Tuesday, December 24, 2019

Justice System Position Paper - 1845 Words

Justice System Position Paper Dorothy Brockington University Of Phoenix Introduction to Juvenile Justice Timothy Cariker March 5, 2011 Justice system position paper The purpose of this paper is to state my belief that juveniles should and can be rehabilitated. The goals and efforts of rehabilitation are to keep the juvenile offenders out of the correctional facility. Peers impact delinquency in several ways for instance; most teenagers follow their friends do to peer pressure.†¦show more content†¦The juvenile justice system should adopt the focus of rehabilitation verses punishment for reasons such as, when juvenile delinquents are order by a judge to become rehabilitated they tend to learn from their mistake and attempt to make a life change for the better. Most juveniles who committed to becoming rehabilitated have become successful with deterring from criminal activities. In many cases some juvenile delinquents have grown to be productive throughout their teenage years into adulthood after receiving rehabilitation. Rehabilitation has an affect on law enforcement, court process, probation, corrections, community service, and intervention programs for example, within law enforcement most juvenile offenders stand a lesser chance committing a second offense. This would allow the law enforcement to focus on new cases of criminal offenders. In addition to focusing on new offenses, law enforcement can utilize the funding that it would take support the process and use it in other areas most needed. â€Å"Almost all federal support for juvenile law enforcement activities comes through grants made to states and local agencies.†(Rabkin, J.N., 1998) Most juveniles are recommended rehabilitation during the court process. Until the juvenile delinquent has meet all requirements set by his or herShow MoreRelatedInvestigation Of Criminal Justice And Corrections1539 Words   |  7 Pages Criminal Justice and Corrections Staci Pribbenow Kaplan University Introduction Criminal justice has been a passion of mine for many years. It wasn’t until recently that I decided to go back to school to obtain my master’s degree in criminal justice. I have chosen to focus on the field of corrections in the criminal justice system. I want to make a difference and help those individuals that need help once being released from a prison setting. There are so many differentRead MoreCourt System Paper1265 Words   |  6 PagesRunning head: COURT SYSTEM PAPER Court System Paper AJS 502 21 May 2013 John V. Baiamonte, Jr. PhD â€Æ' Florida County Courts The state of Florida 67 County Courts along with the Circuit Courts, Florida District Court of Appeals and Supreme Court are established via the State Constitution under Article V titled Judiciary. County Courts Judges differed basedRead MoreTraining For A Leadership Position1523 Words   |  7 Pagesleadership position. They are looking to secure the chief prosecutor s position in Macon County, South Carolina. â€Å"Assistant prosecutor Norris has been a member of the Macon County Prosecutor s Office for 30 years. Norris joined the prosecutor s office straight out of law school, and he has acquired experience that cannot be matched by any other prosecutor in the office.† (South University Online, 2016, para 1) Assistant prosecutor Norris concedes that he does not have the training and paper credentialsRead MoreExclusionary Rule Evaluation872 Words   |  4 Pages Exclusionary Rule Evaluation Paper University of Phoenix CJA 364 Abstract The following paper will analyze the rationale and purpose of the exclusionary rule and identify exceptions to the exclusionary rule. In this analysis, it will state the costs and benefits of the exclusionary rule, as well as alternative remedies to the rule. The author will state their position on the exclusionary rule and provide support for their position. The author will also include supportRead MoreEssay about Swot Analysis: Police and Society979 Words   |  4 PagesPolice and Society SWOT Analysis (Paper #1) Ever since September 11th, 2001 a lot of Law Enforcement agencies were created. Many were federal level agencies and others were state level agencies. When asked to compare two different Law Enforcement Agencies, I chose to compare and analyze the Drug and Enforcement Administration (DEA) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). The reason I chose to compare these two agencies is because I feel that these two agencies haveRead MoreThe Legalization Regulation Of The Sex Trade Essay849 Words   |  4 Pages This paper argues for the decriminalization plus regulation of the sex trade. This paper will defend the position that activities associated with adult prostitution (advertising, buying, soliciting, living off the avails and keeping a bawdy house) should be decriminalized/ legalized due to: a) the capacity for criminalization to infringe on sex worker’s fundamental rights to life, liberty, and security and b) the capacity for criminalization to prohibit sex worker’s from actively preventing harmRead MoreJury Awards Should Be Restricted1648 Words   |  7 Pagesaward policy has been under a scathing attack from various quotas. The tort liability system is perceived by many people to be out of control, unpredictable, and capricious. Some of the people who have voiced their frustration and disapproval of the system are judges, legislators, and executives from the pharmaceutical, medical, and insurance industries (Greene, Coon and Bornstein, 2001). The critics of the sys tem argue that jury damage awards are highly unpredictable and often excessive on the partRead MoreFidel Castro s Courtroom Defense Speech1317 Words   |  6 Pages moving and addressed the issues that plagued the nation. This paper shall seek to defend most of his ideologies, explain the importance and relevance of the speech. Fidel Castro in his speech portrayed the government as a very corrupt institution, in his words, he said that the entire government comprised of wolves and individual that of coward countenance; this was because he had been denied any legal aids. His demands for justice fell entirely on deaf years. According to Fidel Castro the headRead MoreThe American Political System Is Built On A Foundation Of Checks And Balances928 Words   |  4 PagesThe American political system is built on a foundation of checks and balances, yet there is one branch which has somehow evaded this practice. The federal court system is defined by Article III of the Constitution, it represents one of three of the most powerful hands in the federal government. Unfortunately, the article which outlines its functions and limitations is extremely vague in nature. As stated in Article II, Section 2, Clause 2, the President holds the authority to appoint a federal judgeRead MoreCriminal Justice System Paper803 Words   |  4 PagesCriminal Justice System Paper CJA/204 Vonnie Cooper March 28, 2011 Ken Salmon The word â€Å"crime† means an illegal action that is prohibited by law or a breakage of certain laws set forth by the criminal justice system. When someone

Sunday, December 15, 2019

The Chemistry of Organic Molecules Free Essays

THE CHEMISTRY OF ORGANIC MOLECULES I. MACROMOLECULES-large molecules that are composed of smaller molecules and atoms that are bonded together. These are among the largest of all chemical molecules. We will write a custom essay sample on The Chemistry of Organic Molecules or any similar topic only for you Order Now A. Polymers-the largest of the macromolecules. These are composed of numerous, small identical subunits known as Monomers. There are 4 major polymers that are important for living organisms. These polymers are; carbohydrates, lipids, proteins and nucleic acids. B. Polymers are referred to as being organic compounds. Organic compounds are compounds that contain the elements carbon and hydrogen. 1. Chemical Properties of Carbon a. Carbon has 6 electrons. What is the structure of a carbon atom? b. Carbon can form 4 single covalent bonds with other atoms. It also has the ability to form double bonds with some atoms. Overall, the 4 bonds that carbon forms with other atoms makes the carbon stable. This stability is what makes carbon an important component of macromolecules. C. Functional Groups-groups of covalently bonded atoms that have definite chemical properties. 1. These always react in the same way, regardless of what molecule they are a part of. 2. Some polymers have several functional groups. . The exact arrangement of a functional group in a molecule greatly influences and determines the chemical properties of the particular molecule. 4. Important Functional Groups: a. Hydroxyl b. Carbonyl c. Carboxyl d. Amino e. Sulfhydryl f. Phosphate D. The Formation and Destruction of Polymers 1. Dehydration (Condensation) Reactions-reactions in which monomers bond together to produce polymers. a. Water is lost from the monomers in these reactions. 2. Hydrolysis Reactions-reactions in which polymers are broken down into monomers. a. These reactions require an input of water to occur. II. 4 MAJOR POLYMERS IN LIVING ORGANISMS A. Carbohydrates B. Lipids C. Proteins D. Nucleic Acids III. CARBOHYDRATES-includes sugars and related compounds. A. Carbohydrates are composed of three major elements: B. Carbohydrates tend to be very strong compounds due to the presence of carbon-hydrogen covalent bonds. C. Carbohydrates serve as a major source of energy for living cells. Some carbohydrates also serve as structural compounds in living cells. D. 3 Classes of Carbohydrates 1. Monosaccharides-simple sugars a. These serve as monomers for many of the larger carbohydrates. b. Structurally, these serve as rings or chains. c. Types of Monosaccharides 1. Glucose-C6H12O6 a. Serves as a major energy source for living cells. 2. Fructose a. Isomers-compounds with the same atoms and the same number of atoms but, that have different structures. Glucose and fructose are isomers of each other. 2. Dissacharides-sugars that are composed of 2 monosaccharides that are covalently bonded together. These are formed by dehydration reactions. a. Types of Disaccharides 1. Sucrose 2. Lactose 3. Maltose 3. Polysaccharides-sugars that are composed of more than 2 monosaccharides that are ovalently bonded together. These are often very large molecules. a. What types of reactions are these formed by? b. Types of Polysaccharides 1. Starch-a stored form of glucose in plant cells. Plants can use starch for energy under times of need or stress. Amylose is a common starch. 2. Cellulose-makes up the cell wall of plant cells. This is a thick, protective polysaccharide. Many animals do not contain the needed enzymes to break this compound down. Deer, cows and a few other animals have special bacteria in their stomachs that help digest and breakdown cellulose. 3. Glycogen-the storage form of glucose in animal cells. Many animals can convert glycogen into glucose under times of need or stress. This glucose can then be used as an energy source. Glycogen is stored in the liver and in some muscle fibers. 4. Chitin-a structural polysaccharide found in fungi and insects. This is also a thick, protective compound. IV. LIPIDS-includes fats, oils and waxes. A. All lipids are insoluble in water. 1. What does this mean? B. Functions of Lipids in Living Organisms: C. Structure of a Typical Lipid 1. Lipids are composed of 2 major components: . Glycerol-a 3 carbon alcohol. 1) Hydroxyl groups bond to each of the carbon atoms in glycerol. 2) Glycerol serves as the major backbone unit for most lipids. b. Fatty Acids 1) Three fatty acid molecules attach to glycerol to form a lipid. Each fatty acid replaces the hydrogen atom on the hydroxyl groups of the glycerol molecule. Due to this, there is one fatty acid bonded to each carbon atom of the glycerol molecule. a) Due to this arrangement, lipids are often referred to as triglycerides. 2) Saturated fats-occur when the fatty acid groups contain single covalent onds between their carbon atoms. There are no carbon to carbon double bonds in these. a) In other words, the carbon atoms are saturated with as many hydrogen atoms as possible. b) These are known as animal fats are solids at room temperature. c) Are these bad for us? 3) Unsaturated fats-occur when fatty acids contain double bonds between their carbon atoms. These are often referred to as vegetable oils. a) Polyunsaturated fats- b) These types of fats are liquids at room temperature. D. Types of Lipids 1. Phospholipids-contain only 2 fatty acid tails. These are found in cell membranes. They have hydrophilic heads and hydrophobic tails. 2. Waxes-serve as protective coverings over surfaces. 3. Hormones-chemicals that regulate the growth and functioning of living organisms. 4. Steroids-there are several different types of steroids: a. Cholesterol-common steroid. 1) Humans do need a small amount of cholesterol for: a) The formation of Vitamin D b) The production of estrogen and testosterone 2) Cholesterol is carried through the human body by 2 proteins that are found in the human bloodstream: a) Low-density Lipoprotein (LDL)-this protein is responsible for elivering cholesterol to body cells and tissues where it is needed. This is often referred to as the â€Å"bad cholesterol. † b) High Density Lipoprotein (HDL)-this protein removes cholesterol from cells and tissues and transports it to the liver where it is secreted into bile. This is usually known as â€Å"good cholesterol. † 1) Bile-compound that is secreted by the liver that aids in digestion. Bile is also a waste product that is excreted from the body. It contains fatty wastes and it is excreted via feces. 3) Cholesterol in the human diet comes only from animal products. ) Normal Cholesterol Readings in young individuals should be around 180mg/dl. This rises to 230-250 mg/dl as humans age. 5) An important issue relating to cholesterol is the LDL/HDL Ratio. a) A high HDL values ensures that cholesterol is removed from body tissues in an adequate fashion. b) A low HDL values indicates that cholesterol removal is not occurring as it should. c) If cholesterol is not removed from the body, it can form plaques or deposits in the arteries of the body. This is a major cause of heart disease and heart attack. 6) How can an individual increase their HDL levels? b. Anabolic Steroids 1) These steroids are thought to increase muscle mass. 2) Side Effects of Steroid Use Include: c. Not all steroids are bad. Some are used to treat allergies and other human illnesses. These steroids do not cause the side-effects mentioned above. V. PROTEINS A. Functions of Proteins in Living Organisms 1. Make up cell membranes 2. Make up enzymes- 3. In collagen-protein that provides strength and support to structures in the body. 4. In keratin-a thick, protective protein. 5. Transport-some protein carry various materials through the body. An example would be hemoglobin. 6. Defense-proteins are in antibodies. 7. Proteins make up the contractile portion of human muscle. The major contractile proteins are actin and myosin. B. Proteins are found in and are essential for both plants and animals. C. Protein Structure 1. Proteins are composed of many amino acids that are bonded together. 2. Peptide Bonds- 3. Chains of bonded amino acids are often referred to as polypeptides. 4. What attaches amino acids together? 5. Amino Acids-there are 20 naturally occurring amino acids. They can bond in a variety of sequences to produce proteins. a. General Structure of an Amino Acid: . Some common amino acids include: phenylalanine, tryptophan, asparagine 6. Proteins can occur as simple chains or they can exhibit complex structures. 7. Denaturation- a. What can cause denaturation to occur? VI. NUCLEIC ACIDS A. These are composed of nucleotides that are covalently bonded together. What forms these bonds? B. Individual Nucleotides Contain: 1. A 5 Carbon Sugar 2. A Phosphate group 3. A Nitrogen-containing base C. Types of Nucleic Acids: 1. Deoxyribonucleic Acid (DNA)- 2. Ribonucleic Acid (RNA)- 3. Adenosine Triphosphate (ATP)- 4. Coenzymes- VII. MACROMOLECULES AND THEIR MONOMERS How to cite The Chemistry of Organic Molecules, Essay examples

Saturday, December 7, 2019

Models of Cloud Computing-Free-Samples for Students-Myassignment

Question: Discuss about the "Advantages and Disadvantages of Cloud Computing for Businesses". Answer: Introduction Globally, business have incorporated Technology in their business operations with aim of making service delivery more dynamic (Truong 2010, p. 5). To organizations which have already adopted Technology, they have gained competitive advantages compared to their competitors. In current business world, many of the advanced organizations have changed their scale on Technology. They have gone a step ahead to adopt a more dynamic technology such as cloud computing technology which facilitates storage of data in the space. Similarly, other services such as application can be offered from the space without necessarily installing them on the client machine or a workstation. In view of the services offered online by some companies, cloud computing has become so reliable by many of the organizations which feel storing data on their own is quite delicate and expensive (Krutz Vines 2010, p. 20). Despite many advantages from adoption of cloud computing, there are still some drawbacks which organi zations find challenging when planning to invest in cloud computing. It would be quite important for organizations to research and evaluate on type of business services which would be offered from cloud before opting for the service. Project Objective The main goal is to determine if organizations benefit from cloud computing investment. It has to focus on evaluating whether cloud computing offers benefits to all business irrespective of their size and determine if there is a major beneficiary in cloud computing between customers and service providers. Project scope This project involves evaluation of the advantages and disadvantages of cloud computing to businesses. It covers advantages that various businesses have realized by adopting cloud computing in their daily operations. Google Inc, Zappos and IBM are some of organizations that would be used to evaluate the context of the project. It has to evaluate benefits and disadvantages as they are realized by both customers and service providers. Literature Review Businesses that have adopted cloud computing services in their operation has following benefits; IBM has realized substantial benefits because its customers are able to deliver quality IT services. According to Marston et al (2011, p. 78), through cloud computing, Technological services are delivered smoothly to various customers efficiently and from the globe. In addition, IBM realized how cloud computing could help in enhancing ways in which it can meet organizational Technological resource demand. In turn, IBM has gone an extra mile in implementing successful cloud computing in its business operations. It is quite interesting to have IBM praising how cloud computing has helped it to respond effectively to its organizational customer needs. In one of the interesting scenarios, through cloud computing, IBM has been able to offers to its esteemed customers flexible and very scalable solutions when demands of services has been high such that, organizational IT staff cannot meet custom er need due to high demand of the a given product (Armbrust et al 2010, p. 45). Through implementation of cloud computing, IB has been able to offer servers with high storage and networking capability with a short period of time compared to previous experience when there was no cloud computing services. Moreover, it is through cloud computing that, IBM has been able to improve on its productivity services from European benchmark center. The center has been used by customers to test if provided IT resources work as expected by international standards. Through European benchmark center, cloud computing has reduced selling cycle time and has resulted to increase in center capacity (Hofmann Woods 2010, p. 23). Hence, high profit margin from IBMs increased business activities. In other IBM research centers such as Watson and Zurich, cloud computing has been a major tool in scheduling and completing more than expected projects. With help of cloud computing technology, IBM has been able to provide requested research software within short period of time and in many remote locations. In return, IBM has evidenced better utilization of resources, consolidation of capital budgeting within organization and increase in scale of production (Sultan 2010, p. 56). Further, in current diverse busines s environment, cloud computing is known to improve business value since IT specialists and professionals can give out a lot of their time in strategizing on how to increase the value of IT services in their business. Through cloud computing, it is possible for organizations to liberate liberates its services that it used to do before discover of cloud computing services. Truong (2010, p. 63) asserts that, it is only through cloud computing that, it has been possible to avail some IT applications and their related infrastructure in a more dynamic way despite location of the customer. Increase in service delivery has been due to ability to initiate tasks that can help in creating, configuring and adding extra computing power in order to support IT organizational business service delivery. As a result of enhanced service delivery, it increases customer delivery trust making it easy to enhance market coverage. Consequently, according to Aljabre (2012, p. 102), cloud computing has demonstrated ability to promote Technological optimization which helps in configuring IT resources more effectively while organization cost-benefits. IT resources optimization has been made possible due to the fact that, cloud computing has ability to support high business scalability while meeting any period of high demand. At the same time, it has to be so flexible to avoid underutilization of available IT capacity. It has been possible to regulate IT resource utilization by worldwide through use of cloud computing. As most of business realize the importance of cloud computing, it is would be good to make sure they achieve resilient. In this regard, IMB has gone an extra mile in offering cloud validation application which is used to confirm the resiliency of any organization offering its services through cloud computing. Through use of IBM validation program, customers are able to identify and partner with verif ied service providers that have undergone rigorous evaluation on their capability to offer services (Leavitt 2009, p. 12). This makes cloud computing customers get quality service with all expected benefits from cloud computing. Finally, data storage in cloud computing services has proved to be very secure since there are no risks that can be associated employees deleting or tempering with stored organizational data. In relation to organizational data security, data availability is assured all times by the service provider through cloud computing (Truong 2010, p. 71). Security is a duty to the hosting company and it has to guarantee its customers no data risk would be encountered and privacy of the information would be at the topmost priority. Cloud computing has become norm of the todays business due to competitive advantage that many of the organization has been reaping. After some of the companies analyze how peer companies have successfully employed cloud computing in their business operation, they have been forgetting there are still consequences that are associated with cloud computing. First, data stealing has been a major issue that organizations implement cloud computing has been faced with (Dikaiakos 2009, p. 10). It has been evidenced that, number of internet users has increased substantially probing system attacks through viruses, worms and cyber terrorists. A good example was witnessed in Google Inc, where there servers were hacked. It has been observed that, adopting cloud computing has become one of the highest rated issue in cyber security. This has become a major concern since service providers are faced with challenge of securing other organizational data. Some of the areas which has been of interest by m any organization include; organizational databases, systems operating and transaction (Abadi 2009, p. 33). In a different scenario, Zappos Company was affected by cyber theft where over 24 million account details were stolen including credit card information. It is very clear that, data stealing has been a major issues in the cloud computing because some of service providers cannot guarantee safety of their customers data. Similarly, according to Jensen et al (2009, p. 201), malware Injection Attack has been so widespread where organizational systems has been compromised by hackers. This has been common to organizations hosting their services on the cloud. In normal circumstances, hackers target organizational hosted application by finding out on their vulnerabilities then change their normal way of business operations. When a vulnerability is identified on cloud hosted system, an application is created to help in injecting malware in subject organizational services. Through such activities, the hacker is able to have control of the data or listen to sensitive data flow flowing through organizational communication channels. When hackers gain access to organizational servers, they try to compromise data or take control of the entire organizational data resulting to system unavailability. From Google Inc instance, the attacker gained access to organizational database and copied all sensitive information such as credit card numbers and clients account details. A lot of sensitive data went to the wrong people due to use of cloud computing technology without proper security implementation (Lawson, Wolthuis Cooke 2010, p. 97). Therefore, before any organization can opt to venture on cloud computing services, it is important to analyses if there is enough security to host their data. Some of the scripts that are mostly used by hackers to gain access to organizational cloud systems include; HTML and VBScripts. Additionally, cloud computing has been blamed by many organization due to its inability to have data privacy. Cloud computing makes data available to all organizations in unencrypted form. The problem of data privacy has been complicated by lack of lack of system control and failure to follow regulation set to offer data protection (Subashini Kavitha 2011, p. 109). It has been a common norm that, many of organization upload their data to cloud in order to share without knowledge of issues that might be caused by data privacy and confidentiality. Rules of data confidentiality and privacy holds that, personal and organizational information has to be safeguard from unauthorized access in order to maintain secrecy of operation and conducting business. In cloud computing, privacy has been a major issues since organizations do not know where their data is stored, who has control over it and what has been happening on it. Besides data privacy, there has been Denial of Services (DoS) which has become another issue on service availability offered by cloud computing service providers. Through use of various types of attacker, hackers make cloud services inaccessible to certain organization by bringing all its services down (Krutz Vines 2010, p. 263). One of the common known DoS has been on network level where organizational network is completely taken down by sending a lot of traffic to the servers to make them inaccessible. The main target of the hacker is to overload the server such that it cannot provide service requested by the customer. Consequently, in the era where technology is becoming obsolete so fast, cloud computing technology and infrastructure has been changing so fast forcing organizations to incur a lot of cost to overhaul current data centers. In reference to research done in 2007, it was found that before 2012, most of organizations would be required to modify their data centers in order to keep in with required cloud computing technology (Kaufman 2009, p. 58). These changes are getting their way in to the market due to; users increase in demand where almost entire technological society is in need of having real time data access and in a secure computing environment. High customers expectations have resulted to creation of data centers that IT administrators are not able to meet their requirements. Finally, most of data centers are composed of different collections ranging from Operating System that support entire cloud computing applications, hardware and other application systems that have accumulated for several years without update. This scenario gives rise to high demand of having so many system images without knowledge of IT administrators. Buyya, Beloglazov Abawajy (2010, p. 14) argues that, with this complex system within an organization, it may require technical staff in order to be able to troubleshoot issues that may arise form data centers as well as reduce risks that are associated with outages of required services by customers. Increase in amount of services being offered by cloud computing providers, more services are still getting their way into the cloud. This is increasing demand of services from various users who are using different devices and operating system resulting to increased data management. Conclusion To customers who have opted for cloud computing, they have gone ahead to dump other costly operational systems since with cloud services, they are able to incur very minimal cost of managing the system when compared to inbuilt systems. With cloud services being accessible from anywhere and anytime, organizations are able to reduce expenses incurred while hosting many employees in offices since most of the offered services can be managed from single computer from individual home. This has been made possible by the fact that, cloud computing services are accessible from anywhere but just click of a button. Lastly, important to remember is that cloud computing has its drawbacks that limits many of the small business from venturing in it. It would be wise to have a thorough research before investing in cloud computing services. References Abadi, D. J. 2009. Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull., 32(1), 3-12. Aljabre, A. 2012. Cloud computing for increased business value. International Journal of Business and social science, 3(1). Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. Zaharia, M. 2010. A view of cloud computing. Communications of the ACM, 53(4), 50-58. Buyya, R., Beloglazov, A., Abawajy, J. 2010. Energy-efficient management of data centerresources for cloud computing: a vision, architectural elements, and open challenges. arXiv preprint arXiv:1006.0308. Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., Vakali, A. 2009. Cloud computing: Distributed internet computing for IT and scientific research. IEEE Internet computing, 13(5). Hofmann, P., Woods, D. 2010. Cloud computing: The limits of public clouds for business applications. IEEE Internet Computing, 14(6), 90-93. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L. L. 2009. On technical security issues incloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). IEEE. Kaufman, L. M. 2009. Data security in the world of cloud computing. IEEE Security Privacy, 7(4). Krutz, R. L., Vines, R. D. 2010. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Lawson, J., Wolthuis, J., Cooke, E. 2010. U.S. Patent Application No. 12/900,368. Leavitt, N. 2009. Is cloud computing really ready for prime time growth, 27(5), 15-20? Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A. 2011. Cloud computing. The business perspective. Decision support systems, 51(1), 176-189. Subashini, S., Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11. Sultan, N. 2010. Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109-116. Truong, D. 2010. How cloud computing enhances competitive advantages: A research model small businesses. The Business Review, Cambridge, 15(1), 59-65. Zhang, Q., Cheng, L., Boutaba, R. 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18.