Tuesday, December 31, 2019

Evaluation Of An Anecdotal Record - 1178 Words

During my observation of Grace, I used anecdotal records, checklists, rating scales, and a running record (Nicolson Shipstead, 1998, p. 136-140). My anecdotal record, checklist, rating scale and running record were all pilot tested when peers looked at them during an in class assignment. First, I will explain that an anecdotal record can be defined as a short written story of one incident that is developmental significance (Nicolson Shipstead, 1998, p. 151) This story is sort and records the child’s or children’s age and the developmental significance are stated. The second method is a checklist (Nicolson Shipstead, 1998, p. 158-172). A checklist is a list of behaviors/ noticeable behaviors. A checklist is easy to use and leaves†¦show more content†¦My running record lasted for nine minutes. During my running record, I just recorded the child s naturally occurring behavior. Data and Significance First I will go over my anecdotal records. First to deal with the topic I chose a cognitive development related to memory. Two of these anecdotal records show the development of cognition. Grace 4;6 after Grace picked out the book she wanted read to her, the caregiver was reading the cat in the Hat† to Grace. After the cat fell down Grace said â€Å"I bump head†, talking about an event that happened in the past. Psychosocial development -- self-concept. Cognition – memory. Grace 4;6 When 13-month-old Luke arrives, Grace runs over to her caregiver and touches the red vest the caregiver is wearing. â€Å"Luky too!† She exclaims. Indicating that Luke is also wearing a vest. Luke is wearing an orange vest. Cognitive development -- classification. The first shows how Grace remembers a situation where she bumped her head like the Story although this is an example of self-concept it is also an example of memory specifically recall memory. The second example also fits in with cognitive development. Grace is classified the vests Luke and her caregiver were wearing. The second method I use during my observation is a checklist. Grace used language to express how she felt. This was very clear from my checklist. One of the things on my check list was â€Å"child

Monday, December 23, 2019

The Developmental Period Of A Child Was Truly Misunderstood

For many years of human history, the developmental period of a child was truly misunderstood. The mind of a developing child was thought simply to be a miniature model of the fully developed engine of thinking. It is often hard to remember the earliest stages of the human development process. However, revered researchers like Jean Piaget, John Kohlberg, and Erik Erikson have made extensive efforts in observing the different stages of human development. In punctuating these stages, the consensus has demarcated the expanse of human growth into four major stages: Infancy (birth-2 years), Preschool (3-6 years), Middle Childhood (7-12 years), and Adolescence (12-18). The specific contributions made by the Psychologists above mentioned†¦show more content†¦The extent of my life socially was completely dependent on the relationship between me and my caretakers. According to Erikson, this is understood as a period of trust and mistrust, deeming me as completely reliant on who ever is responsible for me to provide, invoking trust, or to neglect, causing a sense of mistrust. But while I was coming along physically, cognitively, and socially, I was also beginning to establish an understanding of the world morally. By the standards of Kohlberg, this span of my life falls comfortably within the preconventional stage of development. This asserts that I justified my actions on the sound principle of obedience and punishment, meaning that the sole motivation for my actions was founded on avoiding punishment or seeking praise and were not any deeds done by my own rationale. Now I certainly cannot attest to remembering this stage of my life, developmentally, as I grow older, the more that I can remember to this day. The next stage of life that I passed through can be categorized as the Preschool period and lasts for the ages of 3-6 years old. Throughout these years, I continued to refine my motor skills and was very interactive with my environment because of my further advanced mobility. The physical development of children in this stage is known to taper off but still be quite apparent, which aligns quite similarly to what was described toShow MoreRelatedNarcissism: Psychological Theories and Therapeutic Interventions in T4446 Words   |  18 PagesNarcissism: Psychological Theories and Therapeutic Interventions in the Narcissistic Disorders Introduction Understanding the Narcissistic Phenomenon The so called narcissistic personality disorder is a complex and often misunderstood disorder. The cardinal feature of the narcissistic personality is the grandiose sense of self importance, but paradoxically underneath this grandiosity the narcissist suffers from a chronically fragile low self esteem. The grandiosity of the narcissistRead MoreExploring How Language Acquisition Takes Place On A Second Language Or If It Is Possible?2812 Words   |  12 Pagesultimate attainment is possible in a second language or if it is possible at all. Exploring how language acquisition takes place in a child’s life to how similar it is to second language acquisition in an adult’s life. By looking at the critical period in ones life, pieces will start to form together making it quite possible to believe that the theory of ultimate attainment actually does exist and that it may or may not be possible in a second language depending on the circumstances and the humanRead MoreA Brief Note On Depression And The Depression2842 Words   |  12 Pagesseveral episodes throughout their lifetime. Persistent depressive disorder is a depressed mood that lasts for at least two years or longer. A person that is diagnosed with this kind of depression may have episodes of major depression along with periods of less severe symptoms, but these symptoms must last for two years. Postpartum depression is brought on by hormonal and physical changes and the new responsibility of caring for a newborn. According to Everyday Health, 85% of new moms feel some sadnessRead MoreAbnormal Psychology. Classification and Assessment of Abnormal Behavior20707 Words   |  83 Pages99–100 SUMMING UP 100–101 T R U T H or F I C T I O N â€Å"Jerry Has a Panic Attack on the Interstate† Interviewer: Can you tell me a bit about what it was that brought you to the clinic? Jerry: Well, . . . after the first of the year, I started getting these panic attacks. I didn’t know what the panic attack was. Interviewer: Well, what was it that you experienced? Jerry: Uhm, the heart beating, racing . . . Interviewer: Your heart started to race on you. Jerry: And then uh, I couldn’t be in oneRead MoreIntercultural Communication21031 Words   |  85 PagesIntercultural Communication 1. A review of the development of intercultural communication study Although the phenomenon of intercultural communication is as old as human society, the study of intercultural communication is of recent origin. It was first started in the United States. Communication scholars commonly recognize E. T. Hall as the father of the field of intercultural communication study (Condon, 1981; Dodd, 1982; Gudykunst, 1985; Singer, 1987). He conceptualized this new field ofRead MoreOrganisational Theory230255 Words   |  922 Pagestheory. It is both rigorous and accessible, clearly and unashamedly pitched for readers who wish to engage with theoretical issues whilst also maintaining a practical focus on why organization theory matters. I felt in good hands here, confident that I was being offered a deeply informed, reliable and intelligently constructed account. The opening chapter carefully and helpfully explains terms, including ‘theory’ and ‘epistemology’ that can form an unexplored bedrock to texts in the field. It then offersRead MoreStrategic Marketing Management337596 Words   |  1351 Pages Strategic Marketing Management Dedication This book is dedicated to the authors’ wives – Gillian and Rosie – and to Ben Gilligan for their support while it was being written. Acknowledgements Our thanks go to Janice Nunn for all the effort that she put in to the preparation of the manuscript. Strategic Marketing Management Planning, implementation and control Third edition Richard M.S. Wilson Emeritus Professor of Business Administration The Business School Loughborough University Read MoreLibrary Management204752 Words   |  820 Pages 240 . . . . . 247 . . . . . 273 . . . . . 278 . . . . . 284 . . . . . 286 . . . . . 359 . . . . . 378 . . . . . . . . . . . . . . . . . . . . 383 389 394 399 . . . . . 469 Preface Thirty years ago, when the first edition of this book was published, little had been written about the management of libraries and information centers. Those seeking advice, examples, and information about how to manage libraries were forced to search for answers in the literature of public administrationRead MoreDeveloping Management Skills404131 Words   |  1617 PagesPermissions Department, One Lake Street, Upper Saddle River, New Jersey 07458. Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Whetten, David A. (David Allred) Developing management skills /David A. Whetten, Kim S. Cameron.—8th edRead MoreFundamentals of Hrm263904 Words   |  1056 PagesFinley Dorothy Sinclair Sandra Dumas Susan McLaughlin Kevin Murphy Laura Ierardi Allison Morris Hilary Newman mb editorial services David Levy  ©Michael Eudenbach/Getty Images, Inc. This book was set in 10/12 ITC Legacy Serif Book by Aptaracorp, Inc. and printed and bound by Courier/Kendallville. The cover was printed by Courier/Kendallville. This book is printed on acid free paper. Copyright  © 2010, 2007, 2005, 2002 John Wiley Sons, Inc. All rights reserved. No part of this publication may be reproduced

Sunday, December 15, 2019

Website and Shopping Cart Free Essays

I am the owner of a clothing store along the jersey shore boardwalk and decide to engage in e-commerce AFEISHA HERRY STRAYER UNIVERSITY MICHAEL HOWARD BUS107 11/26/2011 I am the owner of a clothing store along the jersey shore boardwalk and decide to engage in e-commerce I am the owner of a small clothing store along jersey shore and I am being offered 1000 for my domain name that I will use in the process of e-commerce. Firstly the domain name that I will be using must be pronounceable, brandable, makes sense and also be available, if my domain name is effective in helping the business to grow, I will not sell it. An effective domain name is not easy to compose and sometimes obtain, from my experience I know that a great domain name creates a good impression online and makes you influence people and eventually they will buy your products if you are selling something, all of this I would have taken into consideration before I created a domain name, from my point of view I would not sell an effective domain name if I know it will give my business a boost. We will write a custom essay sample on Website and Shopping Cart or any similar topic only for you Order Now Also I will look at the bigger picture I know that I can make a bigger profit if I keep my domain name than to sell it for 1000 which I might not even make a profit on. On the other hand it’s ok if someone has a good domain name and wishes to sell it I don’t see it as being unethical, it all comes down to a person’s decision on how effective and useful the name is to them and if they will benefit from which ever decision they make. The e-commerce software you will be using must provide a catalog display, shopping cart capabilities, and transaction processing. The convenience and usability for the customer are benefits of these functions. State how each of these functions could be beneficial to your business. Catalogs offer consumers a wide range of products of either generalized or specialized nature, the shopping cart acts as a mediator between payment processors and website as well as a janitor helping customers finds the amenities provided. A shopping cart that’s easy to navigate and flexible enough to cater for the personal needs of the customers, improves the site usability and makes online shopping a pleasant experience for the customers. In the absence of a shopping cart the customers wouldn’t have a place to store and manage multiple items and would not have to order separately. For a business the shopping cart software organizes the information for successful transactions and ensures that things run orderly and smoothly. It enables the employer to handle the customers more easily with shopping cart integration; it would really be hard for the business operators to manage their client if every person would have to order every time he chooses a product. Business owners are benefited due to a better functionality that comes with the majority of shopping cart systems that offer features such as back end marketing, wish list and inventory tracking. A good quality shopping cart offers rich functional capabilities to the e-commerce business such as a concise catalog management and a simplified business management by producing a wide array of reports to manage the finances better, monitor sales and provide improved customer service. A shopping cart removes any obstacles in the way of the online customers and the growth of an online business. Transaction processing is a type of computer processing that takes place in a computer user. Every business has to deal with some form of transactions, how a company decides to manage these transactions can be a important factor in the success. As a business grows its number of transactions usually grows as well . Transaction processing is a tool that can help growing business deal with their increasing number of transactions. The advent of online technology has made the international distribution of goods and information a quick and often simple process. The emergence of features like secure servers, one click shopping, and tracking of packages over the internet have helped make them feel more at ease with the process. Transaction processing offer a rapid processing for any business, reliability, standardization, controlled access, transaction processing qualifiers, atomicity consistency, isolation and durability. Transactions processing support routine day to day activities that occur in the normal course of business that help the company add value to its product and services, business expect transaction rocessing to accomplish a number of specific objectives process data generated by and about transactions, maintain a high degree of accuracy and integrity, produce timely documents and reports, increase labor efficiency, help provide increased service, help build and maintain customer loyalty and achieve competitive advantage. Creating an effective presence on the web using revenue the seller establishes a brand image, and then uses the strength of that image to sell through printed catalogues mailed to prospective buyers. Buyers place orders by mail or by calling a telephone number provided an effective site is one that create an attractive presence that meets the objectives of the business or organization by attracting visitors to the web site, making the site interesting enough that visitors stay and explore, convincing visitors to follow the sites links to obtain information creating an impression consistent with the organization is desired image, building a trusting relationship with visitors and encouraging visitors to return to the site. Business accomplishes all of their goals for their website in their current web presence. Having a site that is accessible and easy for people to use can improve your web presences. Even making sure that the site encourages visitors to trust and even develop feelings of loyalty towards the organization behind the web site. An effective site should give the visitor easy access to the organizations history, a statement of objective or mission statement, information about products or services, financial information and a way to communicate with the organization. Presentation is also important, but so is realizing that the web is an interactive medium. Web site usability is important for a company on the World Wide Web a company is web site is the only point of contact that a company has with anyone who is interested in it. Thus companies rely on their web presence in order to achieve their online goals, be they commercials or otherwise. A company sets its usability goals through a combination of user proofing. The company then needs to qualitatively and quantitatively specify these goals then prioritize them so as to determine its usability goals. According to Nielsen and loranger the three most important characteristics that distinguish a usable web site are simplicity, naturalness and ease of use. When good usability is implemented in conjunction with good web design characteristics, especially visual attractiveness, it results in a web site that positively affects users behavior and the trust that a user has in the company to whom the website belongs. This trust is also affected by the user’s perceived usability that is the perception that the user has about the usability of a website before he/she actually makes use of it. Researchers such as safavi have proven that website having a user friendly design and an easy to use interface increases user satisfaction. Research also shows that the importance of web site usability increases in relation to the competition that exists within the environment that website is operating in. I can find no better quote than jakob Nielsen’s famous phrase that on the web â€Å" the user experiences usability first and pays later† meaning that users are always at a click away from leaving a website they are in if they do not find it usable. To develop a web marketing strategy for my business I will first have considered who is my customer, what I have to offer and understand where I am and what I can do helps me to create an effective marketing strategy. In identifying the market segment that I will target I must do some research on my market , identifying who are my main competitors are, what are they doing online, what are their weaknesses and strength, do they offer a guarantee, is their product really good and do they build links constantly or not. Also who are my favorite customers, what forces them to buy one or another product, read reviews, forums, testimonials to find out as much as I can about my target market. After I have performed a through online market research it’s time to systematize the data I have. What are the main strengths and weaknesses of my competitors? My marketing strategy for the company will focus on the market segment of an entire family with young children, to reach that segment my business will feature clothing for every category of the family, fashionable and affordable is the key to attracting customers. To advertise my business on the web firstly I will create a very effective website with a very outstanding domain name, a creative and innovative web page, and informative information about my business. After creating an effective website how I display the products on the site has to do with how I would advertise, my advertising has to be interested , entertaining and capturing so that my target market would want to buy my product by just hearing about out. A good advertisement helps to gain customers. Reference Brewer, it, 2003 website usability of the www as practice. In first Latin American web congress la- web’03. Santiago, Chile, 2003 Belanger,F , et, al,2006,website success metrics, addressing the duality of goals. Communication of the acm. 4a Baker, Michael the Strategic Marketing Plan Audit 2008. ISBN 1902433998 * Laermer, Richard; Simmons, Mark, Punk Marketing, New York  : Harper Collins, 2007 ISBN 978-0-06-115110-1 (Review of the book by Marilyn Scrizzi, in Journal of Consumer Marketing 24(7), 2007) Schneider 2011/9th edition pg 140 How to cite Website and Shopping Cart, Papers

Saturday, December 7, 2019

Addressing Cloud Security Computing Issues -Myassignmenthelp.Com

Question: Discuss About The Addressing Cloud Security Computing Issues? Anawer: Introduction: Big Data is considered to be very much important for the IT world. For this reason, the Big Data cannot be overlooked in the IT world. The main reasons which lies behind this is the prominent increase in the data along with the services that are related with this data. So it becomes increasing important to explore this field along with looking into the matter of improving the ways of Big data analysis especially in the clouds (Purcell 2014). These two key aspects are the big data and the cloud computing. The Paper An Evaluation of Major Threats in Cloud Computing Associated with Big Data by Kamalpreet Kaur, Ali Syed, Azeem Mohammad, Malka N. Halgamuge states that most of the organisations relies on the power of the databases. And when the organisations outsources their database in the form of big data then they transfer all their data to the cloud (Hashem et al. 2015). The paper also indicates that the security challenges act as one of the most prominent issues related to the cloud c omputing and big data. Some of the major issues related to big data were also observed in this paper. The paper also indicates that due to various security threats clouds are not getting adopted on a larger scale despite of the presence of various advantages. The data sources have been analysed in this paper which helped a lot in identification of the gaps. The report provides the necessary solutions for the issues related to the analysis of the big data in the cloud. Literature review: A very important role is played by the big data in the world of business. this is due to fact that storing of the complex data in a secure way is one of the crucial aspects of the corporate operations. Big data refers to the huge amount of data in the structured, semi-structured, and unstructured form (Ji et al. 2012). There are 3Vs in the Big data and this mainly includes the high volume of data, high velocity of data and high variety of different types of information that are in need of getting mined. But the specific quantity of data is not mentioned anywhere, and the data can be in petabytes or Exabyte (Demirkan and Delen 2013). Peter Skomoroch stated that it was not possible to process the big data due to the difficulty, proneness to errors, and large time consuming nature of the data. This was difficult before the invention of the various data technologies like the MapReduce and Hadoop. These new technologies have greatly helped in the processing of the datasets than the tradit ional processing tools. There are many organisations which are associated with the collection of the complex data. This data is collected by the doing the worldwide surveys so as to improve the process of decision making that are extremely important for the sustaining of the healthy future for the organisations business process (Fernndez et al. 2014). It can be stated that there are various security challenges which comes up with the use of the clouds. Analysis of The Outsourcing Data and The Applications: Cloud computing is something which is capable of providing access to the data present in the clouds anytime anywhere. But the challenge remains that is checking of the authorized entities (Inukollu Arsi and Ravuri 2014). The significant challenges arising due to the monitoring of the clouds and many more results in the suffering of the cloud computing in reaching its full potential. So the users have to rely on the third part and the cloud providers for the purpose of making their data secure along with maintenance of the communication related to the reliability with the customers. When a user is making use of the cloud for the purpose of making decisions regarding the complex data and the platforms then it might seem that there is no other computing which has been done here (Demchenko et al. 2012). This happens due to the fact that there is no existence of any technical mechanism for the prevention of the accessing the data of the users unethically by the cloud providers. So the sig nificance of building up a new layer increases for the purpose of supporting a contractual negotiation phase between the providers of the cloud and the end-users. So it can be concluded that there is an essential need for the combination of technical as well as non-technical mechanism for the purpose of gaining the trust towards the use of the cloud computing environment. Analysis of The Security and The Privacy Challenges: Cloud computing consists of a service level agreement which is a contractual agreement used for the building up of new layers for the purpose of supporting a contractual negotiation phase. This phase mainly exists between the cloud customers and the cloud providers. Still the difficulty of bargaining remains regarding the security, privacy, as well as the trust (Zissis and Lekkas 2012). Despite of all this there are still some ways in which can be used for the purpose of assuring the customers. This assurance is mainly given for the purpose of making the customers understand that the cloud service providers provides services which is subjected to the contractual agreement initially this makes the process difficult. Access control: The need of credential based access control is increasing in cloud computing. The main reason for the existence of this for the accessing the control and the services so as to make sure that the important as well as the provenance information of the customer does not get leaked (Hashizume et al. 2013). Trust management: There are various way of managing the trust with the customers. there is an essential need of building up new policies for access control (Chen and Zhao 2012). This should be done instead of telling the customers that their data will never get breached for the purpose of management of the trust among the customers. Authentication and identity management: The main reason lying behind the use of identity management is for the purpose of determining an authenticate user along with the services (Ren Wang and Wang 2012). This is mainly based upon the credentials and the characteristics of the users. Privacy and protection of the data: Among the discussed challenges privacy is one of the biggest issue. There are many organisations which are not comfortable with the storing of their confidential data outside their premises. By use of the outsourcing data shared infrastructure, there is a risk of putting the customers background information at risk (Almorsy Grundy and Mller 2016). This is mainly used for various purposes and this mainly includes the auditing, tracing back along with the historically based access control. Along with this it also shows the balance that exists between the personal information of the client and the privacy. This is one of the biggest drawback that exists in the cloud environment. Analysis of the method and the material used in this paper: The research method that has been used in this paper for the purpose of interpreting the trends of the data sourced is by analysing the contents. This analysis is mainly done so as to find out the various proceedings along with measuring the processes so as to assist in the solving of the perplexing and the complex issues (Ryan 2013). A historic logic method has been used in this research. This will be greatly helping in assisting the interpretation of the findings regarding the security matters in the cloud computing that has discovered in the previous researches. By the process of evaluation of the gathered information and opinions form the experts has greatly helped in the study so as to shed a light in the area of cloud computing for further developments. Analysis of the Results: The results help in concluding that there are various domains in the cloud environment and these domains faces various security as well as privacy challenges. For this reason, there is an essential need for the users to thing before migrating their data to the cloud (Srinivasan et al. 2012). The challenges regarding the security can be categorised into various type and this includes the network level, data level, authentication level and many more. The major concern beside all this is the security of the sensitive information. For the purpose of enhancing the security it is becomes necessarily important to provide the access control along with the authentication and authorisation of the data that are to be stored in the clouds. CIA or Confidentiality, Integrity and Availability are the three major elements involved in the information security (Behl and Behl 2012). Along with this it should also be ensured that these three elements are being provided to the customers by the cloud prov iders. The paper also provides a figure which shows that the level of integrity is 24%, level of confidentiality is 31% and the level of availability is 19%. This results to be most threatening attributes when compared with the other attributes. The other attributes mainly include the usability, accountability, security and reliability. The biggest risk included in cloud computing are the security of the data, integrity and recovery. Along with this it is also important to know about the location in which the data is being stored and what are things that are being done with the stored data (Ali Khan and Vasilakos 2015). Besides all this it is also important to know what will happen if the cloud fails and if the data are being backed up or not. Third party networks are used by the cloud computing technology for the purpose of accessing the cloud services. This gives arise to various risks while accessing the services in the clouds. The users need to compare the various cloud services before moving into the cloud. The cloud services are becoming much more popular as they are much more convenient along with being affordable and provide a space for storage. Along with the above discussed issues there are also various attacks to the cloud system. This attacks mainly includes the loss of data, denial of the service, unauthorized access to the data, unauthorized modification and many more. According to Bleikertz et al. (2010) there are various advantages of using the cloud computing and this advantages are followed by the various challenges like the security, privacy and the security. This are the main reason due to which the adaptation of cloud computing has been prevented. The paper also expresses the fact that they are highly adoptable. Along with these the complex cloud computing administrations are arranged by making use of the web utilization by the clients or the cloud customers. The paper also states that in case of any wrong designing of the cloud computing by the customers increases the vulnerabilities regarding the security issues (Rao and Selvamani 2015). A particular methodology has been used in this paper so as help the audie nce in understanding the issues that might arise from the side of the user and the server. The main strength of the work done by this paper is that it provides a robust analysis of the various vulnerabilities along with the security attacks. Initially this analysis will be helping the vendors in the enhancing various security policies. Lombardi et al. (2010) discussed about a new architecture and transparent cloud protection system (TCPS) for the purpose of improving the cloud resources security due to the protection problems integrity in the cloud environment. It was also guaranteed by them that they have been able to identify the problems related to integrity protection along with addressing the issues related to integrity. They have also proposed a framework in which the TCPS can be utilized for the purpose of watching the integrity of the visitor along with keeping of honesty and virtualization. For the purpose of managing the image system in TCPS, the image filters have been used by them along with the scanners so as to detect the malicious image in order to prevent t hem from vulnerabilities and the security attacks. The main strength of the work done by Lombardi et al. is that it has proposed instrument that provides an enhanced rate of security, transparency and interrupt identification system. Along with this the limitation of this work is that they have not tested it to an expert cloud computing situation nor they havent accepted their work. Method for the Solving of problem: Some of the suggested method related to the solving of the issues during the use of big data in the clouds are listed below: Shipping of the Disk Drives to the Clouds: The problems related to problems in the plumbing can be solved by shipping the disk drives to the cloud environment. This will be helping a lot. Use of Data Mining techniques: The problem related to the malware diffusion can be tackled by making use of the data mining technique. This technique will greatly help in the identification of the malware in the cloud and eliminate the treats by the cyber criminals which happens to be a threat regarding the security and privacy of the customers (Bhadauria and Sanyal 2012). Use of the Access Control Techniques: For the purpose of securing the infrastructure of the big data systems there is a need of securing the distributed computation as well as the data stored. For the purpose of securing the data itself the information dissemination should be preserving the privacy along with this the sensitive data should be also protected by the use of cryptography and granular access control techniques (Modi et al. 2013). Enormous volume of the data necessities needs to be managed which are scalable along with the enabling of the efficient audits as well as the data provenance. Modelling: There is a need of validating the threat models which will be mainly covering the various types of cyber-attacks or any kind of data leakages which are mainly caused by the cybercriminals. Possible solutions: After the formalization of the threat model there is an essential need of finding the tractable solution. Implementation: The solution that are found out are to be implemented in the existing technologies and the infrastructure which will be initially followed by the comparison of the solutions with the different types of threat models. Different evaluation criteria for addressing the Security of the Big Data: After analyzing the security challenges related to big data the following solutions can be applied so as to eliminate all the risks. Some of the solutions are listed below: One of the major thing that is to be included in the new security solution is the extension of the secure perimeter of the big data from the enterprise to the public cloud (Puthal et al. 2015). By adopting this method, a new trustful data provenance mechanism will be created that will be initially helping in the mitigation of the risks related to the DDoS attacks which are mainly launched against the infrastructures of the big data. There is a mandatory need of addressing the legal requirements by the mechanisms regarding the handling of the data. One of the best way of securing the big data is by the implementation of the secure Information technology. This encryption technology is mainly used for the purpose of securing the confidential data and this might include the PII, PHI, IP along with various encryption keys and many more (Arora Parashar and Transforming 2013). This need to be done so as put the correct locking and unlocking mechanism for the data. For this process to become successful there is an essential need for making this mechanism transparent to the end-user along with having a low impact of the performance and scalability of the data as well. Beside the security recommendations there is an essential need for considering the security of the IT infrastructure itself. The common practice regarding the security includes placing of the security controls at the very edge of the network. In case if the security perimeter is violated by the attacker then all the data present inside will be accessed very easily (Ahmed and Hossain 2014). This leads to the need of new security measures which can be done by moving the security controls near the big data. By proper monitoring, analyzing and learning of the usage of the data along with the access which is one of the important aspect for the continual improvement of the security of the infrastructure that is holding the data. This will also leverage the security measures that are existing right now. Conclusion: This report helps a lot in identifying the various gaps along with the various security challenges that are related big data in the clouds. The report also helps in understanding the fact that cloud computing is one of the emerging technology which is being adopted by various organizations. This organizations design and develop their system for the purpose of stay ahead in the market of competition. Besides the security challenges there are also other technologies that are very much problematic and this includes the database, networking, virtualization and also the operating system as well. This paper has used different studies for the identification of the major problems related to the research. Along with this it also helps in identifying the major things that are to be taken into account so as to make sure that the big data are being moved toward the success. The report also helps in concluding that in the Relational Database Management RDBM the problem regarding the protection of the system from any kind of attack by making use of the resources along with which the only one important problem is the mitigation of the risks. Various mitigation problems have been discussed in this report and by the adaptation of this methods a great amount of risk will be eliminated. References: Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the cloud.International Journal of Network Security Its Applications,6(1), p.25. Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges.Information Sciences,305, pp.357-383. Almorsy, M., Grundy, J. and Mller, I., 2016. An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), pp.1922-1926. Behl, A. and Behl, K., 2012, October. An analysis of cloud computing security issues. InInformation and Communication Technologies (WICT), 2012 World Congress on(pp. 109-114). IEEE. Bhadauria, R. and Sanyal, S., 2012. Survey on security issues in cloud computing and associated mitigation techniques.arXiv preprint arXiv:1204.0764. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Demchenko, Y., Zhao, Z., Grosso, P., Wibisono, A. and De Laat, C., 2012, December. Addressing big data challenges for scientific data infrastructure. InCloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on(pp. 614-617). IEEE. Demirkan, H. and Delen, D., 2013. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud.Decision Support Systems,55(1), pp.412-421. Fernndez, A., del Ro, S., Lpez, V., Bawakid, A., del Jesus, M.J., Bentez, J.M. and Herrera, F., 2014. Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks.Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,4(5), pp.380-409. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of big data on cloud computing: Review and open research issues.Information Systems,47, pp.98-115. Hashizume, K., Rosado, D.G., Fernndez-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), p.5. Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), p.45. Ji, C., Li, Y., Qiu, W., Awada, U. and Li, K., 2012, December. Big data processing in cloud computing environments. InPervasive Systems, Algorithms and Networks (ISPAN), 2012 12th International Symposium on(pp. 17-23). IEEE. Lombardi, F., Di Pietro, R. (2010, March). Transparent security for cloud. InProceedings of the 2010 ACM symposium on applied computing(pp. 414-415). ACM. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), pp.561-592. Purcell, B.M., 2014. Big data using cloud computing.Journal of Technology Research,5, p.1. Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud computing.Procedia Computer Science,48, pp.204-209. Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud.IEEE Internet Computing,16(1), pp.69-73. Ryan, M.D., 2013. Cloud computing security: The scientific challenge, and a survey of solutions.Journal of Systems and Software,86(9), pp.2263-2268. Shaikh, Farhan Bashir, and Sajjad Haider. "Security threats in cloud computing." InInternet technology and secured transactions (ICITST), 2011 international conference for, pp. 214-219. IEEE, 2010. Srinivasan, M.K., Sarukesi, K., Rodrigues, P., Manoj, M.S. and Revathy, P., 2012, August. State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. InProceedings of the international conference on advances in computing, communications and informatics(pp. 470-476). ACM. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.