Tuesday, December 31, 2019

The Idea Of Black Holes - 1913 Words

The universe is ever-changing and growing with new galaxies, stars, and planets being formed and destroyed every second. Scientists and astronomers are unable to track and monitor the millions and billions of miles of universe growing constantly. Our own galaxy of the Milky Way is in itself unable to be completely discovered, not even mentioning the galaxies yet to be found. Space is a large, mysterious entity that is full of new places and surprises and one of the most misunderstood phenomena in space are black holes. According to NASA, a black hole is a place in space where gravity pulls so much that even light can not get out. They are packed full of more mass, which is the amount of matter in space, in an area as little as an atom or as large as a big city (Dunbar). Black holes stem from many theories all combined to explain the ever growing universe and its formation. The idea of black holes was first proposed and inspired by Albert Einstein’s Theory of Relativity in 1916 . Einstein bounced off of Planck’s Radiation Law that states that electromagnetic energy is emitted in waves, which is presented as heat and the waves change depending on the temperature. Einstein took this idea and proposed that radiation energy comes in packets not waves, as proposed before (Squires). Einstein expanded his ideas to create a new sect of physics and ideas about how the world works. Einstein’s theory states that the law of physics are the same for all observers not in motion andShow MoreRelatedBlack Holes And Its Effects On Society1253 Words   |  6 PagesSupermassive black holes are so mysterious when it comes to the knowledge we know about them. We still don’t know much about them and there will always be conspiracies about them, but we still need to find more information about them to understand more. Black holes are developed when a star’s core collapses and then mass is getting eaten by the core which leads to the star to die in a s upernova explosion. This can go two ways, one is that the star turns into a neutron star, and the second is it turnsRead MoreWhat is a Black Hole?803 Words   |  3 PagesBLACK HOLES Imagine this: no light, no sound, total pitch black darkness. Once you’re in this location, you can never leave. This is what most people envision when they think of a black hole. As for myself, I think of a super-sized vacuum cleaner and the text book confirms my analogy of a vacuum. The boundary of a black hole is called an event horizon and anything that crosses it gets trapped in the black hole (Fix, 2011, p. 489). Once the vacuum sucks an item up, it is gone forever, never to beRead MoreBlack Holes: Forces of Gravity Essay1524 Words   |  7 Pagesbelieving black holes are the major precipice to these greater understandings. Black holes push and break many modern understandings of physics and time with many mysterious qualities. Insuppressible forces of nature, black holes, are a little understood entity in our universe with a strong influence on modern science. Despite modern culture and its influences on the unknown, a black hole is not a well understood concept even by the greatest of minds. Robert Prigo describes a black hole as â€Å"†¦ a regionRead MoreEssay on The Existence of Black Holes1308 Words   |  6 PagesThe Existence of Black Holes I have always had an interest in science, especially in the sciences regarding outer space. When I was younger I was always fascinated with rockets, and especially in stars. I have often regretted not pursuing this interest at its infancy. I do remember going to the Planetarium, and studying about a topic that I had seen talked about on television. The topic was black holes, and back then all that they knew was that they were black. The idea of a space in the universeRead More Black Holes Essay1537 Words   |  7 PagesBlack Holes   Ã‚  Ã‚  Ã‚  Ã‚  Every day we look into the night sky, wondering and dreaming what lies beyond our galaxy. Within our galaxy alone, there are millions upon millions of stars. This may be why it interests us to learn about all that we cannot see. Humans have known the existence of stars since they have had eyes, and see them as white glowing specks in the sky. The mystery lies beyond the white glowing specks we see but, in the things we cannot see in the night sky such as black holes.   Ã‚  Ã‚  Ã‚  Ã‚  BeforeRead MoreUnderstanding Black Holes Essay1070 Words   |  5 Pagesthere is one object that stands to elude scientists still, the black hole. Albert Einstein, and all the brilliant scientists after his, help to design and create a part of the universe that’s very crucial to understanding existence. The perimeters of a black hole have been a great this that has been discussed and observed to the point where it eventually becomes clear as its compared to objects around or like it. The physics of the black holes existence is still unclear for it shows properties that supportRead MoreBlack Holes : A Black Hole926 Words   |  4 PagesBlack holes should probably not be called black holes. In fact, black holes are anything but empty space. Black holes are a great amount of matter packed and squeezed into a very small area. The result of this amount of matter squeezed into a small area results in a gravitational field so strong that nothing, not even lig ht, can escape. Scientists do not have the ability to directly observe black holes with telescopes that detect x-rays, light, or other forms of electromagnetic radiation. HoweverRead MoreEssay about Black Holes1025 Words   |  5 Pages Black Holes Within our galaxy alone, there are millions upon millions of stars. Within our universe, there are millions upon millions of galaxies. Humans have known the existance of stars since they have had eyes. Although interpretations may have differed on what they were, they were always thought of as white glowing specks in the sky, but the mystery does not lie within what we can see, but what we can not see. There are billions of stars lighting the darkness of our universe, but the questionRead MoreThe Wonderous Mystery of Black Holes1668 Words   |  7 Pagestheories helped predict that black holes actually occupy the universe vastly (Wiki authors). Because black holes are virtually invisible to the human eye, since not even light can escape their clutches, it is hard to understand something that can’t be seen or even assume it exists. Though the concept of black holes can be traced back to 1795, to Pierre Simon Laplace, who originally proposed the idea. It was Karl Schwarzchil d to be the first to start proving black holes exist from the research ofRead MoreA Brief History of Time Summary Essay1371 Words   |  6 Pagesprinciple, elementary particles and the forces of nature, black holes, and the origin and fate of the universe. The first chapter, our picture of the universe, Hawking gives a small amount of background information pertaining to how the current picture was developed. Aristotle, one of the first scientists to live on in infamy, believed the Earth was round; however, he also believed in a geocentric solar system. Ptolemy, agreeing with Aristotle’s ideas, created a planetary model describing the position

Monday, December 23, 2019

Elkhatib 9. Suzanne Elkhatib. Standardizing Academic Failure.

Elkhatib 9 Suzanne Elkhatib Standardizing Academic Failure In an effort to determine the quality of an educational institution, from the quality of the educators to the outcomes of the curriculum, standardized testing was introduced. The intention of evaluating the quality of education was to make certain that all students received an adequate education and that all educators were held accountable to their students. Extensive research was conducted to determine the criteria that would be evaluated including the types of learning outcomes that were expected for each grade level, what demographics information would be assessed, and how to rank the schools and educators based on the results. While much of this information has been gathered†¦show more content†¦In fact, â€Å"skeptics have begun to wonder if the effort to raise standards for all students through high-stakes testing initiatives has too steep a price, including a narrowing of the curriculum and a deemphasis on curricular depth, an abandonme nt of constructivist-type activities that give meaning to learning, and a curtailment of extracurricular activities† (Moon, Callahan, and Tomlinson 1). Limiting the educators’ autonomy prevents them from being able to evaluate the needs of each student and structure their classroom and lesson plans in a manner that will help all of the students to gain the best possible outcomes in their academic careers. Students have different styles of learning, varying family structures and support, as well as different interests that can all effect how they learn. Standardizing the classroom removes the educators’ abilities to use their training to address these differences. Notably, standardized testing was once used to provide educators with an additional tool in this process of individualizing the curriculum. Researcher, Alfie Kohn, notes that these tests were often used to determine what classroom a student should be placed in so that they could be matched with an educat or and curriculum that would help them to progress towards their next level of academic success rather than to be used as a ploy to hold them

Sunday, December 15, 2019

Policy makers and implementers Free Essays

Between policy makers and policy implementers serve any useful function today in USA? Early donors to the expansion of public administration accredited a policy function for administrators that have often been overlooked yet the politics-administration dichotomy that is a fraction of the conventional archetype frequently incorporates the thoughts of accountability and responsibility– even though the archetype can be articulated in traditions that seem to prohibit these qualities by depicting administration as automatically instrumental–but the stress on a firm dichotomy of politics and administration will not lodge the policy responsibility of administrators that has come to be extensively renowned. There are several motives why the dichotomy design has continued. It is expedient to give details the separation of functions in conditions of entire separation as it is easier to elucidate than a model founded on sharing functions, predominantly because the partition model does not bound the genuine policy offerings of administrators in practice. We will write a custom essay sample on Policy makers and implementers or any similar topic only for you Order Now At the same moment, the dichotomy idea defends administrators from inquiry and provides the benefit of elected representatives who can pass liability for disliked resolutions to administrators. According to Miller (2000) sees dichotomy as a â€Å"helpful myth† for the reason that it difficult to understand the pressure of administrators to limit efforts by politicians in control to incline the accomplishment of policies and channel paybacks toward themselves. Fractional editions of the dichotomy continue. Researchers view the attempt to disconnect politics from administration as producing a dichotomy and tag the importance on hierarchy, authority, structure, and top-down accountability the Wilsonian ritual in public administration. There has been found reinterpreted dichotomy that allows a policy-making function for the executive but still assists managers oppose the forces of particularism. Recognizing that administrators disjointedly form policy behind the scenes resigned policy sway and hierarchy. (Van Riper, 2002) In addition, it should be documented that the notion of the firm dichotomy does have a chronological basis in the United States, yet it was not the normative model anticipated during the naissance period of American public administration. A finishing basis for the determination of the dichotomy is the deficiency of a substitute model. To keep away from slipping back into the observation that public administration commenced in dichotomy but stimulated into broader functions, it is accommodating to have a substitute understanding. There has been an embedded crucial model for political-administrative associations from the start, and this model is imperative for knowing the existing and prospect function of public administration. The complementarity of politics and administration is founded on the principle that elected officials and administrators adhere together in the frequent pursuit of sound governance. Complementarities involve split fractions, but fractions that approach together in a reciprocally compassionate manner. One supports the other to generate a complete. Complementarity influences interdependence alongside separate functions; conformity along with sovereignty; admiration for political control along with an assurance to form and execute policy in ways that endorse the public concern; reverence to elected incumbents along with obedience to the law and maintain just electoral antagonism; and positive reception of politics along with support for proficient values. The concern is not whether public administrators are â€Å"influential or usurpative† (Friedrich, 2004)–the regular dichotomy against non-dichotomy choices–but how they are both mechanized and donors to the political progression, that is, involved and constitutive. Complementarity involves enduring contact, mutual sway, and mutual reverence between chosen officials and administrators. Administrators assist to figure policy, and they present it precise content and connotation in the procedure of execution. Chosen officials watch over execution, investigate explicit criticism about reduced recital, and effort to correct troubles with presentation through fine-tuning. Privatization through constricting out breaks the discussion and substitutes it with agreement requirement and fulfillment reports. Paradoxically, constricting out intimately approximates the stipulations of the dichotomy model, as do recital indentures, and highlights an essential restriction in this sort of approach. if not it is aloof for services that can be suitably distinct without ongoing extensive based administrative contribution and properly conveyed without unremitting political omission, the firm separation of policy makers and service deliverers can inferior the superior ity of governance. In disparity, with broad relations, the information and values of those who do the continuing job of government harmonize the acquaintance and values of those who eventually set the route for government and make certain that it stays on track. The complementarity of politics and administration clutches that elected officials and administrators–both in ordinary contact with citizens– require and facilitate each other in a corporation for governance. Dividing the cohorts or distorting the association in one way or the other means that a main donation is absent. If one persists to acknowledge the straightforward notion that public administration commenced as disconnect influential body restricted to a contracted sphere of activity, one does damage to the precedent and one dashes the jeopardy of legitimizing a proper dichotomy of policy configuration and constricted service delivery. References Friedrich, C. J. 2004. Public Policy and the Nature of Administrative Responsibility. Public Policy 1: 1-24. Miller, Gary. 2000. Above Politics: Credible Commitment and Efficiency in the Design of Public Agencies. Journal of Public Administration Research and Theory 10(2): 289-327. Van Riper, Paul P. 2002. The Politics-Administration Dichotomy: Concept or Reality? In Politics and Administration: Woodrow Wilson and American Public Administration, edited by Jack Rabin and James S. Bowman, 203-18. New York: Marcel Dekker. How to cite Policy makers and implementers, Essay examples

Saturday, December 7, 2019

Risk of Cyber Security in the Business-Free-Sample for Students

Question: Discuss about the Challenges in Cyber Security for Business. Answer: Introduction The literature review is the section which provides the secondary data details on the topic of research. The topic of research is Challenges in Cyber Security for Business for which different sources have been used to gain information and data. By Cyber Security we mean the protection of the valuable information and intellectual property of business which is in digital form from theft and misuse. Cyber security is an issue which is increasing in the todays global businesses. As per the US Government, Cyber security is one of the most critical ad serious issues which the businesses are facing these days. This challenge is faced by almost every country these days as the technology is growing and evolving. The coming age of Big Data, Internet of things and automation, the risk of Cyber security is increasing (Pandey, et al., 2016). Project Objective The main objective of the project is to identify the causes and factors which lead to the risk of Cyber security in the businesses. One more objective is to find out what cyber security challenges are present in the businesses. Project Scope The scope of the project is wide. It is because the topic of the research is one of the most critical issues the businesses are facing these days and there is lot to discuss on the topic. The literature review will include various real life examples to set up a clear understanding on the topic. The various forms of challenges and the causes of the same will be discussed by going through various journals, articles and web sources Literature Review AS the globalisation is evolving, majority of risks to business are seen due to technology. Cyber security has become a major challenge for the businesses and is growing at an alarming rate. There are different types of cyber threats like malicious attacks, attacks on networks and network abuse (Choo, 2011). Cyber security can be termed as the techniques used for the protection of businesses and computer systems from the unauthorised access and other cyber threats. As the cyber threats are increasing, the companies should adopt the approaches which help them in fighting with the complexity of the threats. Cyber security is a big issue because it has dramatically strengthened itself in past few years (Hutchings, 2012). According to Kaplan, Sharma Weinberg (2011) 46 per cent of the population of world is connected to internet which increases the chances of threats and cybercrime. Cyber security is a bigger issue now and it has been proved by conducting research on 25 global companies and the results shows so. The research found four common trends which includes that the digital data has become more widespread. It is also found that the corporations are now more open as compared to before. It also shows that the supply chains now are interconnected and that is how the attacks on technology are increasing. While technology is helping businesses to bring innovations in business, it is also creating so many threats for the businesses. The cyber security in business faces many risks in present business environment which are explained below: Ransomware It is the latest risk which prevents the users from accessing the significant information on their systems until they make a payment to the cyber criminals. The criminals tried to make more money once they were able to attack a user. The Internet of Things (IOT) The cyber criminals could make an access to the sensitive information contained by the user in their systems and this is a major privacy threat to the users. As per McAfee Labs 2017 Threats Predictions, around 1.78 million of devices will be in the hands of consumers and it will give more chances to hacking (Barclay Simpson, 2017). Social Engineering Social engineering involves manipulating the individuals to reveal their significant data and the information through the techniques of phishing. As per the data in recent year, these incidents have increased by 65% in 2016 as compared to 2015. Mobile Malware As the mobile usage is increasing day by day for the business tasks, there is more opportunity given to the cyber criminals to identify the weaknesses in the technology. As per the Kaspersky Lab, the attacks of mobile malware have tripled between the years 2015 and 2016. Fake Advertisements and Feedbacks The consumers nowadays are getting lots of advertisements at online platforms in which most of them are fake. These are phishing activities which affect the businesses and the consumer security measures (Barclay Simpson, 2017). In the opinion of Elmaghraby and Losavio (2014), many challenges are emerging due to the excessive use of technology. There are many instruments which are used in the businesses nowadays for making their operations easier but in return they face concerns such as privacy and this may affect their routine operations. Similar to this Tiwari, Bhalla Rawat (2016) suggests that Cybercrime has become inescapable because the sharing of networks and information has become so common in businesses. Cyber security is a mechanism which protect the computer systems and equipments from the unauthorised access. This will have positive impact on society and businesses. The typical cyber threats by which the business should be aware of includes Botnets, Malwares, Hacking, Phishing, Spam, Virus, Worms, etc. The author adds that Cybercrime have severe disruption in the businesses. It is a crime against business (Nojeim, 2010). Cyber security is when the properties or information of businesses are protected from the thefts and risks. Cyber security also provides some of the prevention tips to save itself from cybercrime. The users are advised to keep the defence systems up to date and to make sure that the systems are safe and secure. The users are advised to choose strong passwords and have security checks at regular intervals. The unfamiliar mails should not be touched and safe browsing should be encouraged. It can be said that in the modern era where technology plays a main role, cybersecurity is encouraged to have security from the cybercrime. Security has become a major concern and it should be taken as an integral part of the industry (Basamh, Qudaih and Ibrahim, 2014). In the opinion of Deore Waghmare (2016), Security of cyber information has become one of the greatest challenges across the world. Internet nowadays is used in almost each and every industry like ecommerce, communications, finance, banking and many more and this increases the chances of cyber-attacks for stealing the important data and information. Cyber security plays an important role in the ongoing development of IT. The cyber security faces number of challenges in fighting with the cybercrime. One of the main challenges is heavy dependency on Internet and Communications technology (ICT). ICT is nowadays used in businesses on a large scale and is a part of everyday life. This gives more chances to the attacks on the networks and infrastructures. The second challenge can be the increase in the number of users (Abomhara, 2015). As the popularity of internet is growing, the users are increasing cross the world and the number of targets for the attackers is also increasing. The third challenge is availability of devices and access to those devices. If an offense is to be committed it needs devices for the purpose. Software tools are available easily which contributes in promoting the cybercrime. This encourages the criminals to commit such crimes. The next challenge can be the availability of information. There is millions of webpages on the internet and it contains updated information. So the offend er targets the ones which have weak password protection systems and access the information. That information might be used for the wrong purposes which could cause serious security issues to the business. Another challenge is lack of mechanisms of control. In every communication network, there is a need of central administration to ensure the operability. There is a need of laws, governance and standards which can have certain degree of control on the networks. The international dimensions of the business also create a challenge for the security of information and networks. This affects the cyber security in different nations (Wright, Dawson and Omar, 2012). Automation is a challenge for the cyber security of business. ICT has the ability to automate the processes and it also has many consequences. Automation can provide opportunity to the offenders to send spams in bulk and attack thousands of the systems in hours. Spams may be a serious issue in the developing countries and many victims can be created. Availability of resources and speed of data and exchange. The speed of data exchange has led to the fastest exchange of cybercrime. It takes few seconds for the criminals to exchange emails and viruses. Another challenge is anonymous communication where the origin of communication is not known. Because of this, the identity of the offenders is difficult to make. Like they can use fake email ids and offend the privacy of the secure information (Clemente, 2013). As per Babate, et al. (2015), the lack of leadership is also considered as one of the major challenges of cyber security. Security is maintained when there is a trust maintained between technology and people using it. So, leadership is needed to handle the challenges and issues occurring because of technology and people. Collaboration needs to be maintained which helps in meeting challenges of cyber security. People are needed to be educated so that the security can be maintained by the cyber security cells. It is seen that the people are not getting enrolled in the courses of cyber security which is creating more challenges. When people will be educated in this course, they will be able to handle the issues of the industry of Australia. The cyber-attacks have been increased in the last few years and for that a framework needs to be created. This framework should include the roadmap which could bee adopted to fight the challenge of fighting the cybercrime. There are some of the long term challenges which affect the cyber security efforts taken by the industry (Fischer, 2016). These challenges include the lack of proper designs of security systems, the lack of incentives which are given to the cyber criminals. That is why; they look out for an easier option and go for cybercrime. Also the lack of consensus from all the stakeholders creates problems for the cyber security cells (Gharibi and Shaabi, 2012). Government has taken various steps to meet the challenges of cybercrime. These include the monitoring systems and security of network. The government have taken steps like drafting the cyber security law for facing the risks of cybercrime. The plans are made to design the approaches to meet these risks. Different countries take different steps to meet the challenges like China has made cyber security laws while US, reforms are developed to improve cyber security. In the corporate world, the condition of cybercrime is getting worse year by year but the steps are planned to be taken to get over this. US have increased their budget of cyber security by 35% which shows that the problem is increasing and will continue in the coming years (James, 2016). As per James (2016), the businesses, government and individuals should double their protection of cybercrime. The average cost of a cybercrime attack is approx. $276000. In USA, it costs approx. $100 billion per year. People lack in knowled ge about cyber security which increases the risks gradually. There are 1404 cyber security vendors in the world and Australia have only 15 out of them whereas the other countries like UK, USA, India, Israel have 76, 827, 41 and 228 cyber security vendors respectively. As per the data given by McAfee 2016 Threat Predictions, in the next five years the volume and type of personal information which is tracked and stored will change. The autonomous systems are the next technology which integrates with operating technology and blend together to solve the issues of cyber security. According to Foreshew (2017), the businesses of Australia are facing the cyber security crisis as there is not enough staff with expertise to face the threats. So, the demand for the cyber security specialists is at peak. This is a real challenge to meet this demand. There is also problem of funding. Where on one other the other countries like USA is spending more than US$200 million on RD investment for cyber security, Australia is lacking in this area. It is currently spending less than $100 million for the same. For cyber security research, the nation could spend and invest more. There is also weak collaboration between the research and industry. Only 3% of the businesses collaborate with the universities and with other research institutes. The situation in the Australian Cyber security industry is Ambiguous. The industry of cyber security is getting funds from the corporations like Common wealth Bank of Australia, Telstra, Optus and more. The government also invests in developing the Australian Cyber Security Research Institute (ACSRI) which provides RD facilities across Australia. There are some universities as well which in collaboration with companies and government helps in developing the cyber security industry of the country (Foreshew, 2017). In Australia, Cyber security is important to be taken seriously as the use of information systems, networks and Internet is more and government should come up with better control systems to meet these challenges. In this, every stakeholder has to play their roles. These include the companies, government and individuals. The individuals should handle the data well at the workplace while the companies should take effective measures for the security of data. They should provide trainings to their workers to handle data well. The government should make regulations and laws which can be proved effective in managing the security of the business (Foreshew, 2017). Conclusion It can be concluded that many techniques and softwares have been developed for handling the cybercrime. For the privacy of data and information of the businesses, cyber security measures have been adopted and the challenges to these measures have been discussed in the literature which is collected through various sources. The literature explains different types of challenges and what all steps different countries are taking to meet these challenges. It is concluded that Energy, Banking and Communications were the top three targets of cyber criminals. But there are opportunities in the coming year as the awareness has been increased for cybercrime. The industry is employing more people for meet the challenges and resolve the issues. It can also be concluded that there are some pillars of cyber security which can resolve the issues of the same. It includes Education and awareness about the matter, planning and preparation about the same in advance, sharing and collaboration to meet the current and future risks and Ethics Collaboration to have professional field of expert. Cyber security is important to the economic future of the country and for the society as well. As thee economy and society will get developed, the cyber security will become more significant to be developed. Good cyber policy is required for the cooperation and creativity in the industry. References Abomhara, M Koien, G M 2015, Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks, Department of Information and Communication Technology. Abomhara, M 2015, Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks,Journal of Cyber Security and Mobility,4(1), pp.65-88. Australian Cyber Security Growth Network, 2017, Cyber Security Sector Competitiveness Plan. Retrieved from https://www.acsgn.com/wp-content/uploads/2017/04/Cyber-Security-SCP-April2017.pdf. Babate, A I, Musa, M A, Kida, A M Saidu, M K 2015, State of Cyber Security: Emerging Threats Landscape, International Journal of Advanced Research in Computer Science Technology, Vol. 3, Issue 1. Barclay Simpson, 2017, The top 10 cyber security challenges for businesses, Retrieved from https://www.barclaysimpson.com/news/the-top-10-cyber-security-challenges-for-businesses-news-801833525. Basamh, S S, Qudaih, H A and Ibrahim, J 2014, An overview on cyber security awareness in Muslim countries,International Journal of Information and Communication Technology Research,4(1), pp.21-24. Choo, K K R 2011, The cyber threat landscape: Challenges and future research directions,Computers Security,30(8), pp.719-731. Clemente, D., 2013,Cyber security and global interdependence: what is critical?. Chatham House, Royal Institute of International Affairs. Deore, U D Waghmare, V 2016, A Literature Review on Cyber Security Automation for Controlling Distributed Data, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2. Elmaghraby, A S and Losavio, M M 2014, Cyber security challenges in Smart Cities: Safety, security and privacy,Journal of advanced research,5(4), pp.491-497. Fischer, E A 2016, Cybersecurity Issues and Challenges: In Brief, Congressional Research Service. Foreshew, J 2017, Australia faces cyber security skills crisis as challenge, Financial Review. Gharibi, W and Shaabi, M 2012, Cyber threats in social networking websites,arXiv preprint arXiv:1202.2420. Hutchings, A 2012, Computer security threats faced by small businesses in Australia, Trends and Issues in Crime and Criminal Justice, (433), p.1. James, C 2016, Cybersecurity: Threats Challenges Opportunities, ACS. Kaplan, J, Sharma, S Weinberg, A 2011, Meeting the cybersecurity challenge, McKinsey Company. Nojeim, G T 2010, Cybersecurity and Freedom on the Internet,J. Nat'l Sec. L. Pol'y,4, p.119. Pandey, S, Shah, N, Sharma, A and Farik, M 2016, Cybersecurity Situation In Fiji,International Journal of Scientific Technology Research,5(7), pp.215-219. Tiwari, S, Bhalla, A Rawat, R 2016, Cyber Crime and Security, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 4. Wright, J, Dawson, M E and Omar, M 2012, Cyber security and mobile threats: The need for antivirus applications for smart phones,Journal of Information Systems Technology and Planning,5(14), pp.40-60.