Tuesday, December 17, 2019

Dr. Martin Luther King Jr. - 916 Words

Dr. Martin Luther King Jr. left a legacy behind like no man before him; his presence was one that completely reshaped the nation. Through his role in the advancement of civil rights by utilizing non-violent methods, he was able to break down the racial barriers built by prejudice and discrimination. Many of his ideals and principles are timeless. His widespread vision is still applied to resolve many issues in today’s society. The six principals of nonviolence from Dr. King are great tools to resolve many problems like racism, an unequal justice system and a huge financial gap that minorities experience. There is no simple approach to create a world in which men and women of all distinctive races and backgrounds can live together equally in harmony because of their various viewpoints. If such a world is created in our lifetime, it must be accomplished through nonviolence which fabricates companionship and comprehension. It will be accomplished by persons who have the courage to put an end to suffering by willingly suffering themselves rather than inflict suffering upon others. Prejudice and discrimination can only be solved by dismissing the racism, materialism and brutality that has characterized Western civilization progress. By removing these restraints, society can begin to move in a positive direction of a universe of fellowship, collaboration and peace. The criminal justice system creates and supports a racial hierarchy in the United States, and has done suchShow MoreRelatedDr. Martin Luther King Jr.658 Words   |  3 PagesIndividual Project Martin Luther King Jr. Dr. Martin Luther King Jr. inspired myself along with many other nationalities all over the world in so many ways. He was a very courageous and intelligent man who fought so hard for the blacks or African-Americans like myself to have equal rights like the whites or Caucasian people. Just as other civil rights leaders such as Rosa Parks, Dr. King felt that it just wasn’t fair that the black people was segregatedRead MoreDr. Martin Luther King Jr. Essay871 Words   |  4 Pages Dr. Martin Luther King Jr was born in Atlanta Georgia on January 15, 1929. His parents were Reverend Martin Luther King Sr. and Alberta Williams King. Dr. Martin Luther King Jr. and his siblings were guided by the spiritual teachings from their father and attended public schools in Atlanta during their childhood. King and his nine siblings grew up in a financially secure middle class family. They received a better education than the average child of their race, King noticed this and it influencedRead MoreMartin Luther King Jr. Dr. Martin Luther King Jr. is unarguably the most famous civil rights900 Words   |  4 Pages Martin Luther King Jr. Dr. Martin Luther King Jr. is unarguably the most famous civil rights activist in American history. His story and legacy is taught in classrooms across the country. From birth to death, Dr. King impacted the lives of many people and changed the roles of society forever. Dr. King had one big dream and what shaped his dream begins in Atlanta,, Georgia, and ends in Memphis, Tennessee. Dr. Martin Luther King Jr. was born into a loving and caring family on January 15, 1929 inRead More Dr. Martin Luther King Jr. Essay2605 Words   |  11 Pages Martin Luther King Jr. King, Martin Luther, Jr. (1929-1968), American clergyman and Nobel Prize winner, one of the principal leaders of the American civil rights movement and a prominent advocate of nonviolent protest. Kingamp;#8217;s challenges to segregation and racial discrimination in the 1950s and 1960s helped convince many white Americans to support the cause of civil rights in the United States. After his assassination in 1968, King became a symbol of protest in the struggle for racialRead MoreEssay on Leadership Skills of Dr. Martin Luther King, Jr.823 Words   |  4 PagesDr. Martin Luther King, Jr. Abstract This paper will analyze and study the legacy of Dr. Martin Luther King and how leadership skills helped him in accomplishing his goals. The characteristics that made Dr. King a great leader will also be addressed. By studying great leaders, insight can be gained into what qualities they possess. Dr. Martin Luther King, Jr. Dr. Martin Luther King, Jr. was a vital figure of the modern era. His lectures and dialogues stirred the concern and sparked theRead MoreMy Hero: Dr. Martin Luther King Jr. Essay542 Words   |  3 Pagesall portray some kind of heroic abilities. Dr. Martin Luther King Jr. is one the most heroic figures of our time. According to Joseph Campbells characteristics Dr. Martin Luther King Jr. has a characteristic of a hero such as, a hero is usually someone from whom something has been taken or who feels theres something lacking in the normal experience available, or permitted, to members of his society. (The Power of Myth, 1998) Dr. Martin Luther King was a man who yearned for dignity and respectRead More The Rhetoric of Pathos in the Writings of Dr. Martin Luther King Jr.1141 Words   |  5 PagesThe Rhetoric of Pathos in the Writings of Dr. Martin Luther King, Jr. I have a dream, says Dr. Samuel Proctor, Martin Luther King, Jr. Professor Emeritus of Rutgers University. All the little children--you hear everywhere you go: I have a dream. All the little children repeating that speech. Its become like the Star Spangled Banner or the Pledge of Allegiance. Its entered our culture. And so it has: I have a dream has become one of the most memorable phrases of the twentieth centuryRead MoreDr. Martin Luther King, Jr.s Fight Essay1059 Words   |  5 PagesDr. Martin Luther King, Jr.s Fight Throughout history there have been times when citizens have had the need, as well as the responsibility, to violate certain societal rules/laws in order to protest against unjust treatment and bring about social or political change. It began as early as Socrates, who disobeyed an unjust decree against teaching his ideas, which led to his being condemned to death; Mahatma Gandhi’s fight against British rule over India; and Rosa Parks refusal to give up her seatRead MoreEssay about Biography of Dr. Martin Luther King Jr.4067 Words   |  17 PagesBiography of Dr. Martin Luther King Jr. Jan. 15, 1929 - April 4, 1968 Nationality: American Occupation: civil rights leader Occupation: minister (religion) Michael King Jr. was born on January 15, 1929, in the Atlanta home of his maternal grandfather, Adam Daniel Williams (1863 — 1931). He was the second child and the first son of Michael King Sr. (1897 — 1984) and Alberta Christine Williams King (1903 — 1974). Michael Jr. had an older sister, Willie Christine (b. 1927), and a youngerRead MoreEssay on Dr. Martin Luther King Jr and The Civil Rights Movement2125 Words   |  9 PagesMartin Luther King jr. was one of the most influential persons of the 20th Century. He is the father of the modern civil rights movement, Dr. Martin Luther King Jr., is recognized around the world as a symbol of freedom as well as peace. King practiced everything that he preached, he did not preach or speak values that he himself did not follow. He established himself as a pastor that was not afraid of hard work, guiding the middle-class congregation to public service. For example, Peake, Thomas

Monday, December 9, 2019

Nations Rich in Natural Resources

Question: Write an essay on The nations that are rich in natural resources. Answer: Introduction: The nations that are rich in natural resources tend to use its natural resources for the aim to secure funds for the process of development within the country. The governments of the specific countries have to enter into an agreement and contract to develop the existing resources of the country and also to explore them for the betterment of the country. The contract is made between the government of the country and the oil companies of that specified country (chalmers, 2012). Both of the contract holders have to put emphasize on the technical issue and the commercial understanding about the exploration of oil. But in making this contract successful, the first obstacle which the government usually faces is the process of negotiation. Problems of negotiation: Different developing countries and also different developed countries like - mexico, kazakhstan, and bolivia appraise their natural resources of oil and gas as assets or property of the country. These natural resources are not considered as any private property of an entity or individual, though an individual might be the owner of the surface land or water bodies. The government of the country is the only owner of the underlying natural oil and gas resources, according to the laws of the nations. The main aim of the countries that are rich in natural oil and gas resources is to maximize the participation of oil companies in the country as these companies possess abundant expertise and thus they could properly exploit the natural resources and market them globally (grant, 2012). But at the time of negotiation, these companies face various problems. The reason behind this is that, as these companies are much experienced about the variety of contracts and have greater practical knowledg e regarding the exploitation of natural oil and gasses. The oil companies are highly motivated towards the act of negotiation. Thus, they tend to decrease the costs. This process of negotiation is tailored by the oil companies based on the political condition of the specified country (gustafson, 2012). The process of negotiation of the oil companies is very inflexible, cynical and aggressive. Thus, the contract of negotiation should be done in a proper and systematic way. Development of natural resources: There are three different ways to develop the natural resources of the country by the government; these are as follows Firstly, different foreign companies can be invited by the government of a particular country having its natural oil and gas resources for the exploration and in the process of exploring the government of the specified country should help (hults, thurber and victor, 2012). For example, countries like canada, russia, and united kingdom have applied this methodology. Secondly, for better exploration, the government of a particular country should create new state companies if the government has the capability to invest in establishing new companies (looney, 2012). As this would help the government of the country economically by providing chances of better exploration, much production, and high development. For example venezuela, oman, mexico and saudi arabia have applied this methodology for their economical improvement. Lastly, some countries like nigeria, kazakhstan, and indonesia might apply the combination of both the ways. The parameters of negotiation: The process of negotiation is of high interest for the shareholders. Thus, the size of shareholders is also huge in the worldwide. But the governments show lesser interest or pay lesser interest in the negotiation process. The share holders are more concerned about the negotiation process than the producing countries of natural oil and gasses. Thus, the governments appoints some experts like technical engineers of the related field, lawyers for their legal knowledge in the related field and many more for handling the complex issues (muttitt, 2012). Direct negotiations are done in oil contracts. Negotiations are occurred on indecision as an oil contract is consisted of many complex issues. These types of indecisions are occurred due to the improper awareness of probable oil field, dissociation of the partner of negotiation, or the inability to make predictions of the future. The negotiators who are expert in the field know that the presence of a weak point is common whatever might be the situation, and by using that properly, they get a high chance to win (nikiforuk, 2012). Various types of issues should be considered during the negotiation of the oil contract, these are the costs of exploration, dynamic nature of the existing market, estimated size of the fields and many more, as the list is never ending. To determine the importance of each and every issue of the negotiation of the oil contract, proper judgments and expertise is the most important criteria. As these qualities would help to strike a balance such that the variou s contracts could be made nonidentical to each other. Different issues of the process of negotiation: There are mainly two major types of issues regarding the process of negotiation. These are the zone of conflict and the factors that are not usually paid attention during the process of negotiation. These include the social, political, economical and environmental factors of the specified country. Generally, any particular company spends about 90 90 % time in this particular zone (ross, 2012). This particular zone makes the company to feel that they are in control and thus recruits especially skilled employees. Dealing with indigenous communities: The negotiation of oil is of great importance to different groups of individuals. These individuals might include the surface land owners, indigenous communities and many more. The negotiation of oil is of great important to the indigenous communities because they started to demand for compensation for the usage of their personal property and also for creating disturbance. Formally, these groups are not the main part of the process of negotiation, but still both the principal parties of contracts that is, the governments and the oil companies have to consider their demands in the process of negotiation (larson and smajgl, 2012). Through the process of negotiation, the demands of these local communities are settled down. Their demands mainly composed of offers of jobs or compensation. Thus, the oil companies make commitments that they would provide employment to local peoples in mass as labors and also to give back support in the development process of the local communities. These ne gotiations are heated many times and thus are very time consuming. Time factor: The contracts of oil are negotiated depending on the factors of time responsiveness. These factors include the present political, environmental, social and economical factors in the host country, the probability of variation of these factors in near future, and the current situation of the market regarding the oil price. The terms and conditions of an oil contract should contain the ability to survive the time challenge by the method of anticipation of foreseeable as well as unforeseeable changes and demand. For example, the country norway is known well for its instability, thus, it introduces tax regimes in the favor of the oil companies with the aim to attract the oil companies to invest in the geographical challenging and uncertain terrains (wittcoff, reuben and plotkin, 2013). But norway did not put its future in the endanger by making the rule of taxes permanent and the tax rates were raised within three years. To make the contracts more reactive in the changing world is the on ly way to deal with the problem of insufficient arrangement effectively and efficiently. The stability should be drafted in such a way that the oil companies should be compensated for the various changes of rules and regulations in the law which takes place frequently. The oil companies would not be established in the countries if they have to suffer loss due to the change of laws in the specified country (schwarzenbach, 2012). For example, if a country implements new law regarding the development of the environment, then the cost of the oil companies would increase due to various process of refining the waste materials of the company. This make the company to run in loss, thus, these companies of oil are usually exempted from such developmental laws. And if exemption is not possible by the government, then the government would itself reimburse the compliance cost of the specified oil company. The clauses of stability are used by these companies to get exemption from the application of the rules and regulations of the laws of the host country (guo and ghalambor, 2012). E ven the jurisdiction of the courts of such country is not applicable to the clauses of stability. Expert negotiators: The government of a specified country has to face various problems regarding the selection of personnel who would be the representative of the negotiating team. Negotiation is a process of art, thus, it requires good tactics, effective plan and the capability of segregation of various negotiable factors like compensation from non negotiable elements, such as addressing and consideration of the concerns of the oil companies, and regulation concerned matters (kartashov et al., 2014). It is obvious that, at the time of negotiation with the government of the country, the oil companies are under the guidance of any circumstance in a better situation like finance, skills, and preparedness. But the developing countries which are enrich with natural oil and gas resources do not consist of sufficient legal, financial and technical knowledge. Generally, the negotiations are considered as the one time investment in the developing countries. Therefore, they intend to hire negotiators who are skilled, dedicated as well as independent, such that they could understand the footing of the oil companies (jacobson, 2008). Most of the times the oil rich developing countries overlook the importance of employing expert negotiators for the process of negotiation. The contracts of oil require advice of expert negotiators as they are only capable of covering the broad range of complicated factors. The main focus of a oil contract should be to reach reasonable and agreeable balance such that, the interests of both the government of the country and the investor company get fulfilled (lewicki, barry and saunders, 2011). For making the negotiations successful, the advices of the expert negotiators are mandatory. Conflict of interest: The government of a country faces various conflicts of interest regarding the negotiation of the contracts. The government is acting as a protector of the interest of the public by applying its power of regulation on one hand and on the other, it acts as the signatory to a commercial oil contract as a business personnel with the aim of maximization of profit. The government has to also create a friendly environment for investment, such that the investors are magnetized which would help in creation of employment and also enhance in the growth of economy of the specified country (mannix, neale and overbeck, 2011). Therefore, on one hand, the intension of the government is to maximize its profit from negotiation of the oil contracts and on the other hand to locate objects for its own regulations. In developed countries, this type of problem can be managed but in the developing countries it is hard to manage. Transparency: The objective of the negotiators is to maintain transparency in the negotiation process. The reason behind this is that, to increase the acceptability of the oil contracts by the general public of the country to keep or to maintain transparency is the key element (bayne and woolcock, 2011). Transparency is defined as the disclosure of the contractual terms and conditions and also the consideration paid through certain factors which should remain confidential for a particular period of time in terms of negotiation of oil contracts. Transparency also helps to avoid corruptions which might occur in the oil contracts. It only helps to prevent the officials of the government to accept or implement such terms in these contracts that might cause criticism from the citizens. Types of contracts: The types of contract are an essential matter for the government of the country. The decision regarding the form of contract is the most necessary part of the development of the resources of the country. Generally, the oil companies and the government of the country like to adapt four specific types of contract during the formation of the agreement. These are as follows: Joint ventures: When two or more parties want to enter into an agreement through the undertaking of joint venture, then only joint venture can takes place. Both the parties of the joint venture should understand all the ways by which each of the parties could conduct their business, their interest and also their aims and objectives (ward, 2012). However, if this understanding is not available among the parties of the contract, then it is impossible to come up with the agreement of joint venture. As the joint venture is an open ended contracts, both the governments and the oil companies do not show interest in entering the agreement of joint venture. Advantages: The only advantage the government of the host country can avail is that it does not have to make and take decisions on its own but also it can take help of the experts of the oil company. According to this type of contract, the government of the country has to share its profit with the oil company. Disadvantages: In this type of contract, the government of the host country has to directly take part in the oil extraction process Production sharing agreements: The acronym of product sharing agreements is psa. According to psa, the ownership of oil lies with the citizens of the country and it cannot lie with any of the private entities. Though the cost of operation of the oil field and the management and also the associated risks lie with the oil companies. According to this agreement, the government of the specified country has to reimburse the oil company as operating expenses (orsi, 2012). The taxes which fall under its share have to give by the oil company but the government of the particular country waives these taxes and thus is included in the share of profits of the government. The laws of the country would bring success to the application of psa. Advantages: The oil company bears all the risks. Even any loss would also be bear by the oil company thus there will be no effect on the government. Disadvantages: Psa is an inclusive document, thus its very nature acts as a disadvantage for the government. License: In the year 1900s license was introduced. These are mainly one sided contracts. In the current years, these contracts serve the exclusive rights for development, exploration and sale and export of minerals of the oil companies (progoff, halpern and yang, 2012). For acquiring such rights, the oil companies offer signing bonus. Advantages: These contracts are straight forward, thus it is considerable in developing countries. Disadvantages: The commercial aspect of the contract is the main disadvantage. Risks are associated with the price of license. Service agreements: This type of agreement provides disbursement for particular tasks or services. The main disadvantage of this service agreement is that it cannot be used in long run. Conclusion: The oil producing countries should possess the professional knowledge for negotiation of oil contracts with international oil companies. The process of negotiation should be open at same time. The companies have to make the oil companies feel that they would be treated fairly. The sense of fair treatment and fair return would also prove to be beneficial in the long run for the international oil companies in the large competitive market. References Bayne, n. And woolcock, s. (2011).The new economic diplomacy. Farnham, england: ashgate pub. Chalmers, d. (2012).History of the standard oil company. Dover publications. Grant, t. (2012).International directory of company histories. Detroit, mich.: st. James press. Guo, b. And ghalambor, a. (2012).Natural gas engineering handbook. Burlington: elsevier science. Gustafson, t. (2012).Wheel of fortune. Cambridge, mass.: belknap press of harvard university press. Hults, d., thurber, m. And victor, d. (2012).Oil and governance. Cambridge, uk: cambridge university press. Jacobson, h. (2008).Culture keeping. Nashville, tenn.: vanderbilt university press. Kartashov, m., ignatova, a., fedoseeva, e. And ignatov, m. (2014). Characteristic nonmetallic inclusions in welded joints oil and gas of pipelines.Ogbus, (2), pp.80-94. Larson, s. And smajgl, a. (2012).Sustainable resource use. Hoboken: taylor and francis. Lewicki, r., barry, b. And saunders, d. (2011).Essentials of negotiation. New york: mcgraw-hill/irwin. Looney, r. (2012).Handbook of oil politics. London: routledge. Mannix, e., neale, m. And overbeck, j. (2011).Negotiation and groups. Bingley, u.k.: emerald. Muttitt, g. (2012).Fuel on the fire. New york: new press. Nikiforuk, a. (2012).The energy of slaves. Vancouver, bc: greystone books. Orsi, j. (2012).Practicing law in the sharing economy. Chicago: american bar association. Progoff, s., halpern, m. And yang, j. (2012).Understanding the intellectual property license, 2012. New york, ny: practising law institute. Ross, m. (2012).The oil curse. Princeton, nj: princeton university press. Schwarzenbach, r. (2012).For climate's sake!. ZuÃÅ'ˆrich, switzerland: lars muÃÅ'ˆller. Ward, d. (2012).Contract negotiation handbook. Hoboken [n.j.]: john wiley sons. Wittcoff, h., reuben, b. And plotkin, j. (2013).Industrial organic chemicals. Hoboken, n.j.: wiley.

Monday, December 2, 2019

Threat with Transferring to Cloud Computing Services

Table of Contents Introduction Overview of Cloud Computing Services Types of Cloud Deployment Models Common Threats in Cloud Computing Solutions to Threats Conclusion References Introduction Cloud computing has emerged as a technology that can increase organizational performance by offering numerous competitive advantages to the company. This technology offers distributive IT hardware and software capabilities to a company therefore saving costs that would have been incurred on IT infrastructure. The efficiency of business operations is increased as the organization is able to become more agile and effective by scaling its IT infrastructure.Advertising We will write a custom case study sample on Threat with Transferring to Cloud Computing Services specifically for you for only $16.05 $11/page Learn More However, companies are wary of some threats attributed to cloud computing services. This fear has made some companies hesitant to transfer their data to cloud computing services. This paper will highlight some of these fears and proceed to illustrate how the threats can be mitigated using solutions that are available in the market today. Overview of Cloud Computing Services While the concepts behind cloud computing have been in use for decades, the cloud computing phenomenon has become more prevalent over the last 6 years. Rajnish et al. (2011) define cloud computing as a â€Å"pay-per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service† (p. 1227). It gives organizations access to numerous resources at a reduced cost. Cloud computing provides different services to the end users. The first is software as a service and cloud service providers run this. The services offered by cloud computing include applicati on services which are also known as services on demand. The end user of the cloud computing services uses applications. In most cases, this end user is abstracted from the details of how the application runs behind the scenes. The customers do not own or manage the infrastructure or software (Qaisar Khawaja, 2012). Cloud computing also offers platform as a service. This is essentially a tool used by developers to develop websites without having specialized software installed on the system. Qaisar and Khawaja (2012) state that the application tools make it possible for users to execute programs without any administrative expertise.Advertising Looking for case study on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The final service offered though cloud computing is an infrastructure which is the physical assets. The infrastructure as a service is owned, operated, maintained, and controlled by the cloud service providers. According to Men dhe and Kamble (2012), the infrastructure supports various operations implemented through cloud computing such as storage, routing and networking. Types of Cloud Deployment Models A deployment model is a particular method of delivering a service. There are a number of dominant deployment models used in cloud computing. The first deployment model is the public cloud where the infrastructure is the property of one organization which sells cloud services for the society. Escalante (2010) explains that in the public cloud deployment, a service provider makes massively scalable IT resources, such as CPU and storage capacities, or software applications, available to the general public. The defining characteristics of this model are the public availability of the cloud services and the accessibility of the services by internet. The capital expense for the public cloud is reduced since the provider enjoys significant economies of scale as resources are shared by many end users. Another depl oyment model is a private cloud where the cloud computing services are provided for the exclusive use of one organization. The infrastructure of the cloud computing is the property of the company or it might be rented by the organization for its own use. The services provided are accessible and managed in a corporate network and typically, access to the cloud is limited to one department. Private clouds are mostly implemented by large corporations with multi-location presence (Rajnish et al., 2011). This deployment allows the company to benefit from the resource pooling concept made possible by cloud computing without suffering from the concerns about security, performance and reliability typically associated with public clouds. A major challenge for the private cloud model is that the company will have to buy, build and manage its clouds making it expensive. Cloud computing services can also be deployed using the community cloud model. In this case, organizations that have common g oals or requirements utilize the same cloud infrastructure. Members of the community cloud can be from one or more organizations since these clouds often comprise of groups of individuals and organizations collaborating for the purpose of a particular mission or concern (Wrycza, 2012). The final deployment model is a hybrid cloud. In this case, characteristics of public and private clouds are merged. In the hybrid deployment model, the company makes use of cloud computing services by providing and managing some of its services while the rest are outsourced to an external provider. (Escalante, 2010, p.31).Advertising We will write a custom case study sample on Threat with Transferring to Cloud Computing Services specifically for you for only $16.05 $11/page Learn More Hybrid clouds are implemented in such a way that the organization is able to benefit from the advantages of the public cloud environment while still benefiting from the advantages of the pr ivate cloud. For this reason, the hybrid cloud can be considered â€Å"a private cloud extending its boundary into a third party cloud environment to obtain additional (or non-mission critical) resources in a secure and on-demand manner† (Escalante, 2010, p.69). Common Threats in Cloud Computing There are a number of threats associated with implementing cloud computing. Nkhoma and Dang (2013) confirm that cloud security is the primary barrier preventing most companies from adopting cloud computing. This fear is not unfounded since if the cloud infrastructure is insecure, it could lead to major problems between the company and its stakeholders. The first threat is breach of data confidentiality. In most cases, cloud service providers obtain data storage services from other companies and this exposes the private customer information and data therefore increasing risk of unauthorized access. Another prevalent threat in cloud computing is data leakage and loss. Data leakage is li kely to occur in the cloud environment since data might be moved around servers. Talreja and Sahu (2012) reveal that most cloud servers lease a server from other service providers in order to increase efficiency and reduce cost. While this makes the operations more flexible, it increases the chances that the data will be leaked to other users. Cloud computing increases the threat of data theft through insider and outsider attacks. Rajnish et al. (2011) elaborates that a fraudulent employee may fish and steal data that belongs to the customers of the cloud service provider. Hackers often carry out outsider attacks with the aim of stealing information or compromising the system. Priya and Ward (2013) reveal that information on public clouds may be prone to computer hackers or data brokers who have access to the cloud. This risk exists mostly because the cloud services make it possible to access multiple customers’ information on the same server. Cloud computing also raises the problem of data integrity. When data is on the cloud, it is accessible to many people. If there is no differentiation of sensitive and non-critical data, then everyone will have access to material that might be sensitive (Rajnish et al., 2011).Advertising Looking for case study on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The risk of data loss is more pronounced in cloud computing. Data loss can occur if the cloud provider decides to shut down the cloud because of some problems. The customer data stored in the cloud will disappear and the customer will not be able to access it. Solutions to Threats Back up storage solutions should be used to counter loss of data due to damage of the cloud infrastructure. Priya and Ward (2013) assert that the risk that the system might be damaged leading to data loss is real. The prudent customer should therefore require the cloud computing service provider to have off-site backup services. In addition to this, the provider should have an elaborate disaster recovery and continuity plan that can be implemented in case of a catastrophic failure. Data security can be guaranteed by implementing strict user controls. The business should make use of multi-tiered information classification models to ensure that data is categorized based on its sensitivity level and users are granted different access restrictions. Such an implementation will ensure that the company’s sensitive information is only accessible to a few key authorized personnel (Nkhoma Dang, 2013). Vendors should make use of trusted third party for the verification and approval of user identity, therefore ensuring that unauthorized access is prevented. Companies should negotiate a customer-oriented contract when getting into an agreement with the vendor. Such an agreement should increase the liability of the vendor in case of access or availability issues in the cloud. Priya and Ward (2013) Warns that in most cases contracts between customers and cloud service providers tend to â€Å"favor the vendors, which posses greater leverage over the customer† (p.22). The cloud service provider should use strong encryption standards during data transfers. Encryption ensures that even if data is intercepted by a malicious party, it cannot be read. This offers further protection to the d ata in the cloud and protects it from opportunistic hackers. Mendhe and Kamble (2012) explains that encryption ensures that users can be confident that their sensitive information is inaccessible to unauthorized parties even if they do not know where their input and output data is managed. Data security encompasses physical security of the cloud computing infrastructure. If this security is compromised, data loss might occur. The business should therefore look for a reputable vendor who is well known for providing adequate security. Effective physical security can be assured by providing around the clock surveillance to the site where the physical infrastructure is kept (Nkhoma, Dang, 2013). The vendor should make use of sophisticated security measures such as biometric screening and authentication to ensure that only authorized personnel can physically access the servers. Conclusion This paper has provided an overview of cloud computing and highlighted some of its benefits, includ ing reduced costs and flexibility. The paper has also noted that risks such as data security and privacy concerns and prevent many companies from using cloud computing. Using the solutions proposed in this paper, these threats could be addressed and companies will not fear transferring their data to cloud computing services. The companies will therefore be able to benefit from the numerous advantages that cloud computing brings to the business and experience increased productivity. References Escalante, A. (2010). Handbook of Cloud Computing. NY: Springer. Mendhe, T., Kamble, P.A. (2012). Survey on Security, Storage, and Networking of Cloud Computing. International Journal on Computer Science and Engineering, 4(11), 1780-1785. Nkhoma, M.Z. Dang, D.P. (2013). Contributing Factors of Cloud Computing Adoption: a Technology-Organisation-Environment Framework Approach. Proceedings of the European Conference on Information Management Evaluation, 2(1), 180-188. Priya, D., Ward, C. (201 3). Cyber-Security Threats and Privacy Controls for Cloud Computing, Emphasizing Software as a Service. The Computer Internet Lawyer, 30(3), 20-24. Qaisar, S., Khawaja, F. (2012). Cloud Computing: Network/Security Threats and Countermeasures. IJCRB, 3(9), 1323-1329. Rajnish, C., Rajshree, D., Bhattacharjee, J. (2011). A Survey on Cloud Computing Security, Challenges and Threats. International Journal on Computer Science and Engineering, 3(3), 1227-1231. Talreja, M., Sahu, A. (2012). Security Issues in Cloud Computing. International Journal on Computer Science and Engineering, 4(11), 1863-1867. Wrycza, S. (2012). Research in Systems Analysis and Design: Models and Methods. NY: Springer. This case study on Threat with Transferring to Cloud Computing Services was written and submitted by user Emersyn M. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.