Wednesday, August 26, 2020

Existentialists: I Am Me, And You Are You :: essays research papers

Existentialists: I Am Me, and You Are You      Existentialists see humankind as people whose one of a kind past encounters build up close to home attributes that set we all apart. This thought can be best communicated in a natural articulation by a celebrated maverick, Tarzan. â€Å"Me Tarzan, you Jane† is at the core of the convictions of the existential iota. This apparently oversimplified articulation identifies with existentialism by driving us to man's independence, directing us to conviction of presence before quintessence and guiding us to the idea of opportunity of decision. These three convictions would then be able to be identified with the characters in the existential essayist Jean-Paul Sartre's â€Å"No Exit.†      At first perusing of this announcement, one notification Tarzan's statement decision. â€Å" Me Tarzan, you Jane† suggests that Tarzan and Jane are not indeed the very same. Rather, they are two unique individuals who lead totally different lives. Tarzan, the Ape Man, is commonly unique in relation to his freshly discovered woman companion. Existentialists would facilitate this line of reasoning to state that since individuals are continuously unique, they can never be the equivalent. They would then contend that each individual is an individual, not a duplicate from a foreordained form. Jean-Paul Sartre additionally depicts his characters as people, not duplicates of one another. Garcin, a fighter who went AWOL, positively carried on with an unexpected life in comparison to the child executioner Estelle.      These individualistic characteristics lead to us by Tarzan's announcement, presently control us to the existential conviction of presence before embodiment. This thought comprises of the conviction that individuals are shaped from their own special past encounters. Tarzan, a desolate kid who was raised by a pack of gorillas, has not encountered the bit of humankind. His segregation from the world is totally inverse from that of Jane's past. Jane, a ladies brought up in the guilty pleasure of the present day, has encountered numerous one of a kind occasions that have made her what she is. Jane can never recognize what resembles to be Tarzan since she can never experience what he has experienced. In like manner, Tarzan, the Ape Man, can never experience what it resembles to be Jane in light of the fact that he can never live through the one of a kind occasions of Jane's past. Sartre likewise gives us characters with exceptionally remarkable foundations. Garcin can never encounter the disturbed past that Inez had and Inez thusly can never comprehend why Garcin should be told he isn't a quitter.      After now understanding that existentialists see individuals as people who have one of a kind past encounters that make them what their identity is, existentialists would now usher us to the idea of each character's opportunity of decision. Existentialists: I Am Me, And You Are You :: expositions research papers Existentialists: I Am Me, and You Are You      Existentialists see humanity as people whose exceptional past encounters set up close to home qualities that set we all apart. This thought can be best communicated in an instinctive proclamation by a celebrated maverick, Tarzan. â€Å"Me Tarzan, you Jane† is at the core of the convictions of the existential iota. This apparently oversimplified explanation identifies with existentialism by driving us to man's independence, directing us to conviction of presence before embodiment and guiding us to the idea of opportunity of decision. These three convictions would then be able to be identified with the characters in the existential author Jean-Paul Sartre's â€Å"No Exit.†      At first perusing of this announcement, one notification Tarzan's assertion decision. â€Å" Me Tarzan, you Jane† suggests that Tarzan and Jane are not indeed the very same. Rather, they are two unique individuals who lead totally different lives. Tarzan, the Ape Man, is essentially unique in relation to his freshly discovered woman companion. Existentialists would advance this line of reasoning to state that since individuals are continuously extraordinary, they can never be the equivalent. They would then contend that each individual is an individual, not a duplicate from a foreordained shape. Jean-Paul Sartre likewise depicts his characters as people, not duplicates of one another. Garcin, a trooper who went AWOL, surely carried on with an unexpected life in comparison to the infant executioner Estelle.      These individualistic characteristics lead to us by Tarzan's announcement, presently control us to the existential conviction of presence before pith. This thought comprises of the conviction that individuals are shaped from their own extraordinary past encounters. Tarzan, a desolate kid who was raised by a pack of gorillas, has not encountered the pinch of humanity. His disconnection from the world is totally inverse from that of Jane's past. Jane, a ladies brought up in the guilty pleasure of the present day, has encountered numerous one of a kind occasions that have made her what she is. Jane can never recognize what resembles to be Tarzan since she can never experience what he has experienced. Moreover, Tarzan, the Ape Man, can never experience what it resembles to be Jane in light of the fact that he can never live through the one of a kind occasions of Jane's past. Sartre likewise gives us characters with extremely one of a kind foundations. Garcin can never encounter the disturbed past that Inez had and Inez thusly can never comprehend why Garcin should be told he isn't a defeatist.      After now understanding that existentialists see individuals as people who have one of a kind past encounters that make them what their identity is, existentialists would now usher us to the idea of each character's opportunity of decision.

Saturday, August 22, 2020

Marketing Mix Paper Research Example | Topics and Well Written Essays - 1250 words

Promoting Mix - Research Paper Example The items are costly. Apple as a brand is viewed as an image for high status and in vogue design. So it tends to be said that however being a market head, Apple contends with itself and dispatches better and improved variants of its own item. Chapter by chapter list Introduction 4 Marketing Mix 5 Product 5 Price 5 Place 6 Promotion 6 Implementation of Marketing Mix in Apple Inc 6 References 8 Introduction Apple Inc is a US based worldwide association occupied with assembling of computerized gadgets and PC equipment types of gear. The organization was established in the year 1976 by the name of Apple Computers Inc and from that point forward it has developed into a mammoth association with an impressive brand picture. In the year 2007 the organization renamed itself as Apple Inc. The organization is by and by recorded on the bourses of the NASDAQ and the New York Stock Exchange. The organization is directly headed by Tim Cook one of the most unique business pioneers of the advanced wo rld. The organization is known for its advancements in innovation and bringing out front line innovation items that are unrivaled by any of its rivals in the market. Macintosh Inc was one of the pioneers in the business that planned PCs like mackintosh (Apple, 2011). The crucial vision of the association is to be an inventive market player that fabricates items that are one of a kind, particular and exceptionally creative in the market. The principle statement of purpose of the association is an apple at each work area. The organization plans to make developments that are straightforward yet rich and are profoundly innovation serious. The company’s mission is to give the best quality and creative items to clients over the globe. The organization plans to be a worldwide pioneer in its item class and has in like manner made a worldwide nearness by having a devoted nearness in practically all the significant economies of the world. The vision and statements of purpose can be to a great extent corresponded with its business techniques that included dispatch of items like I-telephones, I-pad’s that are profoundly innovation escalated and have pulled in an immense consideration from the objective market crowd by goodness of their creative highlights. Showcasing Mix Product Apple Inc has a noteworthy item portfolio contained an enormous cluster of inventive item contributions. Aside from the company’s conventional items like Mac the organization additionally makes a scope of different items including iPod’s, iPhone, and iTunes. IPod’s incorporate convenient music players that have a smooth structure and exceptionally alluring highlights that permits sound just as video records to be controlled by the client. I-telephone is one more advancement created by the association in the worthwhile cell phone section. The special item attempts to amalgamate the fervor of a cell phone with inventive highlights like superb designs and processing alternatives. The brilliant looks make it an appealing alternative for any person. Apple additionally made an invasion into the product business with the dispatch of the Apple I tunes. This item is basically a music player that is good with the two iPods just as PCs. Notwithstanding this the organization has additionally created software’s like I sync, Mobile Me and so on that are basically in the product sections. Apple in its latest exercises has propelled the

Friday, August 21, 2020

School district reports test scores rise with mastery learning on Khan Academy

School district reports test scores rise with mastery learning on Khan Academy We’re happy to share new research results for mastery learning on Khan Academy and a new video that shows how mastery learning works.The Centennial School District in Warminster, Pennsylvania, reports that middle school students who spent at least 30 minutes per week doing mastery learning on Khan Academy had 33% higher growth on the NWEA MAP mathematics assessment than students who used Khan Academy for less than 15 minutes per week. Elementary school students had 19% higher growth.Kudos to the kids at Centennial for all their hard work!Mastery learning is an educational philosophy centered on self-paced learning. Unlike traditional learning, students in mastery-learning classrooms are not pushed ahead in lockstep, which can cause the accumulation of debilitating “Swiss-cheese” gaps in knowledge.In mastery learning, students learn at their own pace. They progress through questions and quizzes at just the right level for them. They get feedback as they learn and help when they need it most. Teachers track student progress, identify gaps, and give students one-on-one attention to help them succeed. Mastery learning is backed by decades of research. The noted researcher Benjamin Bloom first coined the term mastery learning in 1968 and published a seminal 1984 study that documented its promise. A 1994 analysis of nearly 300 studies on mastery learning found that mastery learning has a “positive effect on achievement at all levels and for all subjects and results in positive affective outcomes for students and teachers.”Mastery lessons on Khan Academy are available for Kâ€"12 math, grammar, high school biology, AP Calculus AB, AP Calculus BC, AP Physics 1, AP Statistics, AP Government and Politics, and AP Macroeconomics.We’ll add new subjects with mastery throughout the school year. Onward!

Sunday, May 24, 2020

Analysis of Jane Austens Pride and Prejudice and...

Jane Austen’s ‘Pride and Prejudice’ utilises setting to reveal Darcy’s true character and allows Elizabeth to gain a true understanding of his nature. Pemberley estate is placed at the centre of the novel both literally and figuratively. In terms of Pemberley’s literal meaning, it informs the reader that the estate belongs to Darcy, while figuratively it reflects the charm of his character. Elizabeth Bennet’s visit to Pemeberly illuminates’ Darcy’s moral fibre, she is enchanted by its beauty and good taste; she is thrown by the vivid and vastly spread nature surrounding Pemeberly. In contrast, Forster’s ‘A Room with a View’ utilises place more frequently, primarily to reveal character and act as a metaphor for a repressed society. Italy†¦show more content†¦Lucy is spontaneously kissed by George with a strong passion in the midst of wild nature, surrounded by purple violets. The purple violets are sig nificantly symbolic as folklore states that violets connote for a love that is delicate. The ‘Violets like other things existed in great profusion their; would she like to see them’ and ‘for the first time she felt the influence of spring’ as though she had lived in the cold winter that prevented her from growing the love. Both Austen and Forster use nature imagery to reflect on the protagonists in their novels. Charlotte Bronte says: ‘I found an accurate daguerreotyped portrait of a common-place face; a carefully fenced, highly cultivated garden with neat borders and delicate flowers – but no glance of a bright, vivid physiognomy – no open country – no fresh air – no blue hill – no bonny beck. I should hardly like to live with her ladies and gentlemen in their elegant but confined houses’. Charlotte Bronte’s opinion of natural setting was influenced by the gothic genre which was popular in Victorian E ngland. From her criticism, it can be argued that Austen uses nature infrequently; however, when it is used to describe Pemberley it is most effective as it reveals Darcy’s unfeigned character. Furthermore, nature

Wednesday, May 13, 2020

The Indian Camp By Ernest Hemingway And Two Words By...

Summer Reading Assignment The short stories which are to be examined in this document are The Indian Camp by Ernest Hemingway and Two Words by Isabel Allende. Both stories were manufactured in brilliant yet ostensibly natural fashion that ignites in the reader, a fusion of profound interest and awe. Ultimately, the stories unite in their tackling of the sacred solemnity of love and death and the thin filament that separates yet binds both entities. Both tales dwell and arguably thrive in their deficiency of intense complexity, so to speak. They feature a sheer sense of clarity that eases the reader’s perception and comprehension of the narrative. This clarity is attributed to the author’s usage of relatively basic, minimal and graspable words/phrases for the common individual. This is perceptible in both writers’ portrayal of the setting in which a certain portion of the tale occurs. For instance at the culmination of Indian Camp Hemingway writes, â€Å"They were seated on the boat, Nick in the stern, his father rowing. The sun was coming up over the hills. A bass jumped, making a circle in the water.† (Hemingway- 7) In Two Words, Allende illustrates the setting of Belisa prior to her encounter with the Colonel and his men in an equally minimal manner as Hemingway: â€Å"One August morning, several years later, Belisa Crepusculario was sitting in her tent in the middle of the plaza, surrounded by the uproar of market day†¦..† (Allende-3) Through the author’s utilization andShow MoreRelatedShort Story : Indian Camp 1114 Words   |  5 PagesJules Yurand Paredes IB English HL 1 Mrs. James 1B Summer Reading Assignment The two short stories, â€Å"Indian Camp† a short story by Ernest Hemmingway and â€Å"Two Words† another short story by Isabel Allende, are very similar but have a few differences. The two stories share theme with both main characters Belisa and Nick. However they are also different when it comes to the purpose of the story and its outcomes. The two short stories are similar in a coming of age sense yet the way the theme is delivered

Wednesday, May 6, 2020

What is Anthropocene Free Essays

The videos In the website â€Å"Welcome to the Anthropocentric,† discusses about Anthropocentric. Questions that I will answer are what Is Anthropocentric? Why Is It label that way? What are some patterns in the era that are exhibited? Along with why should we care about mass extinction? Anthropocentric is a new geological epoch dominated by humanity. The word â€Å"Anthropocentric† is given its name because human activity has polluted the sea, caused mass extinction of animals and plants, and changed the Earth’s natural cycle. We will write a custom essay sample on What is Anthropocene? or any similar topic only for you Order Now Some of the patterns that this era has exhibited re the changes in the Earth’s life support system, such as changes within the environment. For example, temperatures and sea levels are changing due to global warming, level of greenhouse gases is rising, and changes In the global water systems Is through damming, extraction, arrogation, and climate change. Furthermore, population, production, and consumption have grown exponentially. We are moving more sentiment than natural erosion and rivers. Therefore, there Is a whole In the Ozone and this Is causing us to lose bloodlessly. We should be concern about the mass extinctions of organisms because without hem, we will not have any support for food supplies and the environment. Especially, the functioning of the ecosystem. However, I believe that this catastrophe has been going on for years, however some people have no idea where this will lead us to. We should do something about this and that carries with responsibility. We have the option to stop and act upon the current rate of extinction with measures that will prevent habitat loss, and with regulations and rules that will provide species the kind of safety net that humans have. Most importantly, we must adapt to change. How to cite What is Anthropocene?, Papers

Tuesday, May 5, 2020

Case Study on Entral Bank of Jordan-Free-Samples for Students

Question: Discuss about the Case Study on Entral Bank of Jordan. Answer: Title Study on IoT Security and Privacy Preservation: A case study on Central Bank of Jordan Brief introduction The internet of things (IoT) is a network of network, which is connected throughout information as well as communication infrastructure to provide of value added services. This research study is based on analyzing the IoT security and privacy issues for the banking sector. The selected organization for this case is Central Bank of Jordan. Into the banking organization, large amount of data are communicated and exchanged from one place to another. Most of the communication includes of exchange of confidential data. Aljawarneh et al. (2014) stated that privacy preservation is also important as no party are trusted over the public network without investigation and verification. IoT security issues are revolved around electronic currency along with digital cash; therefore, its security is a key significant concern into Central Bank of Jordan. Into this bank, the customers data are not only used for cyber frauds but also used to be sold into black market. Background and statement of the problem Kipf et al. (2016) determined that some of the banks are failed to secure their system as they experience that security of the data is related to Information Technology. Residual risks are caused due to inadequate control of the logical as well as physical access to the system for containing of customer data. There is also inadequate logging along with monitoring of the security related incidents on banking system. Buchanan et al. (2014) argued that management of third party service providers is a big challenge for the Central Bank of Jordon. Implementation of security into the bank is a key success for their organization. The passwords are kept encrypted so that no unauthorized person can able to access the customers data. The bank employees always inform their customers about card transaction using encrypted email and secured communication channel. Into the URL of the bank, the application will not send any sensitive data and information. Barkhordari et al. (2017) investigated that Central bank of Jordon adopts limited access to their computing resources to protect the customers data. The problem statement is that IoT components consist of minimal functionality, limited computer power with storage along with lower energy resources. Therefore, it is difficult to deploy of security and privacy preservation into the banking sector for securing the customers data. Such type of deployments take advantage of the new protocols and design of system as it is equipped to control into resource lack environments (Leverett, Clayton and Anderson 2017). Due to continuous increase into security and privacy concerns, identification of theft and verification of the customers are also increased. It becomes critical for the bank to verify each customer based on his or her background and history of crime. Failure of IoT system causes damage and there are implications for the physical safety. Research questions, aim and objectives Research Questions Following are the research questions for this particular study: How can IoT become useful tool for Central Bank of Jordon to provide value added financial services? What impacts will IoT security and privacy issues have on Central Bank of Jordon? What are possible security and privacy preservation strategies to mitigate the issues? Research aims The aim of this research study is to protect the banking data from IoT security and privacy threats for the Central Bank of Jordon to enhance the future IoT applications. This study also addresses the current security and privacy issues into IoT for the selected bank. Collection of data throughout IoT solutions as well as analyze them into significant value offers protection strategies against the security and privacy. It is significantly impact the productivity of the bank and their financial resources. Research objectives Following are the objectives of the research study: To study the benefit of IoT used into the Central Bank of Jordon to address their financial needs To analyze the impacts of IoT security and privacy issues into banking organization To provide preservation solutions against the identified security and privacy issues Study design A cross sectional study is done for this research study on the bank employees and bank managers into the Central Bank of Jordan. It is an observational study conducted to analyze the data, which are collected from the population of the selected bank. It is type of descriptive study which is done to analyze determine occurrence of data thefts and frauds. It collects of data at defined time (Metalidou et al. 2014). At this study stage, security of information, privacy as well as protection of data is addressed. Throughout this study, the researcher assesses the causes of the IoT security and privacy issues. It involves of data collection about the past and present data thefts and frauds incidents and relies in originated of collected data (Roman, Zhou and Lopez 2013). The target populations for this research study are the bank employees and managers. In order to conduct this study, Jordon is mainly focused for this particular research study. Study population and sampling The populations selected for this study are bank employees and bank managers. Random sampling procedure is selected for this study to select of required participants. Central bank of Jordon is selected as the organization where the entire research study has taken place, which is grouped into both workers and managers. The selected sampling method is unbiased presentation of the group (Sicari et al. 2015). Using simple random sample method, the employees are selected from large population. There are total of 50 employees are selected from a large population as they are interested into the study along with 3 bank managers. Data collection methods and instruments Yan, Zhang and Vasilakos (2014) stated that data are useful for collecting of information to study of the research topic. It provides with accurate results of the research process. Data are collected from the peer reviewed articles which addressed IoT security and privacy preservation information. Based on the title, various articles are identified. The articles, which are published IoT security and privacy preservation, are taken for this research study (Li et al. 2016). Google scholar and university website is used to search for the required data. The keywords used for this study are IoT, privacy, security. An online survey is also conducted using questionnaire. The participants involved in this study are bank employees those are facing IoT security and privacy issues (Zhou et al. 2017). Using their feedback, the bank managers take proper IoT security preservation steps to overcome the identified data threats and frauds issues. Research Instrument considered for this particular research study is demographic information of the employees and managers. Under the demographic information, the factors are age, educational status and economic status (Tonyali et al. 2018). Online questionnaire is also taken to take survey of the employees and managers to determine the occurrence of data thefts and frauds. The survey also helps to determine the solutions against the security and privacy issues. Data analysis methods There are two types of data analysis method selected for this particular research study is qualitative and quantitative data analysis method. Qualitative data is used to record the data, which will better describe the selected research topic in detailed form. It provides with theoretical concept into practical form, which will better describe and help to understand the topic. On the other hand, quantitative data analysis method is used to apply of statistical data, which help to record of the data with larger sample size. In this particular study, quantitative data analysis method is used to do the survey of bank employees (Lowry, Dinev and Willison 2017). The researcher uses this particular technique to convert the data into numerical forms. It is subject to the statistical analysis of the collected data. The primary findings of this study are required to analyze and interpret throughout comparing it with other research findings. Based on quantitative data analysis method, it is exp ected to turn of raw materials into meaningful data throughout application of critical thinking (Zhang et al. 2014). The primary data findings are critically analyzed and interpreted throughout use of questionnaire survey. Literature review findings are also conducted from the peer review journal articles reflected viewpoints of the authors regarding causes of IoT security and privacy issues. Mechanisms to assure the quality of the study The researcher assured about excellence of the gathered data and said that all the quality data are helpful for conducting the study. Into the research community, quality assurance as well as assessment plays a key important role. It informs about crucial decisions regarding project funding as well as project team members. Assured about the quality of the research increases the volume of research, competition among the researcher and provides with effective research outputs. Barkhordari et al. (2017) mentioned that into the research process, assurance of quality and assessment is critical for each stages of the research study. The researcher collects of data from scholarly publications and peer reviewed journal articles, which provide quality information and data to the researcher. The journal in addition to research sources are searched and the papers are included if it addressed the quality assurance into quantitative paradigm. Narrative approach is used to review as well as synthe ses of the literature. Timetable for completion of the project This research study is cross sectional, which is dependent on the time scheduled for the research. As it is a cross sectional study, therefore it adopts of limited time which requires of Gantt chart to complete the research work. Gantt chart helps to show all the project activities to complete the work. The total duration to complete the project work is 30 days with start date from 10/11/2017 and end date is 21/12/2017. Task Name Duration Start Finish Study on IoT Security and Privacy Preservation: A case study on Central Bank of Jordan 30 days Fri 10-11-17 Thu 21-12-17 Selection of the topic 5 days Fri 10-11-17 Thu 16-11-17 Select a research proposal topic 3 days Fri 10-11-17 Tue 14-11-17 Do search on the topic 1 day Fri 10-11-17 Fri 10-11-17 Finalization of the topic 2 days Mon 13-11-17 Tue 14-11-17 Creating of research layout 2 days Wed 15-11-17 Thu 16-11-17 Data collection 14 days Fri 17-11-17 Wed 06-12-17 Pilot study 2 days Fri 17-11-17 Mon 20-11-17 Collecting the data 2 days Tue 21-11-17 Wed 22-11-17 Selection of research techniques 4 days Thu 23-11-17 Tue 28-11-17 Analyzing the collected data 3 days Wed 29-11-17 Fri 01-12-17 Data findings 3 days Mon 04-12-17 Wed 06-12-17 Report writing 11 days Thu 07-12-17 Thu 21-12-17 Formation of rough draft 2 days Thu 07-12-17 Fri 08-12-17 Conclusion of the study 1 day Mon 11-12-17 Mon 11-12-17 Write the final report 4 days Tue 12-12-17 Fri 15-12-17 Review the report 1 day Mon 18-12-17 Mon 18-12-17 Final submission 3 days Tue 19-12-17 Thu 21-12-17 Participants in the study Central bank of Jordon provides financial services to the customers in Jordon. The study is conducted to analyze IoT security and privacy preservation into the bank sector. For this particular study, the selected participants are the bank employees who are facing the data threats and the bank managers those are providing solutions against the threats. The participants provide answers to the questions related to selected research study. The participants can contract the researcher with the questions at all time before and during the study. They discussed the benefits as well as risks which are associated with IoT. Ethical considerations For commencement of this research study, ethical approval from the Central bank of Jordon is required in which the cross-sectional survey is conducted. The researcher is trained to take data on the security threats and frauds. Ethical considerations are addressed to seek permission from the participants ahead of they are allowed to involve in the research study. Sicari et al. (2015) indicated that consent form provides the participants with detailed information such as study purpose, details of researcher, information about nature of participants and their role, period of the study and privacy of the provided data. The employees are educated that they are participating into the study as volunteer and they are asked to sign agreement to point to their willingness of participation (Leverett, Clayton and Anderson 2017). Other participants such as managers are also invited to contribute into the study. The collected data for the research study are not shared with any third party and no o ther unauthorized person can able to access the data. All the involved participants are educated that they can remove from the learning anytime. Codes are used to label the questionnaires throughout the data collection in the study to make sure that privacy of the participants is appreciated into research process. Resources required for the study including of budget Task Name Duration Start Finish Resource Names Cost Study on IoT Security and Privacy Preservation: A case study on Central Bank of Jordan 30 days Fri 10-11-17 Thu 21-12-17 $6,080.00 Selection of the topic 5 days Fri 10-11-17 Thu 16-11-17 $1,760.00 Select a research proposal topic 3 days Fri 10-11-17 Tue 14-11-17 Project Manager, Researcher $720.00 Do search on the topic 1 day Fri 10-11-17 Fri 10-11-17 Researcher $80.00 Finalization of the topic 2 days Mon 13-11-17 Tue 14-11-17 Project Manager $320.00 Creating of research layout 2 days Wed 15-11-17 Thu 16-11-17 System Analyst, Project Manager, Developer $640.00 Data collection 14 days Fri 17-11-17 Wed 06-12-17 $1,920.00 Pilot study 2 days Fri 17-11-17 Mon 20-11-17 Researcher $160.00 Collecting the data 2 days Tue 21-11-17 Wed 22-11-17 System Analyst, Project Manager $480.00 Selection of research techniques 4 days Thu 23-11-17 Tue 28-11-17 System Analyst $320.00 Analyzing the collected data 3 days Wed 29-11-17 Fri 01-12-17 System Analyst, Researcher $480.00 Data findings 3 days Mon 04-12-17 Wed 06-12-17 System Analyst, Researcher $480.00 Report writing 11 days Thu 07-12-17 Thu 21-12-17 $2,400.00 Formation of rough draft 2 days Thu 07-12-17 Fri 08-12-17 Project Manager $320.00 Conclusion of the study 1 day Mon 11-12-17 Mon 11-12-17 Researcher, Risk Analyst $160.00 Write the final report 4 days Tue 12-12-17 Fri 15-12-17 Project Manager, Researcher $960.00 Review the report 1 day Mon 18-12-17 Mon 18-12-17 System Analyst, Project Manager $240.00 Final submission 3 days Tue 19-12-17 Thu 21-12-17 Project Manager, Researcher $720.00 Figure 1: Gantt chart (Source: Created by author) References Aljawarneh, S., Al-Rousan, T., Maatuk, A.M. and Akour, M., 2014. Usage of data validation techniques in online banking: A perspective and case study.Security Journal,27(1), pp.27-35. Barkhordari, M., Nourollah, Z., Mashayekhi, H., Mashayekhi, Y. and Ahangar, M.S., 2017. Factors influencing adoption of e-payment systems: an empirical study on Iranian customers.Information Systems and e-Business Management,15(1), pp.89-116. Buchanan, F.R., Buchanan, F.R., Ahmad, S.Z. and Ahmad, S.Z., 2014. Business in developing countries: globalization of a large emerging market bank.Emerald Emerging Markets Case Studies,4(6), pp.1-16. Kipf, A., Brunette, W., Kellerstrass, J., Podolsky, M., Rosa, J., Sundt, M., Wilson, D., Borriello, G., Brewer, E. and Thomas, E., 2016. A proposed integrated data collection, analysis and sharing platform for impact evaluation.Development Engineering,1, pp.36-44. Leverett, ., Clayton, R. and Anderson, R., 2017. Standardisation and Certification of the Internet of Things. Li, Y., Zhou, L., Zhu, H. and Sun, L., 2016. Privacy-preserving location proof for securing large-scale database-driven cognitive radio networks.IEEE Internet of Things Journal,3(4), pp.563-571. Lowry, P.B., Dinev, T. and Willison, R., 2017. Why Security and Privacy Research Lies at the Centre of the Information Systems (is) Artefact: Proposing a Bold Research Agenda. Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Giannakopoulos, G. and Skourlas, C., 2014. Human factor and information security in higher education.Journal of Systems and Information Technology,16(3), pp.210-221. Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), pp.2266-2279. Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in Internet of Things: The road ahead.Computer Networks,76, pp.146-164. Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A.S. and Nojoumian, M., 2018. Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems.Future Generation Computer Systems,78, pp.547-557. Yan, Z., Zhang, P. and Vasilakos, A.V., 2014. A survey on trust management for Internet of Things.Journal of network and computer applications,42, pp.120-134. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K. and Shieh, S., 2014, November. IoT security: ongoing challenges and research opportunities. InService-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on(pp. 230-234). IEEE. Zhou, J., Cao, Z., Dong, X. and Vasilakos, A.V., 2017. Security and privacy for cloud-based IoT: challenges.IEEE Communications Magazine,55(1), pp.26-33