Monday, May 25, 2020

Essay on Death of a Salesman and Street Car Named Desire

Biff: â€Å"will you take that phony dream and burn it before something happens† Compare how the authors of Death of a salesman and â€Å"street car named desire explore the conflict between truth and illusion Truth and illusion are utilized in Tennessee Williams â€Å"Streetcar Named Desire† and Arthur Millers â€Å"Death of a salesman† through the use of the character; to lead the reader to a possible conclusion on the beliefs that went into the American dream that prompted people to work hard was that america was the land of opportunity while in fact that opportunity is used to manipulate those who follow this dream something that is most evidently shown in Millers main character Willy and to put forward a essential criticism of the materialistic†¦show more content†¦This Contrasts Millers use of this dramatic technique as â€Å"The Harmonious Flute† is used to obscure Willys sense reality, in contrast to Williams use of it to identify Blanches reality. Unlike Blanche, Willy is compltetly oblivious to the truth and resides to his memories to conceal himself away from the reality that the American dream has failed him. The flute is reminiscent of Willys p ast and often symblozies when Willy is reminscing becasue he is unable to bare the truth that his American dream is failing. This shows that Willy is unable to deal with the truth due to the false reality that the maerican dream has presented him with and made him beliveing into. The best example of this is the tape recorder which Willy accodentally sets in motion. In its â€Å"shrieking†, unpleasent tones of a child recounting phrases, we see how awful it is for Willy to have to live an accurate account of the past such as this. This is a vivid expression of his unconscious desire to repress the truth. This is proven even before the start of the play where the first stage directions should indicate â€Å"a dream rising out of reality† Thurther emphiseing Milliers critic throughtout the entire play. Though while Williams and Miller both identify these Illusions as a way of their characters protecting themselfs from their societys; Blanches male dominated patriarchal s ociety and Willy’s failed american dream. Blanche lives in a dream world,Show MoreRelatedCharacter Comparison906 Words   |  4 PagesName Tutor Course Date Blanche De Bois versus Willy Loman Blanche Du Boise is a character in Tennesse‘s fictional plain by the title a street car named desire while Willy Loman is a fictional character in Arthurs miller play; death of a sales man. Blanche in the play street car named desire is an extremely complicated character who appears to have internal conflicts throughout the play. She appears to be from the upper class society as her name suggests and upon meeting her she appears culturedRead MoreThe Tragic Blanche DuBois in A Streetcar Named Desire Essay examples1728 Words   |  7 Pagescontroversial. A Streetcar Named Desire is a 1947 play opened on Broadway on December 3,1947, and closed on December 17, 1949, in the Ethel Barrymore Theatre. While recognizing his compassion for frustrated and sensitive persons trapped in a highly competitive, commercial world, question whether he has not sacrificed his talent for popular success (Mood 43). â€Å"He [Williams] continued this study with Blanche Dubois of A Streetcar Named Desire (1947).† Stanley Kowalski in A Streetcar Named Desire is epitome ofRead MoreThe Wolf Of Wall Street : An Animal Inside1600 Words   |  7 PagesRyan Gandy Approaches to Film Lacefield April 7, 2016 The Wolf of Wall Street: An Animal Inside Martin Scorsese’s The Wolf of Wall Street introduces the life of Jordan Belfort. Based on a real-life person, Leonardo DiCaprio’s character is a sexually obsessed drug-addict who begins to accumulate his wealth through founding his firm Stratton Oakmont. He and his first-in-command, Donny Azoff, use securities fraud and money laundering to achieve immense wealth, and support their extravagant lifestyleRead MoreThe Antebellum South Thrived In Chivalry, Manners, And1856 Words   |  8 PagesThe Antebellum South thrived in chivalry, manners, and proper social standing. The old slave plantation, sun-tea, and gentle exchanges on the street were not uncommon sights during this time. Old-money and the disturbing thought of new money stitched in the pillows that sat on couches for luncheons. Too often, the people living in this period were so engrossed in creating a fake identity of perfection; they ultimately lost sight of who they were inside. To unveil the evils of the prac tice, many authorsRead MoreWhos Afraid of Virginia Woolf? Articulates the Crises of Contemporary Western Civilization867 Words   |  4 PagesThese dramatists had in their plays critiqued America as it moved from confidence to doubt. In a land of success they wrote obsessively of the unsuccessful. Their characters such as Blanch Du Bois in Street Car Named Desire(1947), Joe Keller in All My Sons (1947), Willie Loman in Death of a Salesman (1949) and Maggie the Cat in Cat on a Hot Tin Roof (1958) all lead posthumous lives. These are souls that have been lost as a consequence of the national myth of American Dream. In their delineationRead MoreDeath of a Salesman (Analysis and Personal Reaction)2850 Words   |  12 PagesDeath of Salesman is a a very deep play written by Arthur Miller about a salesman struggling to keep his grip on reality and his family. This play is a memory play, switching from present to past and vice versa whenever Willy, the salesman and father of the famil y, has a moment of insanity and returns to times gone by. Being memory, it allows for music to announce emotions and characters, and well as exaggerations and/or omissions. As Tom says in Tennessee Williams The Glass Menagerie: Being aRead MoreMarxism : The Theory Of Marxism2245 Words   |  9 Pagesnot held against his own will, he or she still work under the desires of the bourgeoisie, who own the means of income for the workers family. The constant work put in by the proletariat mixed with their desire for more in their life often makes them look for hope and one of the prime manifestations of hope for these people is the idea of the American Dream. As Marx and Engle’s stated the values of capitalism revolve around the desire for material possessions and their acquisition. The Marxist theoryRead MoreThe Impact Of Sherlock Holmes Essay2461 Words   |  10 Pagesdim-minded in order to further emphasize the grandeur and intelligence of Sherlock Holmes.   Ã¢â‚¬Å"His approaches to problem-solving are populist and simplistic while those of Holmes are complex and sophisticated (Gaines).† The real reasons for Doyle’s desire for such heavy comparisons is debatable, but there is reason to believe it was purely to appeal to the English society at the time, which was predominately white males from purely English descent. The better he could appeal to the society, the moreRead MoreEssay on Analysis of The House on Mango Street by Sandra Cisneros4759 Words   |  20 Pageson Mango Street† by Sandra Cisneros I will now concentrate on the background of the novel that moved Sandra Cisneros to write it by investigat ing the novel with special regard to its different dimensions. 1. The Novel 1.1 Summary The novel â€Å"The House on Mango Street† is written by Sandra Cineros. It deals with family, neighbourhood and dreams of a young Mexican girl, Esperanza Cordero growing up in Chicago. The novel begins when the Corderos move into a new house on Mango Street in the LatinoRead MoreThemes And Theories Of The Elderly Essay2676 Words   |  11 Pagesway down the street, he hears a young female voice screaming his favorite line â€Å"adventure is out there!† Out of curiosity, Carl makes his way into what seems to be a clubhouse belonging to a young girl, Ellie, and he befriends her. She shares with Carl that she also has a desire to travel to Paradise falls and relocate her clubhouse there. Carl and Ellie get married and fix up the old abandoned house, which was Ellie’s â€Å"clubhouse.† As their lives carry on, Carl becomes a balloon salesman and sells balloons

Monday, May 18, 2020

A Study Published In The Journal Pediatrics Found That

A study published in the Journal Pediatrics found that majority of fifth to twelfth-grade students were unhappy with their body weight and shape. For the older generation, it can be questionable that such young children would be concerned with their looks. But when one takes the time to explore through social media, popular television shows or magazines, it is hard to find elements that encourage healthy body images. As the pressure increases to have the false body image media has advertised for years, teenagers are left to seek for extreme measures such as cosmetic surgery to fit in with their peers. Although some studies show that cosmetic surgery shows temporal improvement in psychological issues such as self-confidence, for young†¦show more content†¦(Blanchette). Lastly, no current U.S. law prevents teens from having Botox treatments or fillers done. With parental consent, any teenager, who is willing to undergo Botox treatment, cannot be restricted by the law (Blanchet te). As the rate of teens having cosmetic surgery rise, many are questioning if teens should be allowed to have cosmetic surgery. Cosmetic surgery, which is an elective surgery to alter the physical appearance, has strong connections with someone s mental capacity to handle the sudden and painful change. For teenagers who are in the process finding their own identity, cosmetic surgery can lead to dangerous results. Mary Pritchard, a psychology professor at Boise State University, states that until the age of twenty-five, the brain’s decision-making functions are not yet fully developed (qtd. in Collins). Which concludes that teenagers have the possibility of making irrational decisions when it involves sensitive subjects such as popularity and beauty. Many who have experienced plastic surgery agree to the inefficiency when it comes to improving self-confidence, which is a popular reasoning for many teenagers. Annan, who got a nose job, said that having a nose job did not increase her self-confidence which was hitting rock bottom. Additionally, a girl who had her nose done in high school eventually suffer ed from depression and anorexia which caused her to continuouslyShow MoreRelatedThe Role Of Pediatric Nurses And How They Impact Their Clients Essay1237 Words   |  5 PagesEssentials of Pediatric Nursing, the main goal of a pediatric nurse is to improve and promote the quality of health and wellbeing of a child. (Hockenberry, 2012). Pediatric nurses work with children of all ages in a variety of settings, such as the intensive care unit, emergency department, surgical floor, and basic inpatient settings where they promote and improve children’s health and wellbeing through various treatments and support. The purpose of this paper is to understand the roles of pediatric nursesRead MoreEssay on Childhood Obesity1599 Words   |  7 PagesStatus† is a study that was conducted by Alison Kalinowski, Kylene Krause, Carla Berdejo, Kristina Harrell, Katherine Rosenblum, and Julie Lumeng. The study was published in the Journal of Nutrition Education Behavior. The focus of th e study was to examine beliefs about the role of parenting in feeding and childhood obesity among mothers of lower socioeconomic status. According to the study Children of lower socioeconomic status (SES) in the United States are more likely to be obese. The study focusedRead MoreWhy Abortion Should Stop The Abortion873 Words   |  4 PagesProfessor of Neurobiology and Anatomy and Adjunct Associate Professor of Pediatrics at the University of Utah School of Medicine, explains that the most primitive response to pain, the spinal reflex, is developed by eight weeks gestation, and adds that There is universal agreement that pain is detected by the fetus in the first trimester†. Another fact was According to Kanwaljeet J. S. Annand, MBBS, DPhil, Professor of Pediatrics, Anesthesiology and Neurobiology at the University Of Tennessee HealthRead MoreAnalysis Of Beyonce Knowles s Drunk Essay1154 Words   |  5 Pagesresearchers found. Songs depicting men as â€Å"sex-driven studs, † women as sex objects and with explicit references to sex acts are more likely to trigger early sexual behavior than those where sexual references are more veiled and relationships appear more committed, the study found. Most song lyrics don t discuss dangers of sexual activity, such as unplanned pregnancy or sexually transmitted diseases. Instead, music often glorifies promiscuity and promotes gender stereotypes. According to a study publishedRead MoreShould Marijuana Be Legalized? Essay1452 Words   |  6 PagesQUESTION Do you think marijuana should be legalized? INTRODUCTION Due to the evidence that I have found through researching the topic, I do not believe that marijuana should be legalized. Although there are many reasons why marijuana should not be legalized, I will be focusing upon the adverse effects of cannabis on the brain; including its modulation of drug reward within the brain, its effects on the structure and function of the brain, and its causation of an increased risk of psychiatric problemsRead MoreThe Effects Of Exercise Training On Functional Performance1000 Words   |  4 PagesRandomized Controlled Study Spring 2017 EPR 214-QL Professional Reflection Brandon England The University of Alabama at Birmingham PROCEDURAL SUMMARY My Professional Reflection summarizes the procedures and statistics used in a randomized controlled study on the Effects of Combined Exercise Training on Functional Performance in Children with Cerebral Palsy. This study was published in January 2017 in Volume 29 of Pediatric Physical Therapy, the official journal of the Section on Pediatrics of the AmericanRead MoreChildhood Vaccinations Essay1450 Words   |  6 Pagesdisease and counteract many life-threatening illnesses that once were responsible for killing thousands of children. According to researchers at the Pediatric Academic Society, â€Å"childhood vaccinations in the US prevent about 10.5 million cases of infectious illnesses and 33,000 deaths per year† (ProCon.org, 2012) The American Academy of Pediatrics state that â€Å"most childhood vaccines are 90-99% effective in preventing disease. When children who have been vaccinated do contract a disease, despiteRead MoreParental Punishment946 Words   |  4 Pagesparenting risk factor and demographic features? (Taylor, Manganello, Lee, Rice, 2010). Many studies have been completed that have shown an affiliation between the two factors, the independent variable being a mother’s use of CP and the dependent variable being the index of the child’s aggression at age 5. This longitudinal study, with a small survey component, was investigated through the In-Home Longitudinal Study of Preschool-Aged Children, where four different batches of data were gathered. Those fourRead MoreThe Effects Of Music On Young Adults1455 Words   |  6 Pagesresearchers found. Songs depicting men as â€Å"sex-driven studs,† women as sex objects and with explicit references to sex acts are more likely to trigger early sexual behavior than those where sexual references are more veiled and relationships appear more committed, the study found. Most song lyrics don t discuss dangers of sexual activity, such as unplanned pregnancy or sexually transmitted diseases. Instead, music often glorifies promiscuity and promotes gender stereotypes. According to a study publishedRead MoreNr500 Evaluation of a Website Credibility Essay908 Words   |  4 PagesJones, Graves, amp; Sievert 2010). The internet is frequently used by nurses to gather more information, expand their knowledge base, and provide patient education. The website http://kidshealth.org was found using the Google search engine, and chosen because of my work with the pediatric population. The purpose of KidsHealth is to provide parents, teens, and kids with a resource to consult regarding the health, nutrition, and development of children. The parent section of Kids Health can

Wednesday, May 6, 2020

Privacy Of A Healthcare Facility The Privacy Officer Essay

Privacy Officer in a Hospital Crystal Burch Utica College Abstract In a healthcare facility the privacy officer has many different areas in which they are responsible for managing. They have to develop and continually update the facilities policies and oversee and maintain the servers and computer used with in the facility. They also need to keep current on all the endlessly changing Health Insurance Portability and Accountability Act polices and regulations, which in turns means continually to educate the other employees of the facility how conform and stay within the ever changing regulations. Privacy Officer In A Medical Facility The Health Insurance Portability and Accountability defines the role as â€Å"the privacy officer shall oversee all ongoing activities related to the development, implementation and maintenance of the practice/organization’s privacy policies in accordance with applicable federal and state laws† (HIPPA One, 2014). The process in which it takes someone to become a privacy officer in the health care field, they need to meet an education requirement minimum of a bachelor’s degree and should be accompanied by a MHA, CPA, or a MBA along with a professional certification that should also include three years of experience in the health care system at a minimum. (HIPPA One, 2014). The privacy officer should, in this position, exhibit another set of attributes that include, but are not limited to: a high level of integrity, trust andShow MoreRelatedHipaa Complaint Procedures. Hipaa (Health Insurance Portability1710 Words   |  7 Pagesadministrative simplification pr ovisions may file a complaint with the Secretary.† (HIPAA, 1996). The Secretary investigates all complaints that are filed and then reports its findings to the facility and its complainant. HIPAA Complaint HIPAA complaint procedures protect the rights of all persons and their right to privacy. As technology continues to advance, the need for more stringent and relevant regulations has grown. The HIPAA Act, aims to provide consumers rights â€Å"to their health information andRead MorePatient Relations Manager, Privacy Officer, And Recipient Rights Director1138 Words   |  5 PagesRobin R. Nelson, MSA, patient relations manager, privacy officer, and recipient rights director is responsible for monitoring and assuring the facilities compliance with regulations pertaining to the privacy of patient records. Robin has a bachelor’s degree in Health Administration; a master’s in Public Health Administration and holds a registration in social work. She had originally intended to work in substance abuse, counseling, education, however according to her â€Å"it wasn’t a right fit† soRead MorePatient Relations Manager, Privacy Officer, And Recipient Rights Direct or Is Responsible For Monitoring And Ensuring The Facility1154 Words   |  5 Pages1. Robin R. Nelson, MSA, patient relations manager, privacy officer, and recipient rights director is responsible for monitoring and assuring the facility s compliance with regulations pertaining to the privacy of patient records. Robin has a bachelor s degree in Health Administration; a master s in Public Health Administration and holds a registration in social work. She had originally intended to work in substance abuse, counseling, education, however according to her it wasn t a right fitRead MoreEffective Privacy And Security Safety1442 Words   |  6 PagesHealthcare Privacy Officer Computers have become the database and communication in healthcare, and enable healthcare to make technology advances. Healthcare has come a long way with computers changing nursing and healthcare to become more business-like. Since there is a lot of stored confidential, and protected health information, security issues can arise. Health information should only be accessed by direct caregivers. Employees behavior online in the workplace impacts performance and can haveRead MoreProtecting Healthcare Fraud And Abuse1509 Words   |  7 PagesII of HIPAA covers two main areas: preventing healthcare fraud and abuse, and a broad series of rules under the framework of administrative simplification. The first area is not of significant interest to most healthcare workers. It defines numerous offenses relating to healthcare, and authorizes several programs to attempt to find and control fraud and abuse. Nurses should be aware of the proper procedures for reporting fraud and abuse at their fa cility. The second portion of Title II—administrativeRead MoreSmartphones And Its Effects On Health Care1390 Words   |  6 Pagesincluding safety risks, privacy risks and distraction risks. Nurses who use their smartphones for personal use during their work shifts put themselves at risk of becoming distracted and harming their patients, their employers and themselves. Healthcare providers are becoming increasingly alarmed over caregiver distractions by smartphones. They warn that hospitals and other healthcare facilities should put policies in place that discourage the personal use of smartphones by healthcare professionals duringRead MoreThe Relationship Between Privacy And Security1531 Words   |  7 Pages 1) What is the relationship between privacy and security? Explain your answer using an example. (15 points) It is best to define what privacy and security are first before we can discuss the relationship between the two. Privacy is a concept, which applies to an individual. It deals with the individual’s right to be protected from unauthorized access to his/her personal data. On the other hand, security deals with the procedures of information being protected from misuse. This includes computer-basedRead MoreThe Medical Office Specialist s Job Titles And Responsibilities1069 Words   |  5 PagesBilling 1 Week 1 DB Judith Parker List, define, and discuss the medical office specialist’s job titles and responsibilities. The medical office specialist as defined by our text is qualified for a variety of entry level positions in allied healthcare. Theses positions include: Admitting clerk Patient information clerk Apprentice coder Insurance verification representative Medical biller Payment poster Medical collector Refund specialist Medical receptionist Patient information clerk MedicalRead MoreHealth Information Technology For Economic And Clinical Health1484 Words   |  6 Pagespresents a prime example of privacy violation. The Federal privacy rule 42 CFR, part 2 mandated addition privacy protection for any health record that is generated in the treatment of patients in the federal alcohol and drug program (Hughes, 2002). The HIPAA privacy rule dictates that healthcare organizations must not disclose any identifying patient information, or alert any entity that a particular patient is participating in alcohol/drug treatment program. This type of privacy breach must be reportedRead MoreHealth Insurance Portability And Accountability Act1222 Words   |  5 Pagesadministrative burdens of healthcare by creating electronic formats. HIPAA is also used to develop standards and requirements to protect the privacy and security of protected health information. HIPAA consist of five titles. The main two important titles were title I and II. Title I focuses on the health insurance reform. The second title of HIPAA, applies to the Administrative simplifications; in which, includes the electronic transactions and code sets, unique indemnifiers, privacy and security. However

Workplace Violence And Its Effects On The Workplace

Employees encountering the biggest number of vicious attacks are those in medicinal services occupations—attendants specifics, and specialists, medical attendants and assistants who manage psychiatric patients; individuals from crisis restorative reaction groups; and doctor s facility workers working in confirmations, crisis rooms, and emergency or intense consideration unit. This is violence committed by an aggressor who either gets administrations from or is under the custodial supervision of the influenced work environment or the casualty. The aggressors can be present or previous clients or customers, for example, travelers, patients, understudies, prisoners, criminal suspects or detainees. The specialists regularly give direct administrations to general society, for instance, civil transport or railroad drivers, human services and social administration suppliers, instructors and deals work force. Law requirement staff is additionally in danger of strike from the people over whom they apply custodial supervision. (Oliver, 2015). 3) Violence by co-workers This sort of workplace violence gets a large portion of the media space. It happens when a specialist enters the working environment and carries on brutally against an administrator or collaborator. To keep this sort of violence, manager or leaders in the workplace must always search for indications of mental pain, for example, a withdrawal from socialization, an increment in at work unsettling and a decrease in workShow MoreRelatedThe Effects Of Workplace Violence On The Workplace1676 Words   |  7 PagesWorkplace violence (WPV) is defined as â€Å"any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site† (OSHA, n.d., para. 1). For the nursing profession these threats include the following sources: nurse to nurse, patient to nurse, relatives to nurse, other health professionals to nurse. WPV happens in all healthcare settings, however some units are known to have higher incidences than others. On e healthcare setting that isRead MoreThe Effects Of Workplace Violence On The Workplace1501 Words   |  7 Pagesin the rate of workplace violence in private-sector hospitals by 110% (2016). Workplace violence, which consists of physical and psychological abuse during work or on duty, has been an increasing problem in the healthcare industry. Workplace violence occurs in all types of healthcare settings such as hospitals and nursing homes and includes violence from patients, visitors, invaders, and coworkers. Although many states, including California, have laws preventing workplace violence, there is no federalRead MoreThe Effects Of Workplace Violence On The Workplace1751 Words   |  8 Pageswe think of violence, we often reflect on an image the news has portrayed. We think of gun violence, robberies, or some other brutal attack that has left one dead or seriously injured. It is common to assume that this is often occurs in low income, poverty stricken areas. A description is p rovided of substance abusers, broken families, racism, and a host of other reasons why violence occurs. Sometimes, in the majority of cases, this description is correct. At any time, workplace violence can occurRead MoreThe Effects Of Workplace Violence On The Workplace1235 Words   |  5 PagesIntroduction Violence in the workplace has been around for centuries. Everything from verbal abuse and harassments to physical abuse and murders have been known to happen in a business. During the 1980’s several violent attacks happened in the Postal Service, public awareness of workplace violence began in August of 1986 when a postal employee shot and killed fourteen people before killing himself. Prior to these killings, violence in the workplace was only referred to as getting injured on theRead MoreThe Effects Of Workplace Violence On The Workplace1799 Words   |  8 PagesViolence in the workplace can happen to anyone at anytime, anywhere that is possible. Everyone is not safe from workplace violence, which is why we need to identify and prevent this from happening. Violence can cause a significant amount of fatalities and injuries throughout the entire United Sates. Nearly 2 million Americans are affected by assaults and violent acts by people in the workplace. Workplace Violenc e could also damage someone’s trust and the sense of security while working with othersRead MoreThe Effects Of Workplace Violence On The Workplace1191 Words   |  5 Pages Workplace Violence Abstract In the last several years, instances of violence in the workplace has risen dramatically. As of 2010, approximately a million people has been affected by this type of violence. Although violence in the workplace is not anything new, it is steadily receiving attention because of the rise in the instances of violence and the part that the media is playing in the reporting of these occurrences. Throughout my paper I will discuss certain instances of violenceRead MoreThe Effects Of Workplace Violence On The Workplace1154 Words   |  5 Pages Introduction Workplace violence is defined in the OHSA as the exercise or attempted exercise of physical force by a person against a worker, in a workplace, that causes or could cause physical injury to the worker, or a statement or behavior that it is reasonable for a worker to interpret as a threat to exercise physical force against the worker, in a workplace, that could cause physical injury to the worker(ecentennial reading). ). It can happen at or outside the working environmentRead MoreThe Effects Of Workplace Violence On The Workplace947 Words   |  4 Pages According to The National Institute for Occupational Safety and Health workplace violence is described as any physical assault, threatening behavior or verbal abuse that takes place in the workplace. Violence includes all behaviors ranging in aggressiveness from verbal harassment to murder. Currently there is no law that requires protection for violence which occurs in the workplace. However some states throughout the country has reached out to legislation an established prevention programsRead MoreThe Effects Of Lateral Violence On The Workplace1159 Words   |  5 Pageswithin many professions in today’s society. Often referred to as lateral violence, this occurrence is no exception in the nursing profession. It is also known as ‘horizontal violence’ or ‘workplace bullying (Coursey, Rodriguez, Dieckmann, Austin, 2013). In this evidenced-based paper, information will be provided in an effort to identify causes of lateral violence in the workplace and how to encourage civility. Lateral violence is defined as acts that occur between colleagues wherein, bullying isRead MoreThe Effects Of Workplace Violence On Nursing1329 Words   |  6 Pages Effects and Management of Workplace Violence in Nursing Gurdeep Kaur, Virender Kaur, and Ana Tolentino Jimenez California State University, Bakersfield Effects and Management of Workplace Violence in Nursing Workplace violence occurs due to an interpersonal conflict between two or more people that results from differences in their needs, ideas, goals, interests, or values (Marquis and Huston, 2015). Workplace violence is not limited to physical violence; it also includes negative

Disney Case Analysis free essay sample

It is 1984, and Disney is the target of a potential takeover by notorious greenmailer Sual Steinberg. Disney is faced with the option of fighting the takeover through the courts and media, or to repurchase Steinberg’s shares, in effect, giving in to his greenmail attempt. However, there are many other important issues which are facing Disney. These range from Disney’s abysmal return on investment in recent theme park investments, to the complete failure of Disney’s motion picture division, to Disney’s alarmingly high dividend payout rate. In the following four sections, we will address these four issues Disney faces and recommend solutions to improve the financial health of Disney. Theme Parks Issue Recently, Disney has been following a bad investment policy. Disney invested a total of $1. 9 Billion in Epcot over a 6 year period and has increased its capital expenditures on theme parks by a total of $1. 277 Billion from 1981 to 1983. Despite these massive investments in its theme parks, Disney has only earned a return of 4% on Epcot and an overall return on Theme Park assets of 6% in 1983. Disney needs to find a way to more efficiently invest its capital and produce greater returns on its investments. Analysis In order to understand why Disney’s Theme Park investments have been so unsuccessful, we must analyze a number of different contributing factors. Why Disney is investing in Theme Parks? In order to understand why Disney is investing in Theme Parks, we need to take a look at the financial results of Disney’s different segments. Out of Disney’s 3 segments, Entertainment and Recreation (or theme parks) is Disney’s only segment which is nicely growing its profits in addition to attaining a healthy profit margin. Motion pictures is currently suffering, and actually losing money. Whereas, Consumer Products is producing profits and holding the greatest profit margin, however profits are not growing significantly. After looking at this analysis and nothing else, it appears as though Entertainment and Recreation is Disney’s most profitable segment and the one which they should be investing in. This is exactly what Disney is doing. Why are additional Theme Parks are the Wrong Investment? Before the expansion on new theme parks, Disney’s older theme parks had enjoyed much success. As recently as 1978, Disney’s Entertainment and Recreation segment had experienced a return on assets of 15. 7%. However, as Disney introduced new theme parks, they reached a point where the optimal supply of theme parks had surpassed the demand. This â€Å"oversupply† of theme parks can be seen by taking a look at the United States Demographic data provided in the case. First, it must be understood that Theme Park attendance, and in turn revenues, are driven by the younger demographic. According to the information above, the population group that drives Theme Park revenues (0 to 14 years old) is actually shrinking from 1970 to 1995. This represents a decrease in demand for Disney’s Theme Parks. Yet, at the same time, Disney is investing in and opening new theme parks. Essentially, Disney is increasing the supply despite a decrease in demand. This is counter intuitive by any economic standard. To further back the claims that Disney’s increased investment in theme parks is a bad move; let’s quickly analyze some measures of financial performance for their theme park segment. Clearly, the Entertainment and Recreation segment has experienced an abysmal return on assets recently. These numbers are even more disappointing when considering the Entertainment and Recreation segment produced an ROA 15. 7% as recently as 1978. Disney has made the wrong move in investing heavily in additional theme parks despite the population decrease in its main customer segment. In order to improve Disney’s position, it must make some changes. Suggested Changes Overseas Theme Parks The demand for additional theme parks does not exist in the United States, as can be seen from looking at the demographic data above. Therefore, there is no reason for Disney to continue expanding and investing in additional United States theme parks. Disney needs to immediately stop United States theme park expansion. However, this does not mean that Disney must stop investing in theme parks altogether. Disney should look to other countries where there is a demand for theme parks. By looking for countries where the demographics are in their favor and there is sufficient demand without oversupply, Disney can begin to earn sufficient returns on their theme park investments. Management Change Disney’s management should have foreseen the downside of overexpansion. It’s even possible that management did realize the lack of demand, however they may have wanted to extract us much demand as possible by building more theme parks. Either way, the decision to invest so heavily in theme parks despite their main market segment shrinking for the foreseeable future is incomprehensible. Earning a ROA of 6% in 1983 on theme parks assets when a 1983 T-Bill earns 8. 86% shows an abysmal utilization of assets. Management responsible for the decision to invest so heavily in theme parks needs to be fired from the company. Implementation How to Expand Overseas First, Disney needs to conduct market research in numerous modernized foreign countries. The focus of this research needs to be on the demand levels for a theme park, and whether the demand outweighs the current supply of theme parks in each country. Once Disney chooses the country with the most favorable supply and demand situation, it can begin analysis to determine whether or not they should actually construct a theme park in that country. They will estimate costs and future cash flows in order to conduct a NPV analysis in order to determine whether or not Disney should actually construct a theme park in that country. How to Implement Management Change Ask around management, and conduct interviews with high level managers in order to determine who was responsible for the decision to invest more heavily in theme parks. Once you have identified the main individual or individuals responsible for the decision, you let them know that they are being let go for their ineptitude. Then, search for top management at other similar companies (or any promising prospects within Disney) to fill the open positions. Motion Pictures Issue The motion pictures business has been historically one of Disney’s strongest segments since the company was founded. Over the years, classic films like Snow White and Cinderella have provided valuable revenue streams for the company. Films have accounted for a significant amount of Disney’s earnings and had a large impact on the performance of the company. However, in recent years the motion picture segment’s performance has been lackluster and recording an operating loss of $33. 3M in 1983. The recent failures in the motion picture segment had a profound ripple effect on Disney’s financial performance. Just two years ago the same division boasted a 17. 59% profit margin and operating income of $34. M. Analysis The recent missteps can be attributed to a failed TV channel startup, lack of a blockbuster movie hit, and the cancelation of a new Disney TV show on CBS. Although the film industry in general was suffering in 1983, the performance of Disney’s motion pictures division was abysmal. Suggested Changes New Management Performance in this division has steadily declined over the past three years. New talent needs to be brought in to help revitalize this division. Disney has been a household name since the advent of cinema and should not be lagging behind their rivals. Management needs to be held accountable for these failures. Increased Investment in Film Disney has arguably been one of the most successful film companies in the world since it was started in 1923. Creating, distributing, and selling films have been a core competency of Disney for many years. Disney needs to invest more money into creating innovative films and future blockbusters. For the past several years, there has been a disparate amount of funds invested into their park business compared to the motion picture segment. Disney needs to focus on their core competency of film and invest into motion pictures. Historically, this business has proved to be lucrative and these additional resources will help finance future blockbuster movies. Implementation How to Acquire New Management Currently, many of the Disney executives worked under Walt Disney, himself, and often won’t accept projects due to the reasoning that â€Å"Walt wouldn’t do that†. It is hard for creative talent to come up with great ideas and have them put down without any reasoning, other than a dead man wouldn’t have approved their ideas or projects. The current executive’s ties are too strong to the late Walt Disney and at least some of them need to be replaced with fresh blood. Fire the executives who are the most repeat offenders of the above mentioned offense. In order to replace them, we suggest that Disney looks to other top movie studies for executive talent. How to Increase Investment in Film While Disney is halting its theme park expansion in the United States and conducting market research overseas for new sites, a lot of additional capital will be lying around waiting to be invested. Once the new executives are in place, we suggest that Disney allocates a considerable amount of its free capital to motion pictures and see what kind of results that its newly hired executives can produce. Dividend Policy Issue One of the many vital points of interest that Ron Miller must address as Disney moves into the future is making a decision on its dividend policy. When looking at the dividend policy of the company, it is critical to conduct a financial ratio analysis of the company. Upon doing so, certain trends can be noticed. One of these noticeable trends happens to fall within the dividend payout rate. For over a decade, the dividend payout rate fluctuated only slightly staying in the range of 4% to 8%. Then beginning in 1978, the dividends began to increase exponentially arriving at a rate of 44. 4% only five years later in 1983. This five year spike in the dividend payout rate has come at the same time as the earnings per share continue to fall. This immediately should raise concerns for the financial security of the company. Analysis In deciding on a dividend policy, it is crucial for the company to decide how growth oriented it would like to be. Speaking simply, the mor e dividends Disney decides to pay out, the less retained earnings it has to put into future positively valued projects. This can be seen in the company’s sustainable growth rate. Calculating for 1883, the growth rate is only 3. 70% Given the large dividend payout rate of 44. 44%, Disney cannot grow with retained earnings at anything more than a modest 3. 70%. If Disney wanted to grow more than that, it could consider taking on more debt. The company has historically been averse to taking on too much debt and will most likely want to continue that trend into the future. If Disney wants to continue to grow without taking on debt, the company will need to consider lowering the dividend payout rate. Suggested Change Lower Dividends To align the dividend payout rate more closely with earnings per share along with setting the company up for more future growth projects, it is crucial in Disney’s financial planning that they cut back the dividend rate. It is our suggestion that Disney reduces its dividend so that its dividend payout ratio is in line with its historic payout of about 7. 50%. This will require Disney to cut its dividend down to $. 20 per share (based on 1983 EPS of $2. 70 per share). Decreasing the dividend to $. 20 per share would nearly double Disney’s sustainable growth rate, increasing it to 6. 16%. As a result, Disney would be able to finance more projects through retained earnings and continue to keep its leverage down. Implementation How to Lower Dividends Obviously, shareholders are not going to be happy to hear that you want to cut the dividend by 83%. This is why you have to issue a press release for general shareholders and at least a conference call or meeting with major shareholders to inform them of your intentions. During the conversation with shareholders, you are going to have to explain how it was a mistake in the past to increase dividends as earnings per share continued to slide. Let the shareholders know that you are going to correct this mistake now, rather than letting it continue to slide. Finally, mention that decreasing dividends will also help Disney remain a financially healthy company by keeping its debt low. Corporate Takeover Attempt Issue Possibly the most important issue faced by Ron Miller and the leadership of Walt Disney Productions is the imposing takeover attempt by well-known corporate raider, Saul Steinberg. This attempt has been sparked by Walt Disney’s current financial situation and performance. Currently, Disney seems to be an ideal target for a takeover. Disney has a great amount of cash on hand, totaling about $18 million. This, along with Disney’s underperformance and inefficiencies, are strong motivating factors for Steinberg’s attempt. It is likely that Saul Steinberg believes Walt Disney Productions to be undervalued. This is a conclusion shared by most raiders about the targets in takeover attempts. Disney is currently trading at $50 per share. Steinberg just initiated a tender offer for 49 percent of the company for $67. 50 per share. This is where Ron Miller must face a difficult decision by giving in to the greenmailing attempt by agreeing to purchase back Steinberg’s shares at a premium, or letting Walt Disney Productions fall victim to a takeover. Analysis It is essential for the future of Disney for us to examine the value of the company. From there, Disney must decide at what price, if any, should they buy back Steinberg’s shares. As stated earlier, Disney’s stock has been recently trading at $50 per share. (Graph) For our analysis of valuing the company, we calculated a WACC of 16. 6%, as well as three different possible growth rates of 8%, 11%, and 13%. From these calculations we were able to surmise an estimated company value of $68. 12 per share. This would lead us, as well as Saul Steinberg, to believe Disney to be undervalued. Recommendation Don’t Buy Steinberg’s Shares To successfully ward of Steinberg and his attempted takeover, Disney must offer him a hefty premium for the purchase of his shares. With his ownership of 12% of the company and his recent attempt for 49 percent of it, a pivotal decision must be made. However, after valuing the company and weighing possible options, we have come to a recommendation. For the sake of both the shareholders and stakeholders of the company, it would be not be wise to buy the shares owned by Saul Steinberg. A decision to succumb to Steinberg’s greenmail would greatly cripple the company from a financial standpoint. If Disney were to buy his share of the company, investors would experience a huge decline in their shares. Such a decision would be made solely to preserve the jobs and welfare of top managers of the company. Disney would be failing to maximize shareholder value, thus weakening Disney’s position in the market. We concluded that in order to avoid the takeover attempt, Disney would have to pay Steinberg $69 per share. This is $0. 88 more than our estimated value of the company and a 38% premium with respect to the current share price. This would leave Saul Steinberg with $289. 8 million, or a profit of $24 million at the expense of Disney’s shareholders. Implementation Don’t Buy Shares, Improve Company Instead of buying the shares, Disney should focus on cleaning up its act as a financially sound company, as well as a leader in its respective industries. With the likely replacement of Ron Miller and top executives, Disney would find itself in a position to change its current business policies. Disney is already highly capital intensive, with the recent increased spending on theme parks. The company should not be acquiring more debt by purchasing two new companies with no apparent synergies. Disney should immediately dump these unwisely obtained businesses. The money from these sales would enable Disney to invest in new business ventures, like expanding abroad and tapping into new markets.

Tuesday, May 5, 2020

Risk of Cyber Security in the Business-Free-Sample for Students

Question: Discuss about the Challenges in Cyber Security for Business. Answer: Introduction The literature review is the section which provides the secondary data details on the topic of research. The topic of research is Challenges in Cyber Security for Business for which different sources have been used to gain information and data. By Cyber Security we mean the protection of the valuable information and intellectual property of business which is in digital form from theft and misuse. Cyber security is an issue which is increasing in the todays global businesses. As per the US Government, Cyber security is one of the most critical ad serious issues which the businesses are facing these days. This challenge is faced by almost every country these days as the technology is growing and evolving. The coming age of Big Data, Internet of things and automation, the risk of Cyber security is increasing (Pandey, et al., 2016). Project Objective The main objective of the project is to identify the causes and factors which lead to the risk of Cyber security in the businesses. One more objective is to find out what cyber security challenges are present in the businesses. Project Scope The scope of the project is wide. It is because the topic of the research is one of the most critical issues the businesses are facing these days and there is lot to discuss on the topic. The literature review will include various real life examples to set up a clear understanding on the topic. The various forms of challenges and the causes of the same will be discussed by going through various journals, articles and web sources Literature Review AS the globalisation is evolving, majority of risks to business are seen due to technology. Cyber security has become a major challenge for the businesses and is growing at an alarming rate. There are different types of cyber threats like malicious attacks, attacks on networks and network abuse (Choo, 2011). Cyber security can be termed as the techniques used for the protection of businesses and computer systems from the unauthorised access and other cyber threats. As the cyber threats are increasing, the companies should adopt the approaches which help them in fighting with the complexity of the threats. Cyber security is a big issue because it has dramatically strengthened itself in past few years (Hutchings, 2012). According to Kaplan, Sharma Weinberg (2011) 46 per cent of the population of world is connected to internet which increases the chances of threats and cybercrime. Cyber security is a bigger issue now and it has been proved by conducting research on 25 global companies and the results shows so. The research found four common trends which includes that the digital data has become more widespread. It is also found that the corporations are now more open as compared to before. It also shows that the supply chains now are interconnected and that is how the attacks on technology are increasing. While technology is helping businesses to bring innovations in business, it is also creating so many threats for the businesses. The cyber security in business faces many risks in present business environment which are explained below: Ransomware It is the latest risk which prevents the users from accessing the significant information on their systems until they make a payment to the cyber criminals. The criminals tried to make more money once they were able to attack a user. The Internet of Things (IOT) The cyber criminals could make an access to the sensitive information contained by the user in their systems and this is a major privacy threat to the users. As per McAfee Labs 2017 Threats Predictions, around 1.78 million of devices will be in the hands of consumers and it will give more chances to hacking (Barclay Simpson, 2017). Social Engineering Social engineering involves manipulating the individuals to reveal their significant data and the information through the techniques of phishing. As per the data in recent year, these incidents have increased by 65% in 2016 as compared to 2015. Mobile Malware As the mobile usage is increasing day by day for the business tasks, there is more opportunity given to the cyber criminals to identify the weaknesses in the technology. As per the Kaspersky Lab, the attacks of mobile malware have tripled between the years 2015 and 2016. Fake Advertisements and Feedbacks The consumers nowadays are getting lots of advertisements at online platforms in which most of them are fake. These are phishing activities which affect the businesses and the consumer security measures (Barclay Simpson, 2017). In the opinion of Elmaghraby and Losavio (2014), many challenges are emerging due to the excessive use of technology. There are many instruments which are used in the businesses nowadays for making their operations easier but in return they face concerns such as privacy and this may affect their routine operations. Similar to this Tiwari, Bhalla Rawat (2016) suggests that Cybercrime has become inescapable because the sharing of networks and information has become so common in businesses. Cyber security is a mechanism which protect the computer systems and equipments from the unauthorised access. This will have positive impact on society and businesses. The typical cyber threats by which the business should be aware of includes Botnets, Malwares, Hacking, Phishing, Spam, Virus, Worms, etc. The author adds that Cybercrime have severe disruption in the businesses. It is a crime against business (Nojeim, 2010). Cyber security is when the properties or information of businesses are protected from the thefts and risks. Cyber security also provides some of the prevention tips to save itself from cybercrime. The users are advised to keep the defence systems up to date and to make sure that the systems are safe and secure. The users are advised to choose strong passwords and have security checks at regular intervals. The unfamiliar mails should not be touched and safe browsing should be encouraged. It can be said that in the modern era where technology plays a main role, cybersecurity is encouraged to have security from the cybercrime. Security has become a major concern and it should be taken as an integral part of the industry (Basamh, Qudaih and Ibrahim, 2014). In the opinion of Deore Waghmare (2016), Security of cyber information has become one of the greatest challenges across the world. Internet nowadays is used in almost each and every industry like ecommerce, communications, finance, banking and many more and this increases the chances of cyber-attacks for stealing the important data and information. Cyber security plays an important role in the ongoing development of IT. The cyber security faces number of challenges in fighting with the cybercrime. One of the main challenges is heavy dependency on Internet and Communications technology (ICT). ICT is nowadays used in businesses on a large scale and is a part of everyday life. This gives more chances to the attacks on the networks and infrastructures. The second challenge can be the increase in the number of users (Abomhara, 2015). As the popularity of internet is growing, the users are increasing cross the world and the number of targets for the attackers is also increasing. The third challenge is availability of devices and access to those devices. If an offense is to be committed it needs devices for the purpose. Software tools are available easily which contributes in promoting the cybercrime. This encourages the criminals to commit such crimes. The next challenge can be the availability of information. There is millions of webpages on the internet and it contains updated information. So the offend er targets the ones which have weak password protection systems and access the information. That information might be used for the wrong purposes which could cause serious security issues to the business. Another challenge is lack of mechanisms of control. In every communication network, there is a need of central administration to ensure the operability. There is a need of laws, governance and standards which can have certain degree of control on the networks. The international dimensions of the business also create a challenge for the security of information and networks. This affects the cyber security in different nations (Wright, Dawson and Omar, 2012). Automation is a challenge for the cyber security of business. ICT has the ability to automate the processes and it also has many consequences. Automation can provide opportunity to the offenders to send spams in bulk and attack thousands of the systems in hours. Spams may be a serious issue in the developing countries and many victims can be created. Availability of resources and speed of data and exchange. The speed of data exchange has led to the fastest exchange of cybercrime. It takes few seconds for the criminals to exchange emails and viruses. Another challenge is anonymous communication where the origin of communication is not known. Because of this, the identity of the offenders is difficult to make. Like they can use fake email ids and offend the privacy of the secure information (Clemente, 2013). As per Babate, et al. (2015), the lack of leadership is also considered as one of the major challenges of cyber security. Security is maintained when there is a trust maintained between technology and people using it. So, leadership is needed to handle the challenges and issues occurring because of technology and people. Collaboration needs to be maintained which helps in meeting challenges of cyber security. People are needed to be educated so that the security can be maintained by the cyber security cells. It is seen that the people are not getting enrolled in the courses of cyber security which is creating more challenges. When people will be educated in this course, they will be able to handle the issues of the industry of Australia. The cyber-attacks have been increased in the last few years and for that a framework needs to be created. This framework should include the roadmap which could bee adopted to fight the challenge of fighting the cybercrime. There are some of the long term challenges which affect the cyber security efforts taken by the industry (Fischer, 2016). These challenges include the lack of proper designs of security systems, the lack of incentives which are given to the cyber criminals. That is why; they look out for an easier option and go for cybercrime. Also the lack of consensus from all the stakeholders creates problems for the cyber security cells (Gharibi and Shaabi, 2012). Government has taken various steps to meet the challenges of cybercrime. These include the monitoring systems and security of network. The government have taken steps like drafting the cyber security law for facing the risks of cybercrime. The plans are made to design the approaches to meet these risks. Different countries take different steps to meet the challenges like China has made cyber security laws while US, reforms are developed to improve cyber security. In the corporate world, the condition of cybercrime is getting worse year by year but the steps are planned to be taken to get over this. US have increased their budget of cyber security by 35% which shows that the problem is increasing and will continue in the coming years (James, 2016). As per James (2016), the businesses, government and individuals should double their protection of cybercrime. The average cost of a cybercrime attack is approx. $276000. In USA, it costs approx. $100 billion per year. People lack in knowled ge about cyber security which increases the risks gradually. There are 1404 cyber security vendors in the world and Australia have only 15 out of them whereas the other countries like UK, USA, India, Israel have 76, 827, 41 and 228 cyber security vendors respectively. As per the data given by McAfee 2016 Threat Predictions, in the next five years the volume and type of personal information which is tracked and stored will change. The autonomous systems are the next technology which integrates with operating technology and blend together to solve the issues of cyber security. According to Foreshew (2017), the businesses of Australia are facing the cyber security crisis as there is not enough staff with expertise to face the threats. So, the demand for the cyber security specialists is at peak. This is a real challenge to meet this demand. There is also problem of funding. Where on one other the other countries like USA is spending more than US$200 million on RD investment for cyber security, Australia is lacking in this area. It is currently spending less than $100 million for the same. For cyber security research, the nation could spend and invest more. There is also weak collaboration between the research and industry. Only 3% of the businesses collaborate with the universities and with other research institutes. The situation in the Australian Cyber security industry is Ambiguous. The industry of cyber security is getting funds from the corporations like Common wealth Bank of Australia, Telstra, Optus and more. The government also invests in developing the Australian Cyber Security Research Institute (ACSRI) which provides RD facilities across Australia. There are some universities as well which in collaboration with companies and government helps in developing the cyber security industry of the country (Foreshew, 2017). In Australia, Cyber security is important to be taken seriously as the use of information systems, networks and Internet is more and government should come up with better control systems to meet these challenges. In this, every stakeholder has to play their roles. These include the companies, government and individuals. The individuals should handle the data well at the workplace while the companies should take effective measures for the security of data. They should provide trainings to their workers to handle data well. The government should make regulations and laws which can be proved effective in managing the security of the business (Foreshew, 2017). Conclusion It can be concluded that many techniques and softwares have been developed for handling the cybercrime. For the privacy of data and information of the businesses, cyber security measures have been adopted and the challenges to these measures have been discussed in the literature which is collected through various sources. The literature explains different types of challenges and what all steps different countries are taking to meet these challenges. It is concluded that Energy, Banking and Communications were the top three targets of cyber criminals. But there are opportunities in the coming year as the awareness has been increased for cybercrime. The industry is employing more people for meet the challenges and resolve the issues. It can also be concluded that there are some pillars of cyber security which can resolve the issues of the same. It includes Education and awareness about the matter, planning and preparation about the same in advance, sharing and collaboration to meet the current and future risks and Ethics Collaboration to have professional field of expert. Cyber security is important to the economic future of the country and for the society as well. As thee economy and society will get developed, the cyber security will become more significant to be developed. Good cyber policy is required for the cooperation and creativity in the industry. References Abomhara, M Koien, G M 2015, Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks, Department of Information and Communication Technology. Abomhara, M 2015, Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks,Journal of Cyber Security and Mobility,4(1), pp.65-88. Australian Cyber Security Growth Network, 2017, Cyber Security Sector Competitiveness Plan. Retrieved from https://www.acsgn.com/wp-content/uploads/2017/04/Cyber-Security-SCP-April2017.pdf. Babate, A I, Musa, M A, Kida, A M Saidu, M K 2015, State of Cyber Security: Emerging Threats Landscape, International Journal of Advanced Research in Computer Science Technology, Vol. 3, Issue 1. Barclay Simpson, 2017, The top 10 cyber security challenges for businesses, Retrieved from https://www.barclaysimpson.com/news/the-top-10-cyber-security-challenges-for-businesses-news-801833525. Basamh, S S, Qudaih, H A and Ibrahim, J 2014, An overview on cyber security awareness in Muslim countries,International Journal of Information and Communication Technology Research,4(1), pp.21-24. Choo, K K R 2011, The cyber threat landscape: Challenges and future research directions,Computers Security,30(8), pp.719-731. Clemente, D., 2013,Cyber security and global interdependence: what is critical?. Chatham House, Royal Institute of International Affairs. Deore, U D Waghmare, V 2016, A Literature Review on Cyber Security Automation for Controlling Distributed Data, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2. Elmaghraby, A S and Losavio, M M 2014, Cyber security challenges in Smart Cities: Safety, security and privacy,Journal of advanced research,5(4), pp.491-497. Fischer, E A 2016, Cybersecurity Issues and Challenges: In Brief, Congressional Research Service. Foreshew, J 2017, Australia faces cyber security skills crisis as challenge, Financial Review. Gharibi, W and Shaabi, M 2012, Cyber threats in social networking websites,arXiv preprint arXiv:1202.2420. Hutchings, A 2012, Computer security threats faced by small businesses in Australia, Trends and Issues in Crime and Criminal Justice, (433), p.1. James, C 2016, Cybersecurity: Threats Challenges Opportunities, ACS. Kaplan, J, Sharma, S Weinberg, A 2011, Meeting the cybersecurity challenge, McKinsey Company. Nojeim, G T 2010, Cybersecurity and Freedom on the Internet,J. Nat'l Sec. L. Pol'y,4, p.119. Pandey, S, Shah, N, Sharma, A and Farik, M 2016, Cybersecurity Situation In Fiji,International Journal of Scientific Technology Research,5(7), pp.215-219. Tiwari, S, Bhalla, A Rawat, R 2016, Cyber Crime and Security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 4. Wright, J, Dawson, M E and Omar, M 2012, Cyber security and mobile threats: The need for antivirus applications for smart phones,Journal of Information Systems Technology and Planning,5(14), pp.40-60.