of themselves, for their decisions often affect the lives of others as well. They need the heroic code to guide them in their decision making. In this essay, I will describe the heroic code and s hare its applications in the stories of Beowulf, Gilgamesh and Noah, and The Illiad, as well as my other personal experiences. I will start with the story of The Man of La Mancha, which is a play based on the story of Don Quixote. In this story, you have a rather derangedRead MoreComparing The Iliad And The Odyssey905 Words   |  4 PagesThis short essay will identify five traditional epic characteristics that are evident in both the Iliad and the Odyssey. The first epic characteristic evident in both epics is catalogs and genealogies. For instance, Book VIII of the Odyssey features a list of participants in the game (115-125) and the Iliad Book II features a catalog of ships (484-759). Secondly, both epics start in media res. The Odyssey starts ten years after the Trojan War and the Illiad starts nine years after the start of theRead MoreThe Bronze And Iron Age Essay2093 Words   |  9 PagesClassics Essay Question: 1-What Can Homer tell us about the Bronze and Iron Age The Bronze and Iron Ages were 2 of the main periods in Greek History and Homer can tell us a lot about them. The Bronze Age was all about mixing copper with tin or arsenic to bronze hence it is called the Bronze Age. The Iron Age was when the whole of the east Mediterranean was in crisis. In central Anatolia, the collapse of the Hitties opened the gates to invaders who overran the country. Firstly, let’s talk about Homer-Read MoreI Just Wan Na Be Average Essay834 Words   |  4 Pageschallenge young Rose’s mind, Jack MacFarland. Jack MacFarland would have his students do work often to keep them from just floating â€Å"But within no time, he had us so startled with work†¦We wrote three or four essays a month. We read a book every two or three weeks, starting with the Illiad and ending up with Hemingway. He gave us a quiz on the reading every other day. He brought prep school curriculum to Mercy High.† (Rose 5). MacFarland made sure that he explained everything to his students byRead More The Roles of Greek and Roman Women Essay1665 Words   |  7 Pageswomen were assigned the role of a homemaker, where they were anticipated to be good wives and mothers, but not much of anything else. The roles of women are thoroughly discussed in readings such as The Aeneid, Iliad, Sappho poetry, and Semonides essay. Most women in ancient Rome were viewed as possessions of the men who they lived with. Basically they were handed from their father to their new husband at the time of their marriage and submitted any property they owned, or dowry they were givenRead MoreSpeech Is The Effective Form Of A Culture972 Words   |  4 Pageslook outside the window and write a poem about what you see in class? Poetry helps you step outside the box be more creative it allows you the chance to speak and so does spoken word which is another form of poetry that I will discuss later in the essay. Poetry was very relevant during times like ancient Greece .If you mention the names Homer, Shakespeare and Sophocles then you will notice people are mostly familiar with those poets. Although the work they created was long ago they would still remember

Wednesday, May 13, 2020

The Ukraine Crisis; Changes of Elusive Grundnorm or Fundamental Rule of Recognition - Free Essay Example

Sample details Pages: 11 Words: 3224 Downloads: 8 Date added: 2017/06/26 Category Law Essay Type Analytical essay Did you like this example? Ukraine Crisis à ¢Ã¢â€š ¬Ã¢â‚¬Å" Change of Elusive Grundnorm or Fundamental Rule of Recognition Recent times is Ukraine has seen a kind of revolution, which was not seen in any part of the world since the post-World War era. In August 1991, Ukraine declared itself to be an independent state leaving USSR. 90% votes were for independence according to a referendum in December same year. Don’t waste time! Our writers will create an original "The Ukraine Crisis; Changes of Elusive Grundnorm or Fundamental Rule of Recognition" essay for you Create order In November 2004, Orange Revolution started after reports of far reaching vote-fixing in presidential race ostensibly won by pro- Russian candidate for president, Viktor Yanukovych. Opposition candidate Viktor Yushchenko leaded mass street dissents and civil disobedience. . But the Supreme Court annulled the results of the poll. Viktor Yushchenko won the re-elections. In February 2010, again Viktor Yanukovych was declared the winner in presidential election, judged free and fair by observers. His main opposition, Prime Minister Yulia Tymoshenko, was arrested for abuse of powers. She was jailed in October 2011. In 2013, Viktor Yanukovychà ¢Ã¢â€š ¬Ã¢â€ž ¢s government refused to sign an agreement for close trade ties with the European Unions. Rather gained co-operation with Russia. Later in 2013, protests take a faster form. More than 100,000 people gathered at Kiev to protest. This was the largest protest after the Orange revolution in the history of Ukraine. These protests, then took a violent turn. In early December 2013, the protestors occupied the Independence square and the Kiev City hall. More than 800,000 people gathered for the demonstration. Russian President, Vladmir Putin made an offer to President Yanukovych. Russia agreed to buy 15$ billion of the Ukrainian debt and reduce the price of gas supplies to Ukraine by one third. By the end of January, Prime Minister Mykola Azarov resigned from his post. Later parliament also annulled the anti- protest law. The parliament then passed the amnesty bill assuring to drop charges against all those people arrested in the protest if protesters agreed to leave the government buildings .But opposition rejected these conditions. The protestors but left the Kiev city hall and also the other government building they acquired in the region and the arrested protestors were released as promised. But the protest still continued to erupt. Kiev on 20th February witnessed the worst day in its history where about 100 people w ere killed and uniformed snipers were spotted shooting at the protestors. After signing a compromise deal with the opposition on 21st February, President Yanukovych disappeared. The protestors took control of the administration buildings of the Presidentà ¢Ã¢â€š ¬Ã¢â€ž ¢s office. Parliament voted to remove the president from the power in the upcoming elections. Yulia Tymoshenko was also freed from the jail soon after the president fled. But the President did appear on the television to denounce coup. Parliament elected speaker Olexander Turchynov as the acting president. Also an arrest warrant was issued for Mr Yanukovych. The interim president warned nation of the dangers of separatism which were clearly eminent in the situation. Members of the expected new government appeared before protestors, and Arseniy Yatsenyuk was named the prime minister. Pro-Russian gunmen started their attempts to take over Crimea. Unidentified uniformed gunmen appeared outside Crimean airport. These gun men were speculated to be the Russian troops. Vladamir Putinà ¢Ã¢â€š ¬Ã¢â€ž ¢s request to the parliament to use force in Ukraine with the purpose of the protecting the Russian interest was approved. Ukraine declared that Russia has officially declared war on them. In March 2014, Crimeaà ¢Ã¢â€š ¬Ã¢â€ž ¢s parliament vote to join Russia. Meanwhile Russia had denied that the troops in Crimea are Russian but are self-defence forces. United States and United Kingdom warn Russia of new measures against them, if they donà ¢Ã¢â€š ¬Ã¢â€ž ¢t withdraw their troops from Ukraine. Ukraine also requested US and UK to take all measures to prevent the Russian aggression in Ukraine. With an order from Ukraines acting President Olexander Turchynov Ukrainian troops left Crimea. But Russiaà ¢Ã¢â€š ¬Ã¢â€ž ¢s aggression still continued with troops on Ukrainian border. If considering the jurisprudential aspect of the Ukranian crisis, there occurred a revolution, an old government was overthrown and t he territories were invaded. Hans Kelsenà ¢Ã¢â€š ¬Ã¢â€ž ¢s principle of effectiveness is visibly applicable to the Ukraine crisis. According to Kelsenà ¢Ã¢â€š ¬Ã¢â€ž ¢s principle of effectiveness, an old legal order is invalid and people donà ¢Ã¢â€š ¬Ã¢â€ž ¢t follow it. This is because the old constitution and subsequently the legal order become devoid of validity and thus loose its efficacy. The protestors in Ukraine overthrew the pro-Russia government when the pro-Russian president of Ukraine Viktor Yanukovych flee away to Russia. A new interim government was formed and the re-elections aimed at overthrowing the current President. The European Union and the United States of America, recognized this new interim government and considered it legitimate. According to the principle of International law, an actual established authority is the legitimate government. The order even if coercive given by this government is a legal order. The new government thus formed in Ukraine is valid and the legal order has an efficacy. But Russia is not willing to recognize this government and considers the impeachment of President Yanukovych as illegal. Kelsen states that, a norm is valid not only because the legal order is efficacious but the norms are made in the constitutional way. Here the question, whether the government in Ukraine is constitutional or not? Russia claims that this new government is nothing but a coup, and is not a legitimate government instead President Yanukovych is still the legitimate President. If Yanukovych is still the President, then the old legal order is still valid, though not effective, as Kelsen said that effectiveness is just a condition and not a reason for validity of a norm. Kelsen states that men do not conform to an older legal order. Men here means people and thus the people no longer conform to an old legal order[i]. In the case of Ukraine, the protestors who are the people of Ukraine wanted the new government, and thus they accepted the new government, which should be enough to apply the principle of effectiveness, as the people doesnà ¢Ã¢â€š ¬Ã¢â€ž ¢t consider the old legal order as valid which is as it is ineffective with the formation of new government. Also the theory of Grundnorm led down by Kelsen is somewhat in accordance with the situation in Ukraine. A Grundnorm is the term for basic norm[ii]. A Grundnorm change is a phenomenon which overthrows the current power of governance which can only be done through a political revolution[iii]. A Grundnorm can only be changed through a political revolution. The Ukraine crisis is somewhat similar to a change of Grundnorm. The pro-Russian government which was ruling for a considerable time was overthrown by the people of Ukraine. The new Government form was considered as the existing legal order and the basic norm. The new Government was then the ground rule for Ukraine. As the new government was formed, arrest warrant was issued against President Viktor Yanukovy ch. This can be seen as a Grundnorm which is changed. No one could have arrested President Yanukovych when he was in power and he had the Grundnorm. But now, the new government can arrest him. The term Grundnorm is used to express basic norm, order, or rule that forms an underlying basis for a legal system. The new government can be considered or will give a norm for the basis of legal system. But this is highly debatable as the new government cannot be said to be formed by popular will and is supported by those people of the country who are not pro-Russia. In the case of Republic of Fiji v Prasad, the court of appeals use the basis of the à ¢Ã¢â€š ¬Ã‹Å"principle of effectivenessà ¢Ã¢â€š ¬Ã¢â€ž ¢ laid down by Kelsen. In Fiji, the government appointed by the military failed to establish that it was a legitimate and legal government. The judges quoted Kelsen stating that theory justified the seizure of power by force. The judgment also stated that a new regime having to prove that i ts rule was based on à ¢Ã¢â€š ¬Ã‹Å"popular acceptance and supportà ¢Ã¢â€š ¬Ã¢â€ž ¢ as distinct from à ¢Ã¢â€š ¬Ã‹Å"tacit submission to coercion or fear of forceà ¢Ã¢â€š ¬Ã¢â€ž ¢. The holding of elections would be à ¢Ã¢â€š ¬Ã‹Å"powerful evidence of efficacyà ¢Ã¢â€š ¬Ã¢â€ž ¢. In the case of Ukraine also the new government needed to prove popular acceptance. But this government was formed by overthrowing the previous one by the protestors. It cannot be said that the new Government in Ukraine has the popular acceptance if considering the Crimean region. The Crimean population is not in favour of this government. The Crimean population is pro-Russia and thus is against this government. Also Ukraine has not gained de facto control over Crimea, though it is because of the Russian aggression in the region. But the question of popular acceptance is limited only to the region of Crimea and thus it can be said that, what happened in Ukraine was a Grundnorm change. The new government was s uccessful revolution and will past the test laid down in the Fiji case accept when it comes to the region of Crimea where Crimea itself is expecting a Grundnorm change by wanting to join Russia. Like Kelsen, another jurist, H.L.A Hartà ¢Ã¢â€š ¬Ã¢â€ž ¢s theories can also be connected to the Ukraine crisis. The rule of recognition is a customary or, as Hart says, a social rule. It can also be said, it is a rule by virtue of being accepted by a certain group of people, viz. the legal officials. The rule of recognition can therefore be described as a conventional rule[1]. The most essential one is that inasmuch as the rule of recognition is a social rule, the Grundnorm is only a presupposition, a thought in the personalities of legitimate researchers and others. According to Hart, only customary laws existed in the time where no law existed. Customary law meant that a rule is accepted only if majority members accepted it. Even in the societies, where now the law exist, the majority should accept it. In Ukraine, the government of President Yanukovych was accepted by the people of Ukraine. But then why was a new government formed? Why did the parliament voted to impeach the President? This is because what Hart says it as normative uncertainty. There are numerous heterogeneous groups in the society which may disagree on some or the other norms of the society. For this uncertainty Hart lays down the rule of change. A rule of change confers power on a person or institution to create, modify or extinguish rules and may also specify the procedures to be used in exercising that power. Since the rule of change empowers certain persons to amend the rules, behaviour may be shifted in the desired direction through the exercise of legal authority[2]. In the case of the Ukraine crisis, the question is whether the new government so formed in Ukraine is the desired direction? And if it is the desired direction, is it derived through exercise of legal authority. The new regime formed in Ukraine was a revolution. As the rule of recognition where primary law derives its authority from secondary law, has new government derived ità ¢Ã¢â€š ¬Ã¢â€ž ¢s authority from anything? The interim government formed in Ukraine was legitimate and needed to be formed as the President fled away. The US and the EU recognized the newly formed government as being legitimate. The protestors can thus be said the group who were conflicting on the norms of the legal system and thus got it changed. A group facing a drought can, for example, deliberately change the tithing rules and hence address the dire circumstances in an expeditious manner. The new government is not accepted by the majority. Crimea voted more than 90% to join the Russian federation. Even Donetsk declared itself independent of Ukraine and wanted join Russia. Pro-Russia government was more desirable to this considerable population of the nation, thus not having popular acceptance of the new government. But this j ust not enough to decline the possibility of change of Grundnorm because there is a political revolution and the government is changed and it is only the population of Crimea and the some other parts of Ukraine which are pro-Russian are against the government but the majority part is for the government. It can be said that Crimea is another such group of the society facing normative uncertainty. Thus it can be called as a Grundnorm change. For Hart,Rule of change because, a group of the society was unable to derive authority from the previous government and thus formed a new government for their interest. It was the change of rule of recognition. Because the rule of recognition is a social rule, it is capable of being an ultimate rule[3].Its existence is derived only because of its acceptance, whereas the primary rule derive its authority from the rule of recognition. Russia insists that Viktor Yanukovych remains the President, while the government of Ukraine denies it. This mean s Russia recognizes Russia of having two legal systems, whereas the case is that it has only one legal system which is the ultimate rule of recognition[iv]. Similar is the case for the regions like Crimea who want leave Ukraine and merge with Russia. For such regions, the rule of recognition will shift from Ukraine to Russia. Ukraine will lose its power to legislate over the issues of Crimea[v]. HLA Hart also talks about the applicability of the international law. According to Hart international law is self-imposed but there are exceptions to it. The two important exceptions are formation of new state and a state acquiring territory or other changes. In such cases the state is bound by the international obligations and the rules. Considering the Ukraine crisis, Crimea either will be joining Russia or will form a separate state. In the former case Russia and in the latter case, the new state of Crimea will be bound by the obligation of international law[vi]. Also according to Kels enà ¢Ã¢â€š ¬Ã¢â€ž ¢s theory of International law, there is a coercive element involved in International law which gives a legal right to a state to punish an offending state. But Russiaà ¢Ã¢â€š ¬Ã¢â€ž ¢s armed interference in Ukraine was not supported by the international community. Russia was asked to move back its troops from the Ukrainian borders. So this wasnà ¢Ã¢â€š ¬Ã¢â€ž ¢t the legal right Russia acquired to punish Ukraine as it is question whether Ukraine is an offending state or not. It can be inferred from the current situation of Ukraine that it is more tending towards Kelsenà ¢Ã¢â€š ¬Ã¢â€ž ¢s grundnorm rather than Hartà ¢Ã¢â€š ¬Ã¢â€ž ¢s rule of recognition. But also it doesnà ¢Ã¢â€š ¬Ã¢â€ž ¢t totally negate the Hartà ¢Ã¢â€š ¬Ã¢â€ž ¢s point of view. Political revolution and a Coup are the two main elements for turning wind to the change of Grundnorm but at the same time also taking with it the elements of the change of rule of recognition. But still if I am need ed to choose only one out of the two, then I will say it is the Grundnorm change and not a change of Rule of Recognition. [1] Hart, CL II, supra note 96, p. 255. [2] YALE LAW SCHOOL, Scott J. Shapiro, Research Paper No. 181, WHAT IS THE RULE OF RECOGNITION (AND DOES IT EXIST)? , https://papers.ssrn.com/abstract#1304645 [3] YALE LAW SCHOOL, Scott J. Shapiro, Research Paper No. 181, WHAT IS THE RULE OF RECOGNITION (AND DOES IT EXIST)? , https://papers.ssrn.com/abstract#1304645 [i] If the old laws are regarded as valid it is because the new constitution has validated them expressly or tacitly (Kelsen 1967,209).The content of these norms remains unchanged but the reason for their validity changes as the old basic norm is displaced by the new. [ii] A legal norm exists because of a chain of validity that links it ultimately to the basic norm. The legal system is a system of legal norms connected to each other by their common origin, like the branches and leaves of a tree. [iii] Sometimes the basic norm of the legal order changes by means not authorised by the basic norm. This can happen in a number of different ways à ¢Ã¢â€š ¬Ã¢â‚¬Å" sometimes violently, sometimes by peaceful and consensual means. It happens when one stateconquersanotherandimposesitsownsovereignpowerovertheconquered state. The establishment of Crown sovereignty over Britainà ¢Ã¢â€š ¬Ã¢â€ž ¢s colonies subordinated local legal systems to the English law and constitution. It hap pens when a region of a country secedes from the whole and establishes its own legal order. [iv] it is possible that though in fact the legal system of the colony is now independent of its parent, the parent system may not recognize this fact. It may still be part of English law that the Westminster Parliament has retained, or can legally regain, power to legislate for the colony; and the domestic English courts may, if any cases involving a conflict between a Westminster statute and one of the local legislature comes before them, give effect to this view of the matter. In this case propositions of English law seem to conflict with fact. The law of the colony is not recognized in English courts as being what it is in fact: an independent legal system with its own local, ultimate rule of recognition. As a matter of fact there will be two legal systems, where English law will insist that there is only one But, just because one assertion is a statement of fact and the other a pro position of (English) law, the two do not logically conflict. [v] At this stage the legal system of the colony is plainly a subordinate part of a wider system char- acterized by the ultimate rule of recognition that what the Queen in Parliament enacts is law for (inter alia) the colony. At the end of the period of development we find that the ultimate rule of recognition has shifted, for the legal competence of the Westminster Parliament to legislate for the former colony is no longer recognized in its courts. It is still true that much of the constitutional structure of the former colony is to be found in the original statute of the Westminster Parliament: but this is now only an historical fact, for it no longer owes its contemporary legal status in the territory to the authority of the Westminster Parliament. [vi] The first is the case of a new state. It has never been doubted that when a new, independent state emerges into existence, as did Iraq in 1932, and Israel i n 1948, it is bound by the general obligations of inter- national law including, among others, the rules that give binding force to treaties. Here the attempt to rest the new states international obligations on a tacit or inferred con- sent seems wholly threadbare. The second case is that of a state acquiring territory or undergoing some other change, which brings with it, for the first time, the incidence of obligations under rules which previously it had no opportunity either to observe or break, and to which it had no occasion to give or withhold consent. If a state, previously without access to the sea, acquires maritime territory, it is clear that this is enough to make it subject to all the rules of international law relating to the territorial waters and the high seas. Besides these, there are more debatable cases, mainly relating to the effect on non-parties of general or multilateral treaties; but these two important exceptions are enough to justify the suspicion that the g eneral theory that all international obligation is self-imposed has been inspired by too much abstract dogma and too little respect for the facts.

Wednesday, May 6, 2020

Different Types of Literature Review Free Essays

Discuss types of literature review, sources of information in literature review and the process of conducting literature review? Literature Review According to the royal literature fund, literature review is a search and evaluation of the available literature in a given subject or a chosen topic area. It documents the state of the art with respect to the subject or the topic one is writing about. Literature review surveys the literature material in the chosen area of study and critically analyses the information gathered by identifying the gaps in the current knowledge synthesizing the information in that literature into a summary and presenting the literature in an organized way. We will write a custom essay sample on Different Types of Literature Review or any similar topic only for you Order Now Narrative/Traditional Literature Reviews These Critique the literature and summarize the body of the whole document. Also, they draw conclusions about the topic and identify gaps or inconstancies in a body of knowledge. Consequently, the narrative versions can also assist in identifying gaps in research by helping to define and also refine research questions. Systematic Quantitative Literature Review According to Catherine Pickering, an academic staff member of Griffith University, the method requires more rigorous and well defined approaches compared to most other types. It’s comprehensive and details the time frame within which the literature was selected: It can be divided into two: Meta-analysis Meta- synthesis Meta-Analysis This is where Patterns and relationships are detected and conclusions are drawn .Its associated with deductive research approach. Meta synthesis Based on non-statistical techniques, these methods integrate, evaluate, and interpret findings of multiple qualitative research studies .Meta synthesis literature review is conducted usually when following inductive research approach. Argumentative Literature Review It examines literature selectively in order to support in favor of or against an argument, deeply embedded assumption or philosophical problem already established in the literature. Integrative Literature Review Reviews The above method Critiques and synthesizes secondary data about research topic in an integrated way such that new framework and perspectives on the topic are generated .If the research does not involve primary data collection and analysis, then the option will be to use integrative literature review Theoretical Literature Review It focuses in the pool of theory that has accumulated in regard to an issue, concept, theory or phenomena. Usually it plays an instrumental role in establishing what theories already exist, the relationship between them, to what degree the existing theories have been investigated, developing new hypothesis to be tested. Historical Review The focus is of examining research for a period of time, often starting with the first time an issue, concept, theory or phenomena emerged in the literature then tracing its evolution within the scholarship of discipline .The purpose is to place research in a historical context to show familiarity with the state of the art developments and identify the likely direction for the future research. Scoping Literature Review Scoping reviews are quite similar to Systematic literature reviews though the key distinction being that there are no restrictions on the materials resourced. The purpose of the scoping review is finding the materials on the topic. When undertaking a scoping review, it is important to systematize your search strategies to ensure you can replicate your searches and to attend to any gaps that appear in the results. Sources of Information in Literature Review Primary Sourses This is an original piece of work on which other research is based on. This presents the native thought processes, reports a discovery or share new information. Results in physical, print or electronic format are the first formal appearance. Characteristics Primary sources have high level of details. Primary sources require little time to publish. Examples of primary sources of information. Literary creation e.g. Novel, short stories, Poems etc. Artifacts e.g. coins, plant specimens, Furniture, tools, clothing. Audio recordings e.g. radio programs Diaries Internet communication on emails Interviews e.g. oral histories, telephone, emails Letters Newspapers articles written at that time. Journal articles published in peer –reviewed publications. Original Documents e.g. Birth certificate, will marriage license Photographs. Meeting proceedings, conferences and symposiums. Speeches Survey Research e.g. market survey or public opinion polls. Video recording. Website. Records of organizations, Government agencies e.g. annual reports, constitution etc. Secondary Sources Secondary sources are stories written after the fact with the benefit of the occurrence. They are explanations and assessments of primary sources. They bear no evidence, only that they describe and report on evidence. Characteristics of secondary sources. They bear ordinary level of details. They require little more time to publish. Examples of secondary sources. Bibliographies (also considered tertiary). Biographical works. Commentaries, criticisms. Dictionaries, Encyclopedias (also considered tertiary). Histories. Literary criticism such as Journal articles. Magazine and newspaper articles. Monographs, other than fiction and autobiography. Textbooks (also considered tertiary). Web sites (also considered primary). Tertiary Sources This is information which is refined and accumulated from primary and secondary sources. Characteristics of Tertiary sources. The detail level is low. They require a lot of time to publish. Examples of tertiary sources of information. Almanacs. Bibliographies (also considered secondary). Chronologies. Dictionaries and Encyclopedias (also considered secondary). Directories. Fact books. Guidebooks. Indexes, abstracts, bibliographies used to locate primary and secondary sources. Manuals. Textbooks (also be secondary) The Process of Conducting a Literature Review According to Wikipedia, literature review also narrative review is a scholarly paper which includes the current knowledge including substantive findings, as well as theoretical and methodological contributions to a particular topic. Research process consists of series of steps necessary to effectively carry out research and the desired sequencing of these steps. Choose a topic. This means defining a research question. The researcher should single out the problem he wants to study, the research question not too broad or too narrow, write down terms that are related to the question, discuss the question with the supervisor. Wide literature survey on the scope of review. This is from abstracting and indexing journals and published or unpublished bibliographies, academic journals, conference proceedings, government reports and books. Development of working hypotheses. Hypothesis is tentative assumption made in order to draw out and test its logical or empirical consequences. The role of the hypothesis is to guide the researcher by delimiting the area of research and to keep him on the right track. Preparing the research design. Stating the conceptual structure within which research would be conducted. Determining sample design. At this stage the researcher develops a definite plan determined before any data are actually collected for obtaining a sample from a given population Collecting the data. In context of money costs, time and other resources at the disposal of the researcher, data are collected by observation, through personal interview, through telephone interviews, by mailing of questionnaires or through schedules. Execution of the project. The researcher should see that the project is executed in a systematic manner and in time and that the data to be collected is adequate and dependable. Analysis of data using tabulation and then drawing statistical inferences. Hypothesis-testing. At this the researcher is in a position to test the hypotheses, if any, he had formulated earlier. If the researcher had no hypotheses to start with, generalizations established on the basis of data may be stated as hypotheses to be tested by subsequent researches in times to come Generalizations and interpretation: If a hypothesis is tested and upheld several times, it may be possible for the researcher to arrive at generalization but if the researcher had no hypothesis to start with, he might seek to explain his findings on the basis of some theory. Preparation of the report or the thesis with three parts: a. The preliminary pages. b. The main text. c. Summing up. References Martyn Shuttle worth (Sep 16, 2009). What is a Literature Review? Retrieved Jul 18, 2018 from Explorable.com: https://explorable.com/what-is-a-literature-review Source: Grant, M. J., ; Booth, A. (2009). A typology of reviews: an analysis of 14 review types and associated methodologies. Health Information ; Libraries Journal, 26(2), 91-108. http://doi.org/10.1111/j.1471-1842.2009.00848.x De Souza, M. T., da Silva, M. D., ; de Carvalho, R. (2010). Integrative review: What is it? How to do it? Einstein (16794508), 8(1), 102-106. Forward, L., ; Hobby, L. (2002). A practical guide to conducting a systematic review. Nursing Times, 98(2), 36-37. Baglione, L. (2012). Writing a Research Paper in Political Science. Thousand Oaks, California: CQ Press. Systematic Literature Reviews for Education https://libraryguides.griffith.edu.au/c.php?g=45 Literature review sources retrieved from https://research-methodology.net/research-methodology/literature-review-sources/. Comparative Literature: Primary, secondary ; tertiary sources by Yale university library as retrieved from https://guides.library.yale.edu/complit. FLORIDA A;M UNIVERSITY. Retrieved from library.famu.edu Literature review Retrieved from https;//libguides.uwf.edu Literature review Retrieved from https;//libguides.uwf.edu How to cite Different Types of Literature Review, Papers

Tuesday, May 5, 2020

Webbs Stores for Cloud IaaS Security- myassignmenthelp.com

Question: Discuss about the Webbs Stores for Cloud IaaS Security. Answer: Introduction Webbs Stores is an Australian firm that sells food stuff and specialty items. The retailer has its data centres in many locations as Sydney and Melbourne along with Wagga, Brisbane etc. There are a lot many members of staff that work in the store and it is being expanding at a rapid rate. There are many problems that have been recently observed in the business operations and data management tasks. To overcome these problems, the use and involvement of cloud in terms of data storage and management has been proposed. The report analyzes the cloud database security. Cloud IaaS Security There are huge clusters of information that the store manages and processes using MS SQL Server 2012 R2 database. Due to the set of problems that have started showing up with the use of current database, it has been agreed to move to Infrastructure as a Cloud (IaaS) model based database. The following security considerations would be necessary with this model. Network based intrusion detection amalgamated with the behavior analysis tools to understand the patterns being followed by the intruders. Advanced access control processes combining of methods such as role and attribute based access control. Multi-fold authentication of the users by implementing login id, one time passwords and iris recognition systems. Use of anti-virus, anti-denial and internet security tools (Ismail, 2017) Conversion of the information to its cipher form by making use of encryption algorithms and protocols. Automated backup of the data sets and information. Benefits offered by IaaS Security Security of the cloud is one of the prime concerns that have been witnessed with the business organizations. This is because cloud data and information is exposed to increased number of security risks and attacks. Due to a higher threat probability, the frequency of the attacks is also considerably high that may have a negative implication on the customer engagement. The security measures in associated with IaaS security discussed above may get rid of such occurrences and may lead to benefits, such as, increased customer trust and higher market rates (Simou, 2016). Challenges Difficulties IaaS cloud database may face many technical challenges in terms of its integration with the rest of the tools implemented in the store. There may also be technical errors, faults along with the issues around compatibility with the software and hardware equipment (Shahid, 2015). There will also be many costs in terms of deployment, maintenance and training that will be associated with this cloud model. Database Risks There are many of the database related risks that may come up with the deployment of a cloud database in the organization. The number of access points and threat agents will increase which may increase the probability of the attacker to breach the information by making use of unauthorized access. There may also be availability attacks on the database which may make it unavailable for usage (Alashoor, 2014). IaaS Infrastructure Risks Many of the cloud services and operations that will take place may not be possible to be controlled by the technical staff members at the store. There may be network based security attacks on the IaaS cloud model, such as, eavesdropping attacks, man in the middle and phishing attacks (Singh, 2001). Communication Risks The information on the cloud will be shared and transmitted on the internal and the external networks. There may be integrity and confidentiality attacks that may be given shape by the attackers during the communication process. Alteration of the attributes or contents of the information sets or the leakage/loss of the information may also be observed. Risks Issues related to the Backup, Storage and Retrieval There are several security risks that are associated with the use and implementation of cloud database in the store. These risks will be associated with various data relates operations as well. Backing up of the data is an essential activity that is carried out in the cloud based database systems so that disaster recovery can be ensured. There are codes that are implemented for automatic capturing of the backups. However, the attackers may modify the code to malicious code which may damage the contents of the information sets. The stored data will have the likelihood to be impacted by a lot many database security risks and attacks. The properties of stored information viz. availability, confidentiality and integrity of the information may be negatively affected as a result. The attacks may execute denial of service, message alteration, media alteration, distributed denial of services and information breaches as some forms of the security attacks (Fowler, 2010). Access control, identity management and authentication are the three elements that play a critical role in information retrieval. There may be security risks and attacks associated with these three elements as the attackers may gain unauthorized access by violating all of the security norms and controls. Strategy for Disaster Recovery With the modifications in the database of the store, it would be necessary to modify the disaster recovery strategy that is followed in the store. Risk identification and assessment would be the first step that would be necessary to perform to understand all the new forms of cloud related security risks and attacks. A response and recovery strategy mapped with all the listed risks will then be necessary to be prepared (Tari, Yi, Premarathne, Bertok Khalil, 2015). The identified response and recovery strategy would be required to be implemented and the backing up of the information sets will also be made automated in nature. Access Control Access control is a protection mechanism which is used to prevent the security risks and attacks. There are various physical and virtual access points that will be associated with the store and it would be necessary to implement the access control mechanism on the basis of the possible security risks for each component. IaaS infrastructure: Access control method that shall be applied shall be role-based in nature. Ms SQL Server 2012 R2 cloud instance: Access control method that shall be applied shall be role-based in nature. Cloud network infrastructure: Access control method that shall be applied shall be attribute-based in nature. Backup and data restore: Access control method that shall be applied shall be attribute-based in nature. In the role base access control process, the users are provided the access to the system and its components on the basis of their roles and privileges. However, the attributes of the users are considered in case of attribute based access control (Khan, 2012). Conclusion Technological changes are taking place at a fast speed in the present times and the business units are required to maintain pace with this changing face of technology. Cloud databases provide the business units to perform the data related operations like storage, management and retrieval with ease and the decision of the Webbs Stores to migrate its current database to cloud is as per the technological norms (Nadeem, 2016). There are certain issues in terms of security that are observed in the cloud environment that would be required to be identified, assessed and treated. The security risks will revolve around the database related, network related and operational risks and attacks. There are technical controls along with administrative checks that must be done so that the occurrence of such events is prohibited and the information of the store is safe and protected (Hashemi Hesarlo, 2014). There are many technological components that may also be explored by the management of the sto re, such as Business Intelligence concepts along with the use of Big Data tools and technologies in the area of secure information storage and management. References Alashoor, T. (2014). Cloud computing: a review of security issues and solutions. International Journal Of Cloud Computing, 3(3), 228. https://dx.doi.org/10.1504/ijcc.2014.064760 Fowler, S. (2010). Impact of denial of service solutions on network quality of service. Security And Communication Networks, 4(10), 1089-1103. https://dx.doi.org/10.1002/sec.219 Hashemi, S., Hesarlo, P. (2014). Security, Privacy and Trust Challenges in Cloud Computing and Solutions. International Journal Of Computer Network And Information Security, 6(8), 34-40. https://dx.doi.org/10.5815/ijcnis.2014.08.05 Ismail, N. (2017). The winding road to GDPR compliance - Information Age. Information Age. Retrieved 20 September 2017, from https://www.information-age.com/winding-road-gdpr-compliance-123468132/ Khan, A. (2012). Access Control in Cloud Computing Environment. Retrieved 20 September 2017, from https://pdfs.semanticscholar.org/ef20/bc1239539f9a8502715153c5af67fc9e9034.pdf Nadeem, M. (2016). Cloud Computing: Security Issues and Challenges. Journal Of Wireless Communications, 1(1). https://dx.doi.org/10.21174/jowc.v1i1.73 Shahid, M. (2015). Cloud Computing Security Models, Architectures, Issues and Challenges: A Survey. The Smart Computing Review, 602-616. https://dx.doi.org/10.6029/smartcr.2015.06.010 Simou, S. (2016). A survey on cloud forensics challenges and solutions. Security And Communication Networks, 9(18), 6285-6314. https://dx.doi.org/10.1002/sec.1688 Singh, K. (2001). IT Infrastructure Security-Step by Step. Sans.org. Retrieved 20 September 2017, from https://www.sans.org/reading-room/whitepapers/basics/infrastructure-security-step-step-430 Tari, Z., Yi, X., Premarathne, U., Bertok, P., Khalil, I. (2015). Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. IEEE Cloud Computing, 2(2), 30-38. https://dx.doi.org/10.1109/mcc.2015.45