Monday, December 30, 2019
Film Adaptation Of Bram Stoker s Dracula - 1320 Words
Bram Stokerââ¬â¢s frightening tale of Count Dracula has struck horror into the hearts of many since it was originally penned. In 1987, Bram Stoker wrote the revolutionary tale Dracula that played off the fears of the people of the era. The plot and characters that make the novel great also translate nearly perfectly to cinematic adaptations. Starting in the early 1900ââ¬â¢s, directors have done their best to portray the terror that the original novel inspired. Francis Ford Coppolaââ¬â¢s Bram Stokerââ¬â¢s Dracula was released in 1992 and follows the bookââ¬â¢s storyline very closely. However, to appeal to his generations ideals on relationships and sex, Coppola made some changes to the plot; however, many of the characters and themes are kept intact. He alsoâ⬠¦show more contentâ⬠¦This is much different form the novel version of the Count, who Harker describes as a monster will wants to ââ¬Å"satiate his lust for blood, and create a new and ever-widening circle of semi-demons to batten on the helplessâ⬠(Stoker 53) Another difference that is different in Draculaââ¬â¢s film version is how he is killed. In the book, Harker slits his throat after a climatic chase and battle, and immediately turns to dust (Stoker 325). This battle still occurs in Coppolaââ¬â¢s version; however, he is eventually killed by Mina and the act is seen as one of compassion and kindness. Stoker does not explore this idea in his novel. Stoker does not explore this idea in the novel, as doing so would have taken away from the frightening, undead character that he was trying to create. This is not to say that Coppola was wrong to go this route, however, only that the perception of vampires had shifted and he needed something to fit along with this shift. On top of this, Coppola also decided to make his movie much more erotic portrayal of many characters in the film. This starts with the brides, who have a much more sexual way of approaching Jonathan than in th e book. The sexual tone continues into how Lucy is depicted in the film. Lucy originally had more of a sexual undertone than the other characters in the book. For example, sheShow MoreRelatedSexuality In Bram Stokers Dracula1082 Words à |à 5 PagesSexuality in Bram Stoker s DraculaBram Stoker s Dracula, favorably received by critics upon publication in 1897, entertained its Victorian audience with unspeakable horrors such as vampires invading bedrooms to prey on beautiful maidens under the guise of night. The novel s eroticism proved even more unspeakable. Received in the era of repression, it remains questionable whether Dracula s readership perceived the sexuality flowing from the page. An advocate for the censorship of sexual materialRead MoreAbraham Bram Stoker: A Brief Biography705 Words à |à 3 PagesAbraham Bram Stoker, born in Dublin on November 8, 1847, was an Irish novelist, theatre critic and short story writer. As a child, Stoker was often ill and he spent most of h is time in bed. His mother, who was as a charity worker and a writer, told him horror stories that, most likely, had influenced his later writings. The ones he found most interesting were the stories about the cholera epidemic in 1832, which killed thousands of people in Europe and North America. In 1864, Stoker enrolled at theRead MoreAre You A Fan Of The Supernatural? Do You Believe In Things1744 Words à |à 7 Pagesreasons. ââ¬Å"It was used as a part of witchcraft, as a symbolic connection of the powers of life and death, as a religious practice, or as a form of offering to the godsâ⬠(Klimczak). Early films such as Nosferatu portrayed vampires as scary, blood-thirsty creatures. Although vampires have always been popular, films have drastically changed how they portray vampires and have moved away from the dark, sinister, and scary vampire to more glamorized characters with a sexy persona such as Edward from TwilightRead MoreComparing Bram Stokerââ¬â¢s Dracula and the 1972 Film Blacula Essay1917 Words à |à 8 PagesBram Stokerââ¬â¢s Dracula is not only a classic story of men and monsters, but a dramatic reactionary work to the perceived threats to Victorian society in nineteenth century England. In modern times there have been many film adaptations of the novel, each developing a unique analysis or criticism of the literary text within the framework of the society and time period in which it was created. The 1972 film Blacula is one of the most culturally specific variations on the story of Dracula, and highlightsRead MoreAnalysis Of From Simple Beast And The Bride Of The Isles 1380 Words à |à 6 PagesKevin Zhang Ms. Frisbie English 4 7 November 2014 From Simple Beast to Complex Human Initially thought of as another tasteless fiction similar to its predecessor The Snakeââ¬â¢s Pass, Irish writer Bram Stoker silenced his critics and received worldwide praise on June 1897 with his popular literary work Dracula. Although many literary works about the vampire originated far before Stokerââ¬â¢s time, such as Polidoriââ¬â¢s The Vampyre (1819), James Planchà ©s The Vampire; or, the Bride of the Isles (1820), AlexandreRead MoreAnalysis Of The Novel Dracula 1452 Words à |à 6 PagesAnalysis of Dracula Although Dracula was not the first vampire novel, the effect that Bram Stokerââ¬â¢s creation had on the vampire genre is undisputable. At the time, it was written intellectual revelations during the 19th century had begun to change what people fear. Archaic legends like vampire stories no longer inspired terror in industrializing areas like Britain. What made Dracula widely successful was the incorporation of modern themes and anxieties with the renowned archetype of the vampireRead MoreGothic Realism And The Vampire Sub Cultures1512 Words à |à 7 Pagesin their children s possession. The narratives of Penny Dreadful focused horror stories filled with murderers, werewolves and Vampires, such as Varney the Vampire Or The Feast of Blood in 1845. But these stories had little to any influences on the Vampire lore we know today. No one more recognizable to modern audiences is the Vampire archetype of Count Dracula, the debonair and deadly antagonist to Van Helsingââ¬â¢s protagonist in Bram Stokerââ¬â¢s classic 1897 Gothic novel, Dracula. Draculaââ¬â¢s narrativeRead MoreDracula, The Mummy, By Bram Stoker2414 Words à |à 10 PagesCreature from the Black Lagoon, Dracula, all horrific images of the ââ¬Å"Universal Monstersâ⬠created from the 1920s to the 1930s by Universal Studios. To the audience these monsters created panic and suspense that made leaving the lights on before bed a necessary precaution; they are what is seen as a true, scary, monstrous fiction. Many of these monsters did not begin their stories in cinema however; they began as novels. For Director Tod Browningââ¬â¢s 1931 Dracula, Bram Stoker is truly the mastermind behind
Sunday, December 22, 2019
Oedipus-Complex In Shakespeares Hamlet - 1962 Words
Renowned psychoanalyst, Sigmund Freud, coined the term Oedipus-complex in 1910 when explaining a childââ¬â¢s psychological desire for his opposite-sex parent. Coupled with this desire is a bitter sense of rivalry with the parent of the same sex, as the child feels envious and compelled to win the affection of the coveted parent (Freud 19). Shakespeareââ¬â¢s Hamlet, although written prior to the development of this theory, is often referenced as a prime example of this complex. Hamlet famously descends into madness in an effort to avenge his fatherââ¬â¢s death; however, although Hamlet is seemingly devastated by the loss of his father, it is not until he learns of his motherââ¬â¢s marriage to Claudius that he truly begins to unravel. Once alone, he eruptsâ⬠¦show more contentâ⬠¦They provide the three classes of ghosts that Elizabethans recognized: the authentic, subjective, or false ghost. When illustrating the characteristics of a false ghost, they describe, ââ¬Å"It was thought to be a prankish delight of the devil to assume the shape of a person lately dead and in this guise appear to relatives and incite them to some deed which ââ¬â if consummated ââ¬â would entail the forfeiture of their soulsâ⬠(Boas and Hahn 99). Because Shakespeare was undoubtedly Protestant, he surely intended for the ghost in Hamlet to reflect the qualities of a false ghost, for Protestants believed that ghosts were truly demons sent from Hell to tempt people into performing unholy acts. Consequently, the ghost of the king is unquestionably a demon sent to persuade Hamlet to fulfill his utmost unholy desire: to be with his mother. However, if this ghost is truly a demon, it would not want to appear as such to Hamlet. As Boas and Hahn suggest when referencing Hamlet, this demon materializes under the guise of urging Hamlet to commit a heroic act of justice, when in reality it is tempting him to remove the only person who stands in the way of his deepest, sinful wish. If the ghost were to command him to murder Claudius so Hamlet can fulfill his incestuous desires, Hamlet would be less apt to act because he does not want to acknowledge such desires, for the Oedipus-complex is an unconscious and repressed affliction.Show MoreRelatedLove Thy Mother Most Peculiar Essay1235 Words à |à 5 PagesAbstract: Does Hamlet, a character in Shakespeareââ¬â¢s historical play, have the Oedipus complex? Do we truly understand the semantics of the Oedipus complex? Many critics have had different opinions. According to Websterââ¬â¢s online dictionary, the Oedipus complex is a ââ¬Å"complex of males; desire to possess the mother sexually and to exclude the father; said to be a source of personality disorders if unresolvedâ⬠(Websters Online Dictionary, 2011). Another source defines the Oedipus complex as ââ¬Å"the attachmentRead More Hamlet and the Oedipus Co mplex Essay1229 Words à |à 5 PagesHamlet and the Oedipus Complexà à à à à William Shakespeares play Hamlet contains very similar elements to Sophocles Greek Myth, Oedipus Rex. In the late 1800s through early 1900s, a Doctor based out of Vienna, named Sigmund Freud, developed a theory based on the events of the play Oedipus Rex, which has since been coined the Oedipus Complex.à Ernest Jones also applied his knowledge of Freudian psychology and wrote a persuasive paper suggesting that Hamlet cannot kill his uncle Claudius becauseRead MoreGender Construction And Patriarchal Power Structure Of Hamlet By William Shakespeare1402 Words à |à 6 PagesIn William Shakespeareââ¬â¢s Hamlet, there are various issues regarding gender construction and how women are portrayed in the play. The women of the play have zero to no power and control over situations and are often viewed as weak and incapable. The idea of power and control over women is widely shown through Opheliaââ¬â¢s character, who does not get to choose how her future will play out an d who she will spend it with. This thoroughly connects to the Oedipus complex in the play as Gertrudeââ¬â¢s sexualityRead MoreWhat Makes A Tragedy?908 Words à |à 4 Pagescharacteristics that form a ââ¬Å"trueâ⬠tragedy? In Sophoclesââ¬â¢ ââ¬Å"Oedipus the Kingâ⬠and Shakespeareââ¬â¢s ââ¬Å"Hamletâ⬠(two of the most renowned tragedies ever written), lay the keys to unearthing the facts about what characteristics produce the ultimate tragedy. ââ¬Å"Oedipus the Kingâ⬠tells the terrible tale of a brilliant man who became king of Thebes and later discovers that he is the cause of a plague on the city because he killed his father and married his mother. ââ¬Å"Hamletâ⬠follows the events of a Danish prince who has beenRead More Hamlets Love for His Mother Essay1213 Words à |à 5 Pages Hamlets Love for His Mother Hamlet is seen as one of the most complex literary character of all time. The relationship between Hamlet and Gertrude can be interpreted in many ways. Hamletââ¬â¢s motivation for killing Claudius is not to avenge his fatherââ¬â¢s death, but because of his love for his mother Gertrude. This is where the Oedipus complex comes into play in Hamlet by William Shakespeare. The Oedipus complex refers to the thoughts some men have regarding their mother or maternal figuresRead MoreOedipus Complex in Hamlet Essay805 Words à |à 4 PagesOedipus Complex in Hamlet In Shakespeareââ¬â¢s Hamlet, Hamletââ¬â¢s personality can be explained by the Oedipus Complex. Throughout the play there are many times where he proves that he has Oedipus Complex. Oedipus Complex was not around at the time that that Hamlet was written. It just shows that Shakespeare saw the same personality complexââ¬â¢ as Freud. Freud first named the Oedipus Complex Theory in his book , An Interpretation of Dreams, in 1899. Freud states The child takes both of its parents,Read MoreA Freudian View of Hamlet1014 Words à |à 5 Pagesï » ¿Kenneth Thomson Acting Out May 2, 2012 Freudââ¬â¢s View of Hamlet My paper will use Dr. Sigmund Freudââ¬â¢s psychological outlooks to analyze possibly the most famous characters in English literature. William Shakespeareââ¬â¢s very own Hamlet. Psychology has been studied since the eighteen hundreds and, after reading through many of Freudââ¬â¢s studies on psychoanalytic culture I feel as though Hamlet is the most deserving of further analysis for this paper. I will analyze the two Freudian concepts thatRead MoreEssay on A Critical Analysis of Shakespeares Hamlet1132 Words à |à 5 PagesA Critical Analysis of Shakespeares Hamlet Dave Beaston Hamlet. Is he an insane madman or a revengeful, scheming, genius? There are many conflicting ideas and theories on this subject, and hopefully this paper may be of some assistance in clearing up the confusion. The paper is divided into three separate analytic sections beginning with the beginning of Hamlets so called madness, and why it may have occurred. Next, is an analysis of why Hamlet delays revenging his fathers death.Read MoreLiterary Analysis Of Hamlet 1366 Words à |à 6 PagesCharacters in Hamlet The English Play writer, William Shakespeare had written many well-known pieces of work including Hamlet. Hamlet is known to be one of his most popular works. Hamlet was written in the late 16th Century about the Prince of Denmark. The original title of the work was The Tragedy of Hamlet, now it is referred to as just Hamlet. In Hamlet, William Shakespeare uses the mental state of his characters to prove that not all characters in books have to be one dimensional. Shakespeareââ¬â¢s writingRead MoreEssay on Inside the Head of Sigmund Freud1568 Words à |à 7 Pagesclinical process of psychoanalysis, which treated psychopathology by using the ââ¬Å"talking cureâ⬠. The talking cure is best known as a one to one talk between the patient and the doctor. He is also known for his radical and complex theories such as the Oedipus complex, and the Electra complex. His fields include neurology, philosophy, psychiatry, psychology, psychotherapy and psychoanalysis. Many question his aut henticity since there is no proof or record of Freud holding a degree, more less a doctorate.
Saturday, December 14, 2019
Voter Free Essays
Voter ignorance and special interests often result to bad policy-choices and erroneous policy making processes. In a democracy, where peopleââ¬â¢s votes are important, policy-choices are largely affected by whatever wrong or right information people may have as regards issues. Unfortunately, biases and misinformation are rampant among people, especially among voters. We will write a custom essay sample on Voter or any similar topic only for you Order Now The problem is that, instead of correcting these biases, politicians tend to play them up to acquire votes. Many of these biases come from the field of economics, a field which is very important to voters because of its effect in the quality of peopleââ¬â¢s lives. Four of these biases are discussed by Bryan Caplan in his article, The Myth of the Rational Voter. They are the anti-market bias, anti-foreign bias, make-work and the pessimistic bias. The Anti-Market Bias may be characterized as a bias against capitalism and free-market itself, or at least most of their features. The explained cause of this bias is usually the fact that actors in a free-market model of economy are all profit-seekers. This attribution of self-interest gives birth to a prejudice that no socially-beneficial outcome may possibly result from a free market (See Caplan, 2007, p.7). The result is ââ¬Å"a tendency to underestimate the economic benefits of market mechanism (Caplan, 2007, p.7), such as the effect of competition in lowering prices, savings and maximization of resources or efficiency. There are many variations of the anti-market bias. One of them is ââ¬Å"to equate market payments with transfers, [while] ignoring their incentive properties (Caplan, 2007, p.8). Under this, a profit is seen to be earned by the rich, at the expense of the poor, as if there is no exchange of value that happened. It ignores the fact that profits are not acquired without doing something, and that an increase in profits is often a result of increasing efficiency in the use of resources. The second is the monopoly theories of price. Under this variation, price is seen as a function of the decision, mood and agreement among CEOââ¬â¢s and other similar persons, without giving due regard to the interaction between supply and demand. (Caplan, 2007, p. 9) The Anti-Foreign Bias is an argument towards protectionism. Under this, foreigners are often seen as a source of economic downfall. ââ¬Å"Whatever the reason, [foreigners] supposedly have a special power to exploit [locals] (Caplan, 2007, p. 11). They are often used as scapegoats for all economic problems that may exist such as lack of jobs, high price of goods and others. This bias may have brought about by a similar theory between a profit-seeker individual and a poor buyer from the point of view of the anti-market bias. ââ¬Å"A rich country, in the same manner as a rich man, is supposed to be a country abounding in money; and to heap up gold and silver in any country is supposed to be the best way to enrich itâ⬠(Caplan, 2007, p. 12). The assumption is that no country may be better off without making another country less off. The problem with this belief is that it ignores the benefit of an open market from the point of view of comparative advantage. Under the theory comparative advantage, all countries will be better off if they all specialize. Even a country that is less productive compared to other countries in all products may benefit from specializing. It is more expensive to try producing all products for consumption rather than in specializing in some and trading for the others (Caplan, 2007, p. 11-12). The Make-Work Bias refers to the conflict between the businessesââ¬â¢ and economistsââ¬â¢ desire to minimize waste of resources caused by paying for unneeded or inefficient labor and the belief that, to achieve economic growth, people need to be employed. The general tendency is to underestimate the benefits of conserving labor (Caplan, 2007, p. 13). Often, the rate of unemployment is seen as an indicator of economic growth. The policy is often to give jobs to more people. This is despite the fact that the same amount of jobs are required to be done. Employment is increased at the expense of efficiency (Caplan, 2007, p. 13). Instead of trying to increase employment by increasing the GNP through efficient use of resources, the work of one is divided between two or three people, making each of them less productive (Caplan, 2007, p. 13). The result is a prospect for prosperity for the individuals who are able to obtain the jobs and a decrease in efficiency and growth for the whole economy. Pessimistic Bias refers to the peopleââ¬â¢s negative, or even cynical beliefs, about economic conditions or growth. The general rule, as observed by Caplan (2007), is that ââ¬Å"the public believes economic conditions are not as good as they really areâ⬠(p. 16). There may be advances in the economy, but they are taken for granted by people. In times of minimal economic growth, the perception is not of growth, but of stagnation. The problem with this is that, in terms of over-all economic growth, ââ¬Å"progress is so gradual that a few pockets of decay hide it from the public viewâ⬠(Caplan, 2007, p. 17). To measure whether an economy has actually achieved growth, it is best to compare the present condition to that of a distant past (Caplan, 2007, p. 16). Moreover, over-all success is not often observable across the whole country. There are some areas where economic conditions may not be good. However, these isolated instances of economic regression give rise to ââ¬Å"a suspicion that the riches and industry of the whole are decayingâ⬠(Caplan, 2007, p. 17), when the reality is that the country is experiencing economic growth as a whole. It is also common for the pessimistic rhetoric ââ¬Å"to idealize conditions in the more distant past in order to put recent conditions in a negative lightâ⬠(Caplan, 2007, p. 16). This is a good way to emphasize economic decline. This is a nostalgic way of viewing things wherein the lament is always that things are better in the past, prices are cheaper, living is simpler, but better and others. Increase in prices and living standards are emphasized, while the values exchanged for such increases are ignored such as improvements in goods and services (See Caplan, 2007, p. 17). As Caplan has stated in this article, these biases show that ââ¬Å"[p]eople do not grasp the invisible hand of the market, with its ability to harmonize private greed and the public interestâ⬠(See Caplan, 2007, p. 1). For the uninformed public, free market is the enemy. This belief translates into the policies that are adopted in a democracy. Since the power is now given to the people, policy choices by candidates are geared towards pleasing them. The best way to acquire votes is not to go against the wrong beliefs of people and to correct them, but to play up the same beliefs and use them to oneââ¬â¢s own advantage. Reference Caplan, Bryan. ââ¬Å"The Myth of the Rational Voter: Why Democracies Choose Bad Policies.â⬠How to cite Voter, Essay examples
Friday, December 6, 2019
Professional Skills for Information for UTM - myassignmenthelp
Question: Discuss about theProfessional Skills for Information for UTM. Answer: Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50. In this article, Zhen Chen, Fuye Han, Junwei Cao, Xin Jiang and Shuo Chen stated about network security problem that causes major security concern. Most of the network security breaches occur due to the phishing, spam, worms. The authors explained that new botnet attacks can further degrade the security network. This article provides a solution based on Unified Threat Management (UTM) as it connects the protocol and exchange network events. Key themes of this article are cloud computing, computer forensic, overlay network and botnet. This article has been taken the information through secondary sources. This article is relevant to the case study as it discusses network security system and the article has been written by famous writers and published by IEEE. Ahmed, M., Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security Its Applications, 6(1), 25. Authors explained in this article about network security and infrastructural concept of cloud computing. Global companies are taking help of cloud computing in network security and it completely depends on network architecture. Numerous cloud based services are provided by cloud and this article is perfect for case study as it states that security system is not robust and one can make it consistent and secure. Moreover, this article is relevant as it is related to computing concept of cloud computing. The authors collected the data from credible secondary sources. Key themes of this article are cloud services, network security and computer network and distributed computing. This article has been written by famous senior lecturer and consultants Monjur Ahmed and Mohammad Ashraf Hossain. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. This study provides a comprehensive and structured overview of network security and privacy of computer networking. Most importantly, this article primarily focuses on game theory. This article is a kind of exploratory article that tests some security and privacy issues through game theory. This article is relevant to the case study as it deals with network security and solutions towards it. Authors summarise the results of the tests and this article has taken the information from secondary sources. The article explains the terms like algorithms, design, security and economics. The authors are well known in their field of teaching and distinct universities from Australia, Switzerland and USA. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5. This article has been published by reputed Springer publication and authors are Keiko Hashizume and others. The key themes of this article are cloud computing, security, SPI (SaaS, PaaS, Iaas) model, threats in network and countermeasures for those. This article is relevant for the case study as cloud computing is one of the emergent technologies that could help in network security. The authors took help from secondary sources. This article can be reliable as it provides information on network security of Service Oriented Architecture, host application, data levels and network. He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future generation computer systems, 30, 116-126. This article is based on the subject of electrical engineering and computer science; however, mathematical ideas have been specified. This article has been published by the famous University of Twente. Most importantly, the authors used Listed-Rule firewalls. Various benefits of cloud networks and network security have been specified in this task. Tree-Rule firewalls provide network security and it is proved by mathematical solutions. This article is relevant for the case study as it deals with network security and authors have taken ideas from secondary sources. Distinct differences have been made between Listed-Rule firewall and Tree-Rule firewall. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. In this article, authors averred the concept of cloud computing in network security issues with flexible infrastructure investment. This article has been published by University of London Institutional Repository. The authors used the key themes like network protocol, vulnerabilities of cloud computing as it stores the data. The authors demanded that 91% of the European large organisation start using cloud storage for network security. This article is relevant as it states about computing resources and security issues. In case of network security, this article provides the solution of virtualization, privacy system and cloud computing. This article is reliable as the authors used the data through credible secondary sources. Kumar, S. N. (2015). Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1-11. This research article is about data security process used by various transactions through digital media. The electronic transaction process is used by e-commerce, organisational transaction and social networks. The author discusses the process cyber-criminals are used in data theft. The cryptography is controlled by network administrator and the process of data security does not only consist of the end system. This article is reliable as it is e-version of the article and the author uses various sources of secondary information. This article is relevant as it deals with network security with a broad range of cryptographic algorithms. The author uses networking application with various figures showing process of using. Shin, S., Wang, H., Gu, G. (2015). A first step toward network security virtualization: from concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), 2236-2249. This article starts with a notion that network security is getting more vulnerable as security devices are being hacked. The authors used prototype system in order to provide network security design called NetSecVisor. Network Security Virtualization (NSV) is the core concept of this article. This article is relevant as this one deals with network security and its countermeasures and networking. Key themes of this article are security response functions and prototype concept to gather results. This article is reliable as it uses vast sources of secondary information and has been published by IEEE.. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing. International Journal of Network Security Its Applications, 6(3), 45. This article is about recent issues in security management as it deals with big data and cloud computing. Moreover, authors stated the security issues that are associated with big data management, a giant storage of data. Data breach recently occurs in big data management. Most significantly, this article states solutions to the network security. The concept of Map Reduce, Hadoop Distributed File Systems has been discussed. This article is relevant to the case study as it deals with network security solutions. This article is reliable as the authors are lecturers in Texas University and the journal has been published by IJSNA. Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), 859-868. The concept that has been discussed in this article is different as it talks about wireless network and security breaches of these. The authors stated that Wireless Sensor Network (WSN) is not secure from data theft. This article also talks about security solution using various applications. This article is relevant to the case study as it deals with a security application that could be useful in security issues in WSN. The authors took the ideas from secondary sources and they used descriptive design technique. Moreover, this article is reliable as the authors are reputed and have been published by International Research Publication House. Reference List Ahmed, M., Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security Its Applications, 6(1), 25. Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5. He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future generation computer systems, 30, 116-126. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing. International Journal of Network Security Its Applications, 6(3), 45. Kumar, S. N. (2015). Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1-11. Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), 859-868. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. Shin, S., Wang, H., Gu, G. (2015). A first step toward network security virtualization: from concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), 2236-2249.
Subscribe to:
Posts (Atom)