Sunday, December 29, 2019

The Big Five Dimensions Of Traits - 1131 Words

1.What are the Big five dimensions of traits? Answer:The Big Five dimensions of traits are (1) surgency, (2) agreeableness, (3) adjustment, (4) conscientiousness, and (5) openness to experience. 2.What is the primary use of personality profiles? Answer:The personality profile. Specific stronger and weaker that will help you to match. Who is the best suit the strengths of their personality. 3.What are some of the traits that describe the high-energy trait? AnswerSome of the characteristics that describe the characteristics of high energy and drive the strength endurance of the stress, enthusiasm, patience, for frustration and attempt. 4.Is locus of control important to leaders? Why? Answer:Yes.Locus control is important because the†¦show more content†¦7.Does McClelland believe that power is good or bad? Why? Answer:McClelland doesn t believe the powers themselves.Whether it is good or bad, it is a method that is used is important to personal power is not good because it is applied to personal interests at the expense of others.Social power is a good thing, because it is used to help ourselves and others. 8.Should a leader have a dominant need for achievement to be successful? Why or why not? Answer:The leader In General ,it must be necessary for the success of the medium. People with a high need for achievement are more likely to seek the success of each and when they are not interested in leadership opportunities for personal power. 9.How do attitudes develop leadership styles? Answer:Our attitude toward self and others influence our leadership style into four catagories: (1) Theory Y attitudes with a positive self-concept, (2) Theory Y attitudes with a negative self-concept, (3) Theory X attitudes with a positive self-concept, and (4) Theory X attitudes with a negative self-concept. 10.Which personality traits are more closely related to ethical and unethical behavior? Answer:A group that has the personality traits sergeancy. There are two alternatives to using the powers for personal benefit or use of the powers Parties to power and has a conscience that has high achievement, some people will use the wrong unethical behavior.There are also people who lack

Saturday, December 21, 2019

The Break With Rome By William Shakespeare - 4767 Words

The Break with Rome was a process that began around the early 1500’s and is still in play to this day. Many historians studying the topic believe that the causes leading up to the Break with Rome were too complex and that they are of a nature that cannot be listed if you wanted to comprehensively analyze the ultimate cause of the Break with Rome. Thus leading to the causes being described as more of a process through a series of causes and not so much an ’event’. There are many debated causes of the Break between historians that argue over their validity and importance as to whether or not the cause was actually real and had big enough motives behind it to lead on to such a bigger event. The main causes that have been debated over for century’s are: the inability of Catherine of Aragon to provide a male Heir for King Henry that he so desperately desired to have, the love obsession with Anne Boleyn that historians believe subsequently led on to Henry wantin g to annul his marriage with Catherine with means such as a Leviticus testament from the bible, Pope Clement VII’s refusal to grant the annulment for Henry and the fact that Charles V, Catherine’s nephew may have had a role in it and Henry’s increasing want and desire in his conquest for power and money. All of these causes are believed by many historians to have played a vital role in the process that led to the Break with Rome in 1533. Following the Break there were many consequences as a result, which a few stillShow MoreRelatedJulius Caesar Character Analysis Essay1017 Words   |  5 Pages The author of Julius Caesar is William Shakespeare, an English poet, playwright, and actor, widely regarded as the greatest writer in the English language. He was born on July 13 in 1564 and died in 1616. It was written to be a tragedy and was one of the seventh plays written off true events that happened in Roman time. Also includes Coriolanus, Antony, and Cleopatra. Drama of the play focuses on Brutus’ struggle between the conflicting demands of honor, patriotism, and friendship. Opens with â€Å"twoRead MoreA Historical Overview Of Julius Caesar Essay1452 Words   |  6 PagesA Historical Overview of Julius Caesar (Shakespeare style) The fate of a nation determined by one man. With classic alliances and betrayals, the tale of Julius Caesar is still regarded as one of the greatest betrayals in human history. The fate of Rome was heading toward a dictatorship. Only the Roman Republic could stop Julius Caesar from ruling Rome. Little did the Roman Republic know that this assassination would later cause Octavian Caesar to become the first Emperor of the Roman Empire in 27Read MoreJulius Caesar s Death And The Fallout After It1721 Words   |  7 PagesWilliam Shakespeare’s play Julius Caesar is one of his most monumental plays that cover Julius Caesar’s death and the fallout after it. He got the material for this play from a Greek writing called the Life of Julius Caesar. This was actually a famous biography written by Plutarch in the first century, I was later translated by Sir Thomas North in 1579. Published in 1599 this play is assumed to be the first to be ever preformed in the famous Globe Theater, it was a smash success that moved audiencesRead More Shakespeare And Catholicism Essay1243 Words   |  5 Pages By researching the life and writings of William Shakespeare, it can be shown that many Christian values and beliefs are displayed through his literary works. In order to understand the religious content in Shakespeares work it is helpful to first understand what the religious environment in England was like around Shakespeares time. England, ever since it was ruled by the Romans, had been a Catholic nation. Before Shakespeares lifetime, a drastic change occurred that completely upended the existingRead More Essay on Religion in the Works of William Shakespeare1720 Words   |  7 PagesReligion in the Works of Shakespeare       The purpose of this essay is to explore the religious nature of William Shakespeares plays. This essay covers three topics surrounding Shakespeares work: the religious climate of 16th Century England, Shakespeares upbringing (school, parents, Stratford itself), and a brief introduction into the impact his society and upbringing had upon his work.    I. THE RELIGIOUS CLIMATE OF 16TH CENTURY ENGLAND    In order to understand the religiousRead MoreMark Antony Speech Analysis1109 Words   |  5 Pages44 B.C. The Tragedy of Julius Caesar by William Shakespeare contains one of the most influential speeches known to man, Mark Antony’s funeral speech. Political and historical figure, Mark Antony, speaks at Julius Caesar’s funeral after his dear friend’s assassination. The subject of the speech entails how praiseworthy a leader Caesar was and the level of respect and admiration he had for the plebeians and the patricians of Rome. Persuading the citizens of Rome against the conspirators is Mark Antony’sRead MoreThe Inner Turmoil Expressed in Brutus’ Soliloquy in William Shakespeare’s Julius Caesar659 Words   |  3 Pages Brutus’ soliloquy in William Shakespeare’s Julius Caesar reveals Brutus’ inner turmoil before he decides on participating in the conspiracy. Brutus is torn between his love for Rome and his friendship with C aesar. However, Brutus fears that Caesar’s tyranny after enthroning will cause harm to Rome and return Rome to dictatorship. In the end, Brutus chooses his obligation to Rome over Caesar. Brutus soliloquy reflects on his internal conflict between his love for Caesar and his fear of CaesarsRead MoreCharacter Analysis of Aaron the Moor in Shakespeare ´s Titus Andronicus1025 Words   |  4 PagesTitus Andronicus by William Shakespeare, is a play full of murders, miseries and heinous deeds, whose chief architect (Shakespeare 5.3.121) for the most part, if not all, was Aaron the Moor. The audience of the play would be so quick to rule Aaron as a purely evil character, the most evil of all the other characters. However, a deeper analysis of Aaron shows that despite his villainy, he still has a human side which he shows towards his son, and that his dark skin has made him a victim of racismRead MoreThe Tragic Hero Of William Shakespeare s Julius Caesar1364 Words   |  6 Pages Brutus’s Tragic Downfall Throughout many of Shakespeare s plays, a tragic hero is present. A courageous character that has a tragic flaw, which leads to his downfall. Brutus is indeed the tragic hero of this play because when a person who possesses such heroic qualities dies, it is a true tragedy. A tragic hero has to start with everything and then end with near to nothing. This character often begins well liked and then starts to become less popular. At the beginning of the playRead MoreEssay on Julius Caesar578 Words   |  3 PagesCaesar nbsp;nbsp;nbsp;nbsp;nbsp;In the play, The Tragedy of Julius Caesar, William Shakespeare shows how friends often betray each other. Julius Caesar is about to be crowned king of Rome, when some well-known Romans decide that it is not a good idea for this to happen. They form a conspiracy and kill Caesar. Brutus, an honorable Roman and a very good friend of Caesar’s, betrays Caesar by killing him for the good of Rome. Antony, Caesar’s best friend and another honorable Roman, betrays Brutus by

Thursday, December 12, 2019

Theories of Risk Perception Management †MyAssignmenthelp.com

Question: Discuss about the Theories of Risk Perception Management. Answer: Introduction: Fischhoff, Slovic, Lichtenstein, (1988) gave insight into the different opinions of students regarding various events. In case of situations, where people find difficulty in identifying their values, then elicitation process shapes their values. The author particularly presents a confrontation between those have some values and those elicit values. The method of expression of values depends on situations. Peoples true value is also dependent on different problem, the manner in which people respond to them and its impact on their judgment. The reading also gave an indication regarding the situations when people do not know what they want. For example, people may have clear preference when they have directly experienced a situation. In such cases, people learn by trial and error methods and justifiable response to future values is developed then. Hence, direct experience of working in certain situations developed certain ideas and values among people. However, people need to make many diverse choices in life where we do not held direct experience and so contradictory values exist. Secondly, values of people also changes with time and decision making becomes difficult then. The generation of values and judgments of people has been found to be influenced by experimental procedures. In terms of psychological theory, it can be said that systematic effects lead to the random or systematic variations in observed judgment. Secondly, the author also gave insight regarding how ways to identify ones desire, analyze options and consequences, measure values and controlling different perspectives. On this basis, rationally sound values and interest can be deepened. An elicitor looking to identify a persons inherent values can get a lot of guidance from the process mentioned above and they can easily translate the basic disposition of respondents into a codable judgments so that people are very clear about the implications of their judgement. Another approach to strengthening perspective is to make respondents clear about different point of views and their benefits to analyse the rational for selecting their own values. Relation with work experience The above explanation of strengthening core values through appropriate judgment is related to my work experience. For example, in my first job, certain challenges in work made me change my perspective towards career goal. Although I had a very strong career ambition, however challenges in my job and no direct experience about challenges altered my judgment. I decided to quit the job and try some other things. However, one of my senior colleagues acted as a good elicitor for me as he gave me the idea that challenges are part of the job and once that phase is crossed, I would definitely start identifying my talent and contribution to the job. Hence, he acted as the right elicitor for me to affect my values and judgment. He did this by communication with me regarding the problems, the consequence of leaving the job so early and the implications of staying and benefits of dealing with the challenges. Hence, he deepened my perspective towards looking at my job and challenges. Wildavsky and Dake (1990) discussed about different theories of risk perception and why people fear certain thing. The main purpose of the study was to evaluate to what degrees are people equally worried about risk and why is the perception of risk different for different people. Based on this evaluation, the characteristics of people can be determined, whether they are risk takers or averse to risk. The perception of risk was discussed on the basis of knowledge theory, personality theory, economic, political and cultural theories. For instance, the knowledge theory explains that people regarding something as dangerous because they are aware about the risk. The economic theory gave the indication that risk taking or risk aversion is dependent on the economy because the rich people are more likely to take risk and test something new which they do not have. On the other hand, the cultural theory gives the explanation that people regard certain actions as risky as this have an impact on their social relations. The whole risk aversion and risk taking attitude was explained on the premise of regarding technology as a risk factor for people. Similarly, from the egalitarian point of view, the argument was that egalitarian people give more rating to risk. All the rival theories were also tested by the risk perception data archive. In this case, the risk associated with technology was evaluated with list of concerns people have about society. The responses were explained on the factor of knowledge, personality, cultural biases and political orientation. Cultural biases was found as the best factor to predict risk perception findings and the prediction is more powerful than knowledge and personality factor. Hence, the main conclusion from the discussion was that culture of individualism favors risk taking and the egalitarian culture always stay away from risk taking. However, the weak correlation between culture biases and personality also revealed the influence of cultu re on risk perception. This study pointed towards the right approach for risk perception by analyzing about different explanations about fears in people. Relation with personal experience: I agree with the Wildavsky and Dake (1990) view that people from individualism culture favours risk taking and those from egalitarian culture are averse to risk. I can say this because I belong to the individualism group and I have opted to take many risk in my career so that get eventual benefit from it. Hence, my risk taking attitude was triggered by my wish to gain something in return. I took the risky step of leaving my well-established job and working on my own project of developing an application where I could provide excellent job opportunities to people in one place. I wanted to make job seeking a pleasant experience for job seekers and I was motivated to take this risk because of the expectation that if I am able to crack this project, I will be earning even more than before. In addition, all controls will be under my hand and I will not be limited to a 9 to 5 job to display my talent. Jungermann (1983) gave useful debate and arguments regarding the two groups of people- the rational and irrational people. He defined rationality as a philosophical concept in which an action is defined as rational if it is line with values and belief of a person. The psychology of judgement and decision is further understood from the normative models and actual judgment. This model regarded violation of rationality as the true deficiency of the decision maker. In the debate, Jungermann (1983) categorized the pessimist into the first camp and the optimist into the second camp. The pessimist regard decision making under certainty may lead to certain problems, whereas the optimist think that their judgment will be functional even in complex situations. Therefore, both camps have different approach towards rationality and violations of rationality was seen due to limited judgment capacity and decision making ability of people. The author explained these violations of rationality in both camps. For the pessimist camp, violation of rationality was seen due to judgmental biases, representational faults and coping defeats. For example judgmental bias is seen when people mainly rely on heuristics and this leads to inconsistent decisions. Secondly, representational faults is seen when people evaluate any decision on basis of gains and losses instead of thinking about the final state. Another factor leading to violation of rationality in pessimist camp includes poor coping mechanism or motivations among people. In addition, for the optimist camp, meta decisions differ on the basis of familiarity of the situation and knowledge about the subject. The continuity argument for the second camp was that judgment is a continous process and biases in decision making is seen when people regard it as discrete event and do not regard it as functional. The final lesson from both sides of the debate was that rationality concepts is used with different meanings in both group and people should b e liberal in using the rational concepts. Relation with work experience The above explanation of pessimistic and optimistic groups decision making and concept about rationality is related to my work experience. I could relate with the information given for optimist camp that they always regard their decision as useful and functional in specific situations. For example, there were certain projects which were too complex and my decision making determined the success of the project. Hence, I planned my decision for the project with a positive mindset. Hence, I approach to deal with difficult circumstances with a productive mindset. With such focus, my rationality was based on impact of decisions on productivity. Therefore, I looked for all factors available that would determine the success of the project and I finalized my decision on the basis of benefits of application of the strategy. This may violate the rationality model as only available factors and not all factors for success were evaluated. Still it is perfectly rational because checking infinite re source available is not possible in finite time. Green (1994) gives a discussion about neutral omnipartial rule-making (NORM) which is a theoretical approach to moral choice giving an idea about underlying logic of moral reasoning process in terms of choice. NORM has been discussed in ethical writing of Immanuel Kant (1724-1804) and the main idea was that moral reasoning can be a great source of support when interest related conflict occurs. Hence, moral reasoning is the basis on which people can tolerate certain conducts or behavior. According to the moral reasoning process, a major consideration is that a conduct must be publicly known and acceptable all people in society. Another way by which moral reasoning was explained was that it is legislative processs that supports abiding by the rules. Hence, an action is right if all members of the society perceived it as right. The two questions that were raised based on this definition was that whether the approach is related to relativism and how society can morally decide moral actio ns where people are against other groups. The author gave the explanation that in the definition, the possibility of victimization in different group in society has been excluded. Therefore, NORM is used to assess conduct or policies, but not on the basis of vote by people in the society. To come to a valid conclusion despite different claims in society, NORM uses the principle of impartiality to determine a fair action. The word impartiality was also defined by the term detachment or omni-partiality. To come to moral decisions, taking omnipartial views from many persons also help. Therefore, NORM has been found to support common intuition because it emphasized on a conduct to be publicly accepted according to most basic judgment about moral choice. It can be summarized that NORM helps to interpret morality of difficult actions and engage in a reasoning process when rules conflict. This eventually leads to a better conduct. The above mentioned reading explored the moral reasoning process and the morality of an action by utilizing the NORM approach. I have used a similar NORM like action to evaluate the moral basis of my decisions too. For instance, as a work manager, I had the responsibility to achieve certain targets as given by my company. However, as few days remained and we were still far away from the target, I had to take some harsh decision so that I could eventually achieved the target. The decision in which moral reasoning was required was whether I should force all employees to work extra time for few days or not? I evaluated the moral basis of my action by being omni-partial and putting myself into my team members position. I analyzed about all those who will be affected by this conduct. Contemplating great ethical issues from staff, I gave the option of to team members of voluntary choosing extra work hours instead of forcing them. Reference Fischhoff, B., Slovic, P., Lichtenstein, S. (1988). Knowing what you want: Measuring labile values.Decision Making: Descriptive, Normative and Prescriptive Interactions, Cambridge University Press, Cambridge, 398-421. Green, R.M., 1994.The ethical manager: A new method for business ethics. Englewood Cliffs, NJ: Prentice Hall. Jungermann, H., 1983. The two camps on rationality.Advances in Psychology,16, pp.63-86. Wildavsky, A. and Dake, K., 1990. Theories of risk perception: Who fears what and why?.Daedalus, pp.41-60.

Thursday, December 5, 2019

Managing Regulatory Compliance In Processes -Myassignmenthelp.Com

Question: Discuss About The Managing Regulatory Compliance In Processes? Answer: Introduction The purpose of this report is to provide an overview of the process involved in performing the threat and risk assessment. The objective of the assessment on Internet of Things (IoT) Risk Management is to provide recommendations to increase the availability, confidentiality and integrity after being providing the usability and functionality. To perform a threat and risk assessment internal and external resources has accomplished. Everything depends on the situation at the time of choosing to use the internal or external resources. The scope of this report is to identify the sensitivity and protect the risk and the system and applications that are included in the assessment. The scope has indicated to analyze the internal or external perspective or both. The vulnerabilities and threats for the specific system and services has identified from various resources. The reports have identified and analyze vulnerability and gathered information and test whether the current safeguards are suf ficient in terms of availability, confidentiality or integrity. This vulnerability analysis will indicate whether the proposed safeguard is sufficient or not. According to the level of risk that the organization poses both internally and externally has graded by the specific vulnerabilities. If there are no adequate protections then it has assumed that there are vulnerabilities. In relation to business, environment threats has identified as the tampering, interruption or destruction of services or item of value and the affects they have on the organization. The report has also highlighted the OWASO Internet of Things top ten security issues that they have faced with IoT devices. It also has recommended with countermeasure to make aware of such threats.This IT risk task is for the intended audience of the management in which a risk assessment about the Internet of Things has provided. Moreover, as a lead consultant, this report will translate the technical difficulties in risk language to facilitate effective decision- making between the business stakeholders and technologists with a scenario provided that of Gigantic Corporation specifically on Internet of Things. The first and foremost thing that had to consider is the cause of the risk that has arises in the organization. Threats of IoT The Internet of Things is an interconnection technology between the people and computers for digitally connected things. However, as a part of the IoT engineering team for an organization Governance, Risk, and Compliance (GRC) group defined risk management organization and the risk data depends uniquely on the stockholder needs (Sadiq Governatori, 2015). For any business, risk management is definitely going to happen in many ways, implicitly or explicitly, reactively or proactively, as a box-checking exercise or competently. Threats are the destruction, interruption or tampering of the services that conceivably happens in a system. This threat has split into a human elements and non-human elements. Human elements include financial or accounting theft, hackers, Electricians, Technicians, trained IT staff, accidental, electronic and physical theft. Non-Human elements include Electrical, Air (dust), Viruses, Plumbing, Lighting strikes, Floods, Heat Control and Fire. In recent ransom-wa re has identified as the main threat of IoT ecosystem that leads to locking of files and a notification will be send to pay a ransom or will remain locked, as it has hacked the devices (Hamidi, 2016). If any professional is able to communicate effectively about those risk, then in that case risk may exist or less likely or may negatively impact the business. The first thing to consider in a business system is to identify the risks and understand the business and without it the system may result to failure (Lee Lee, 2015). The level of depth is concern on the initial review that includes tactical plans, strategy details, mission, and vision for the risk being assessed. Vulnerability of IoT In a system, vulnerability are the weakness of system software or hardware, weakness of the policies and procedure and to the system users that allow the attackers to conduct a Denial-of-Service attack, get access to unauthorized data, and to execute a command (Papp, Ma Buttyan, 2015). The main two components of the IoT system are; system software and hardware. The software vulnerability has identified in software application, control software and operating system. It is very difficult to identify the hardware vulnerability and even if the vulnerability has identified, it is then again difficult to fix them due to the hardware interoperability and compatibility (Rehman, Kriebel, Shafique Henkel, 2014). Many organization faced problem to effectively filter out the false positive from an assessment applications. The result of the false positive can then be mitigated once assessment applications are updated with patches and signature that are stable. The technical vulnerabilities is d ue to the weakness of human because they are unable to understand the requirements to start a project without a proper plan, absence of resources, knowledge and skills, no proper communication between the user and developer, and fail to control and manage the system (Conteh Schmick, 2016). Consequences Attackers attack to gain recompense or personal satisfaction. These attackers could be criminals, governments or hackers that has become a threat to the digital world (Kundi et al., 2014). In search of sensitive information, they attack the network to access the unencrypted data traffic. The consequences results in some of the following cyber-attacks listed below: Physical attacks: The high risk of physical attacks is in the outdoor environment of most of the IoT devices. Denial-of-Service attack: In this attack due to the limitations in the computational resources and capabilities of the memory is low, the intended user cannot get the resources of machine or network. Reconnaissance attacks: These attacks include queries send from the information of IP address, pocket sniffers, analysis of traffic, to scan the network ports. Access attacks: The unauthorized intruder tries to gain access to devices or network that is not authorized to them (Jose Malekian, 2015). This type of attacks has done in two ways. The first way is the physical access to physical devices and the second way is the remote access to devices that has connected to IP. Privacy attack: It has become a challenge to the privacy of IoT as there are large volumes of information available for the mechanism of remote access. Some of the common privacy attacks are tracking, data mining, password attack, cyber espionage and eavesdropping (Jenab Moslehpour, 2016). In certain databases attacker through data mining get access the unanticipated information. The intruder tracks the users location by the UID devices (Kim, 2017). The intruder tries to duplicate the user password through dictionary attack and brute force attack. Through eavesdropping the attacker, listen to conversation done by two parties. Cyber-crimes: The consequences of cybercrimes has found on the smart objects and the internet to achieve materialistic gain through identity theft, fraud, brand theft and intellectual of property theft (Broadhurst et al., 2014). Literature review Protection Mechanisms Employed For Website Security The main thing of IoT is that it sends and receives data that are embedded in the computing devices over the internet. Here comes the security issue, as the data is exchange over the internet. This literature review taken an exam that highlight the OWASO Internet of Things top ten security issues that they have faced with IoT devices and has suggested some of the countermeasures. Recommendation Data Collection: Data should be collected only for critical functionality devices. Proper Authentication: While making any initial setup, the default password and default usernames need to be changed. There should be options available to configure the password control and keep a strong password with the use of a secure password recovery. Granular control access: Whenever necessary to get access to granular control, it is better to ensure that the credentials has protected properly. Encryption: The device should have the ability to update files that has encrypted and transmitted through an encryption method. Conclusion This report concludes that IoT threats need a regular review to ensure the protection mechanism. The report also discussed that the threat has split into a human elements and non-human elements and about the ransome IoT recent attacks. It has address the security requires for an organization related to the availability, confidentiality and integrity. It has found that the software vulnerability has identified in software application, control software and operating system but in the case of hardware vulnerability, it is very difficult to identify the hardware vulnerability and even if the vulnerability has identified, it is then again difficult to fix them due to the hardware interoperability and compatibility. Many organization faced problem to effectively filter out the false positive from an assessment applications. It has mentioned the consequence happen due to cyber attacks in search of sensitive information that attack the network to access the unencrypted data traffic. Therefor e, in the final section the OWASO Internet of Things provided with top ten security issues that they have faced with IoT devices and has suggested some of the countermeasures of it. References Bonneau, J., Herley, C., Van Oorschot, P. C., Stajano, F. (2015). Passwords and the evolution of imperfect authentication.Communications of the ACM,58(7), 78-87. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S. (2014). An analysis of the nature of groups engaged in cyber crime. Conteh, N. Y., Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks.International Journal of Advanced Computer Research,6(23), 31. Florncio, D., Herley, C., Van Oorschot, P. C. (2014, November). An Administrator's Guide to Internet Password Research. InLISA(Vol. 14, pp. 35-52). Fysarakis, K., Hatzivasilis, G., Rantos, K., Papanikolaou, A., Manifavas, C. (2014). Embedded Systems Security Challenges. InPECCS(pp. 255-266). Hamidi, H. (2016). Safe Use of the Internet of Things for Privacy Enhancing.Information Systems Telecommunication, 145. Hossain, M. M., Fotouhi, M., Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. InServices (SERVICES), 2015 IEEE World Congress on(pp. 21-28). IEEE. Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K. (2014, June). Delegation-based Authentication and Authorization for the IP-based Internet of Things. InSensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference on(pp. 284-292). Ieee. Jenab, K., Moslehpour, S. (2016). Cyber Security Management: A Review.Bus. Manag. Dyn,5(11), 16-39. Jose, A. C., Malekian, R. (2015). Smart home automation security.SmartCR,5(4), 269-285. Kim, J. H. (2017). A Survey of IoT Security: Risks, Requirements, Trends, and Key Technologies.Journal of Industrial Integration and Management, 1750008. Kundi, G. M., Nawaz, A., Akhtar, R., MPhil Student, I. E. R. (2014). Digital revolution, cyber-crimes and cyber legislation: A challenge to governments in developing countries.Journal of Information Engineering and Applications,4(4), 61-71. Lee, I., Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises.Business Horizons,58(4), 431-440. Mukati, M. A., Ali, S. M. (2014). The vulnerability of cyber security and strategy to conquer the potential threats on business applications.Journal of Independent Studies and Research,12(1), 56. Papp, D., Ma, Z., Buttyan, L. (2015, July). Embedded systems security: Threats, vulnerabilities, and attack taxonomy. InPrivacy, Security and Trust (PST), 2015 13th Annual Conference on(pp. 145-152). IEEE. Pescatore, J., Shpantzer, G. (2014). Securing the internet of things survey.SANS Institute, 1-22. Rahman, A. F. A., Daud, M., Mohamad, M. Z. (2016, March). Securing sensor to cloud ecosystem using internet of things (iot) security framework. InProceedings of the International Conference on Internet of things and Cloud Computing(p. 79). ACM. Rehman, S., Kriebel, F., Shafique, M., Henkel, J. (2014). Reliability-driven software transformations for unreliable hardware.IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,33(11), 1597-1610. Sadiq, S., Governatori, G. (2015). Managing regulatory compliance in business processes. InHandbook on Business Process Management 2(pp. 265-288). Springer Berlin Heidelberg.