Saturday, May 23, 2020

Statement of intentions Free Essay Example, 1000 words

However, they opened my eyes to new details in life and my dream career. It took me more than a year to settle in, but I have managed to score the required GPA to ensure I can further my education in Business Administration. During my undergraduate years at the University of San Diego, I have had a number of academic, research and work experiences that have strengthened my desire to pursue a Masters Degree in Business Administration. These opportunities have molded my specific areas of interest within the field of Business Administration. My intention is to have more knowledge in areas such as Decision-making for growth and management, Accounting, Study of futures and options, Supply chain management, corporate finance, Management information systems and on Issues in management and organizations. A Masters Degree will give me the theoretical understanding, and in depth idea of useful approaches in managerial decision-making and research skills to facilitate me to expand my skills i n the core areas of financial stratagems and global corporate financial operations. I would like to explore explicit problem areas such as the use of quantitative analysis to perceptive various issues in global finance and improving decision-making and effect of increase in international communications on global finance resolutions. We will write a custom essay sample on Statement of intentions or any topic specifically for you Only $17.96 $11.86/pageorder now My research interests are overseas exchange markets, hedging overseas exchange threat, global capital budgeting, corporate fiscal strategy such as mergers and acquisitions. I have six years working experience in various fields in the area of Business Administration. These have helped me to gain first hand knowledge and experience from some of the best individuals from the field. I particularly worked in the Information technology and finance area hence preparing me for the master program with specialization in finance. Throughout the six years that I have worked, I encountered so many challenges that led me to decide to pursue a master’s degree in this field as soon as I complete my bachelors. To achieve my career goals, I need to learn much more about current developments and techniques in finance, financial markets and financial applications and acquire hands-on experience in financial analysis. The experience away from class has been priceless in terms of additionally developing both my welfare and skills while solidifying my resolution to pursue a master’s degree in Business Administration, Finance option. Therefore, I am now eager to begin an extra active pursuit of my long-term goals by commencing Master’s study that emphasizes and integrates all aspects of Business Administration, Finance Option.

Tuesday, May 19, 2020

How to Find the Subject of a Sentence

In English grammar, a subject is one of the two main parts of a sentence. (The other main part is the predicate.) The subject is sometimes called the naming part of a sentence or clause. The subject usually appears before the predicate to show (a) what the sentence is about, or (b) who or what performs the action. As shown below, the subject is commonly a noun, pronoun, or noun phrase. Types of Subjects A subject may be one word or several words. The subject may be just a single word: a noun or a pronoun. In this first example, the proper noun Felix is the subject of the sentence: Felix laughed. In the next example, the personal pronoun he is the subject: He laughed. The subject may be a noun phrase — that is, a word group made up of a head noun and any modifiers, determiners (such as the, a, her), and/or complements. In this example, the subject is The first person in line: The first person in line spoke to the television reporter. Two (or more) nouns, pronouns, or noun phrases may be linked by and to make a compound subject. In this example, the compound subject is Winnie and her sister: Winnie and her sister will sing at the recital this evening. A Note About Subjects in Questions and Commands In a declarative sentence, as weve seen, the subject usually appears before the predicate: Bobo will return soon. In an interrogative sentence, however, the subject usually appears after a helping verb (such as will) and before the main verb (such as return): Will Bobo return soon? Finally, in an imperative sentence, the implied subject you is said to be understood: [ You] Come back here. Examples of Subjects In each of the following sentences, the subject is in italics. Time flies.We will try.The Johnsons have returned.Dead men tell no tales.Our school cafeteria always smelled like stale cheese and dirty socks.The children in the first row received badges.The birds and the bees are flying in the trees.My little dog and my old cat play hide-and-seek in the garage.Could you carry some of these books?[You] Go home now. Practice in Identifying Subjects Using the examples in this article as a guide, identify the subjects in the following sentences. When youre done, compare your answers with those below. Grace cried.They will come.The teachers are tired.The teachers and the students are tired.His new toy is already broken.The woman in the back of the room asked a question.Will you play with me?My brother and his best friend are forming a band.Please be quiet.The old man at the head of the line was  holding a Darth Vader  lightsaber. Below (in bold) are the answers to the exercise. Grace  cried.They  will come.The teachers  are tired.The teachers and the students  are tired.His new toy  is already broken.The woman in the back of the room  asked a question.Will  you  play with me?My brother and his best friend  are forming a band.[You]  Please be quiet.The old man at the head of the line  was  holding a child  by  each hand.

Monday, May 11, 2020

The Importance Of Motivation As A Teacher - 1512 Words

An Introduction to the Importance of Motivation As explained by Lou Holtz, â€Å"[i]t’s not the load that breaks you down, it’s the way you carry it.† His statement is true for the importance of motivation. As a teacher candidate, learning the concept of motivation is crucial for my well-being and for the future of my students. The way that students are taught and encouraged have a huge impact on their careers and their life. In this paper I will be exploring how I was motivated during my earlier years and how the motivation shifted as my education progressed. I will also be discussing the theories that I believe would have benefited my learning experience from had they been implemented in the classrooms. In fact, the way that careers and†¦show more content†¦Our schools had a special community for students who were athletes and it was a very friendly, outgoing, and fun environment and encouraged me to remain positive even if I did end up losing. I feel as if this feeling of belongingness was subconsc iously an intrinsic and extrinsic motivator as it made it enjoyable that the entire team functioned together and fit seamlessly. The motivations kept my interest in the sports and to this day I appreciate the different experiences I gained through athletics in school. On the other hand, I recognize that I was still motivated by my teachers’ and parents’ enthusiasm when I did well on exams and assignments. It was rewarding to see that I, as a first-generation immigrant, was able to do as well and sometimes better than my peers. My parents were not able to help me with my assignments majority of the time and I was still able to keep up with those who had more resources. That was another external motivator for me, knowing that my parents would feel accomplished that they were able to raise a child in the way that they hoped to. My parents only wish for me is to have the maximum opportunities as possible as someone who is Caucasian, even though they were not able to directly help with it. I did not see it as a competition, but rather that I was climbing steps that made it easier for my parents to bare with the difficulties that they were facing, living in a foreign place. All three of the examples givenShow MoreRelatedMotivation for Students in the Classroom1484 Words   |  6 PagesIntroduction As educators we need to constantly strive to maximize the potential of our students. In my opinion one of the most effective ways to maximize learning is to motivate in the classroom. Even though most educators would agree that motivation in the classroom is an effective strategy to maximize learning as a whole we do not emphasize and use this strategy enough. There are several reasons why educators do not take advantage of this good teaching strategy; some of these reasons areRead MoreStudent Engagement Is An Ideal That Should Be Strived For The Classroom Environment1406 Words   |  6 Pagesby teachers in the classroom, as it provides reassurance of their effectiveness. A student’s engagement in learning can directly be linked to their motivational levels as motivation express the students desire to learn and progress in their educational studies. One might struggle to understand the best choice of strategies or concepts in order to facilitate engagement of learning in the classroom environment. Great diversity exists within the various aspects of student learning, so a teacher shouldn’tRead MoreEffective Reading and Writing Instruction Essay1231 Words   |  5 PagesDespite the importance of writing, many students are performing below grade level and lack the necessary skills needed to be successful (Zumbrunn Krause, 2012; Santangelo Olinghouse, 2009). There are many factors that shape students’ writing development but there are others that contribute to students’ writing problems. According to Graham (2008) and Zumbrunn Krause (2012), students and teachers both struggle to grasp the concept due to the complex nature of writing and writing instructionRead MoreMotivation in Physical Education1719 Words   |  7 PagesMotivation in Physical Education Problem Statement The health benefits of physical activity are well documented to date. Researchers also are fairly confident as to how often, how much, how long, and what types of activity one must engage in for health enhancing results. Therefore, the reasons to become or to stay physically active are inescapable, and the opportunities to practice health enhancing behaviors are innumerable. The United States Department of Health and Human Services (HHS)Read MoreTechnology In The Classroom1000 Words   |  4 Pages The school district that I currently teach in is a small rural school district in eastern Colorado. Students are performing below state standard expectations on standardized test scores. Many teachers in the district do not use technology in their classrooms. Many teachers are older teachers who have been in the district for several years and teach the same way they did when they first started teaching. I am part of the district’s technology committee. It is a wid ely held belief that ifRead MoreThe Importance Of Learning Motivation In Education862 Words   |  4 PagesThe importance of learning motivation in education The importance of learning motivation in education is a change of energy in a person which is marked by the emergence of feelings and reactions to achieve a goal. The instructors assignment isnt simply to dealing with training works out, inquiring about, creating, and dealing with an instructive organization, particularly understudies. Instructors are likewise in charge of producing learning, propel students. First of all, before the learning processRead MoreGoals Of An Educational Environment Essay1483 Words   |  6 Pagesstudents toward environmentally friendly behavior change. The need for student motivation in the high school setting is attributed to the fact that motivation creates positive experience, which helps in improving learning outcomes. Actually, students with positive experiences usually report better attitudes and increasingly positive expectations in their learning process. Through effective motivation of students, teachers and school administrators can close the gap between the actual students’ achievementsRead MoreSelf-Determination Theory in Action Essay682 Words   |  3 PagesSelf-determination theory (SDT) is a theory of motivation that allows students to be more autonomous with their learning and achieve greater challenges academically. There are several factors that influence a student’s ability to self-regulate their learning which leads to im proved academic performance and overall well-being. Students need to be autonomous, competent, and feel as if they can relate to others. First of all, it is important for teachers to create a learning environment where studentsRead MoreLiterary Elements Of The Classroom847 Words   |  4 Pagesquestions allowed the teacher to better check for understanding. The classroom learning environment provides a teacher-centered classroom. The lesson was whole group instruction led by the teacher. Students were allowed very little time to collaborate with their peers. Students worked independently in their journals after reading the novel together with the class. Directions were clearly stated and distractions in the classroom were brought to a minimum as the lesson began. The teacher circulated throughRead MoreEffects Of Motivational Strategies On Student Motivation931 Words   |  4 PagesStrategies on Student Motivation† by authors Marie J. Guilloteaux and Zoltà  n Dà ´rnyei attempt to provide an answer to the importance of teacher motivation in second language learning. Their main research questions are as follows: 1. How does the teacher s motivational teaching practice affect the students classroom motivation in terms of the level of their attention, participation, and volunteering? 2. What is the relationship between the students self-reported motivation (assessed by questionnaire)

Wednesday, May 6, 2020

The Civil War And The First Modern War - 1632 Words

The Civil War clash is often remembered for the carnage caused when army tactics failed to load rifles and muskets, and the tantalizing scene of lost and submerged warships. The revolutionary introduction of ships and railroad networks were just developing at the same time. Day after day, more cadavers lay under the scorching sun than any other life time. People fought everything they had, until nothing but the remains were left. From that era onwards, technology evolved, which provided us with abundant quantities of everything. Historians mostly agreed that the Civil War was the first modern war; the first in which technological strength played a huge role. However, technology also differentiated the two sides in war, with different†¦show more content†¦Weaponry plays a very large role in the war. While the soldiers were on their last legs, the nation decided to set foot and make a decision to improve the industry. The most common problem faced by all soldiers was the load ing of guns. Soldiers typically carried guns that held one bullet at a time. A soldier who was trying to aim and shoot the target would have to stand much closer, as the weapon’s range was only about 80 yards. Hence, battles were fought relatively at a closer range. Rifles, were used for long range shooting, and were very accurate as the bullet could travel up to 1,000 yards. However, it was impossible to use the guns in battle since it took a very long time to load. Fed up with the trouble caused with the guns, Captain Henri Gustave Delvigne and Claude Etienee Minnie developed a cone shaped lead bullet called, â€Å"Minnie Balls†. When fired, the bullet expanded, and the lead would grip tightly against spiraled rifling groves. This would take a spin on the elongated bullet, leaving the muzzle at a higher velocity and following an accurate trajectory causing it to travel three-four times farther. The innovation of the rifle and Minnie Ball were just a few of the hund reds of weaponry inventions. Weapons fell under three categories—small arms, artillery, and edged weapons. These were developed after the society wanted to see a difference in the nation. They were placed under these categories based on their caliber (size of the

English Is Fun Free Essays

As cities become bigger and cars less expensive, the numbers of automobiles on the road are likely to increase, worsening the problem of traffic congestion. As more people move to the edge of town and cities, traffic congestion may get worse. Many people will drive their cars into the city centre to get work. We will write a custom essay sample on English Is Fun or any similar topic only for you Order Now To address this, governments need to ensure that there are fewer cars on the roads, but individuals must do their part in support of official measures. There are three ways to reduce traffic congestion which is by improving the road infrastructure, car pooling and awareness campaign. The first way that is suitable to take an action is by improving the road infrastructure. In this case, the government should take part which is they have to built an alternative ways or road. This is because there are many people that used the same road in every day especially in a big city. By adding the alternative road, the user can choose either one of road that they want to use. It can make the road become less crowded and the traffic congestion can be reduced. Besides that, wider the size of line at the road. For example, from two line become three line. When the roads are become bigger, all the vehicle can move smoothly. Improving the road infrastructure can help to reduce the traffic congestion’s problem in a big cities. Secondly, the ways to reduce traffic congestion is carpooling or sharing car with friend. Nobody likes to sit in traffic. By car pooling, you’re doing your part to reduce the number of cars on the road. The more people who make that choice, the less traffic congestion there will be. People in big cities like Kuala Lumpur is more prefer using their own car. Imagine that if there are have 50 000 people, it is mean there are have 50 000 car or transport on the road. It will affect the bad problem on the road like traffic congestion. If we sharing car with friends or carpooling, it will decrease an amount of car or transport on the road and can reduce this problem. Make sure during we are sharing car, we must to maximum people at least 4 until 5 person in car or more than one based on type of car. Other than that, with using this alternative, the time will not wasting and also decrease the air pollution because there are a few car and transport were used and produce less of smoke. Take for example, we are going to work by sharing car with our neighbours and friends, so that the traffic congestion problem can we avoid because only a few of them are use car. Thus, carpooling or sharing car with friend is the way to reduce traffic congestion. One of the way to solve the traffic congestion is to organize the awareness campaign. A traffic jam may cause people waste a lot of time if the condition is worst and eventually ended up with late to work or to school. So, is very important for society to put in mind that to plan their time when they got out effectively to avoid by getting stuck in the middle in the road. A worker should choose to go to earlier or walk to the workplace if possible. In conclusion, improving the road infrastructure, car pooling and awareness campaign are the three ways to reduce the traffic congestion’s problem in the big cities. Only by the combination of government policy and the acceptance by individuals of the responsibility for the problems related to the increasing number of cars in cities, can help to reduce this problem from keep happen. It is when individuals make a commitment to change that policy measures can be effectively implemented. How to cite English Is Fun, Essay examples

Research Proposal Smart Government in Australia

Question: Discuss about the Research Proposal for Smart Government in Australia. Answer: Introduction: The Internet of things is defined as that particular system, consisting of interconnected computer devices, computer experts and digital and mechanical components (each provided with unique identifiers), that assists in the transmission of enterprise data over the wired networks. One of the most important characteristics of the internet of things is that the entire transmission process is conducted without any human interaction (Wortmann and Flchter 2015). This report provides an insight into the research study that would be conducted with the aim of revealing how the Internet of Things can be successfully utilized for the formation of smart government in Australia. Research Aim: The proposed research work, being discussed in this report, is aimed at revealing the manner in which the Internet of things can be utilized for developing a smart government system in Australia. It is a well known fact that the organizations that include information and communication system processes in their operational activities need to implement mechanisms for ensuring the security of the data stored in the systems. Thus, the research work being discussed in the report would also consider the identification of strategies that would be useful in avoiding attacks (specifically that of ransomware and attacks on the physical components of the ICT systems) that might be launched on the smart systems to be utilized by the government. Research Objectives: Researchers Taylor, Bogdan and DeVault (2015) are of the opinion that identification of the research objectives facilitates the process of identifying the sub-divisions of the research domain that would be emphasized on. The primary objectives of the research work being discussed are: To identify the IOT techniques and procedures that can be utilized for running a smart government in Australia. To estimate the extent to which the inclusion of the IOT techniques would be effective for running a smart government in Australia. To identify the strategies and techniques that can be utilized for protecting the components of the smart systems from several cyber attacks, including ransomewares. Research Questions: According to researchers Silverman (2016)the formation of research questions helps in the identification of the particular area on which the research work should emphasize on. The researchers are also of the opinion that setting up the research questions also provides a structure to the entire study. The research study being discussed in this report would be aimed at finding the answers to the following questions: Which of the IOT techniques and procedures that can be utilized for running a smart government in Australia? To what extent the inclusion of the IOT techniques would be effective for running a smart government in Australia? Which specific strategies and technique can be utilized for protecting the components of the smart systems from several cyber attacks, including ransomewares? Background of the Topic: Researchers Gubbi et al. (2013) are of the opinion, that smart governance is basically the utilization of innovative strategies, technological tools, business policies and regulations for finding solutions to the different economical, operational and financial challenges that a business enterprise faces. According to Jimnez et al. (2014), smart governance policies essentially rely on information and communication systems for providing optimum solutions the business enterprises. Researchers Shujin and Mei (2015) are of the opinion that in the last couple of years, the growth of various internet based technologies have been boosted largely by the incorporation of the same in various private sectors. In fact, the authors have claimed that private banking, private healthcare and retail are some of those private sectors that have started taking the advantages of the Internet of Things in the most optimum manner. However, researcher Cid (2015) has pointed out the fact the government agencies are yet to utilize the advantages of such systems. Summary: The discussion made in the sections above indicate that the proposed research work would primarily be focused on the identification of the IOT tools and techniques that can be used for the running a smart government in Australia. The aim and objective of the research work has been documented in this chapter, besides setting the research questions. The consecutive sections of the report would emphasize on the reviewing existing literary works and discussing the methods to be utilized in conducting the research work. Chapter 2: Literature Review Introduction: Cybercrime is such a crime that involves a network as well as a computer. The Computer can have been utilized in a crime commission or it can also be the target (Britz 2012). Therefore, this particular section of the literature review mainly aims to illustrate and to provide the detailed overviews on the ransomware, Internet of Things, Physical Attack as well as Smart Government in the context of the topic of this study. Ransomware: Ransomware is referred to a computer malware that is capable of covertly installing as well as executing a crypto-virology attack on the computer of the victim (McGuire and Dowling 2013). This crypto-virology attack can affect it adversely as well as requires a random payment in terms of restoring it (Costin et al. 2013). The simple ransomware can lock the system in such a manner that is not hard for a person who has enough knowledge for displaying as well as reversing a message by requesting payment for unlocking it (Summers et al. 2014). The files of the victim can be encrypted by the more advanced malware by making them accessible as well as demands a rapid payment for decrypting them. Ransomware can also encrypt the entire hard drive or the Master File Table of the computer (Savage, Coogan and Lau 2015). Therefore, Ransomware is a DoS attack, which is the abbreviation of Denial-of-access attack, which prevents the users of computer from accessing the files, as it is intractable f or decrypting the files without the key of decryption (Stone 2015). This particular malware attacks are carried out typically by utilizing Trojan that has a payload, which is disguised as a justifiable file (Choi, Scott and LeClair 2016). Way of Spreading Ransomware The common way through which this kind malware spreads is through the emails. A user typically receives a spam email that can be looked genuine (Moon and Chang 2016). The message prompts the users for downloading an attachment at the time of opening the email as well as the attachment can contain malware (Kim and Kim 2015). This malware can affect the computer by taking an advantage of the vulnerability of the network. The home networks as well as the public networks are few of the most vulnerable (Kirda 2015). The ransomware can finally infect the system while the user of that particular computer visits a compromised website (Xia et al. 2012). Such websites with high risks incorporate those along with the pornography as well as gaming. Categorization of Ransomware Ransomware is taken place in two general forms such as the non-encrypting as well as encrypting ransomware (Savage, Coogan and Lau 2015). There are few variations of ransomware within those two general forms of ransomware. These are as follows: MBR Ransomware MBR is the abbreviation of the Master Root Record. It is one of the worst kinds of this type of malware (Stone 2015). It can easily affect the boot process, preventing the attempts effectively at the removal in addition to the locking out the user from the system. File encrypting ransomware This particular categorization of ransomware comes loaded with the algorithms of encryption (Choi, Scott and LeClair 2016). These algorithms can encrypt the data of the users system by making unusable as well as inaccessible (Moon and Chang 2016). A ransom note towards the user wants payment for decrypting the files (Savage, Coogan and Lau 2015). Scareware Such a ransomware works to scare the computer users in terms of paying money in order to unlock the system (Kim and Kim 2015). The common technique is for locking the system as well as for displaying a message by advising that the user has committed a cybercrime involving child pornography or fraud (Kirda 2015). This message asserts to be from the authority of the enforcement of law like FBI. This message also needs the users for paying a specific sum of money online (Choi, Scott and LeClair 2016). SMS Ransomware This non-encrypting ransomware, which was initially popular in Russia, locks the computer system (Stone 2015). Therefore, it shows a message by requiring the user send a premium message for receiving a code, which is unlocked. Internet of Things: The Internet of Things is the network of the buildings, vehicles, physical devices as well as the other items, which are embedded with the network connectivity, actuators, sensors, software and electronics that can make enable these objects for collecting and exchanging data (Xia et al. 2012). The Global Standards Initiative on Internet of Things is defined as the Information Societys infrastructure (Wortmann and Flchter 2015). The Internet of Things permits the objects to be controlled as well as sensed remotely over the existing infrastructure of the network, by implementing the scopes for more direct association of the physical world into the systems, which are based on computers (Gubbi et al. 2013). The Internet of Things also results in the improvement in the economic benefits, accuracy as well as efficiency (Perera et al., 2014). While the Internet of Things is augmented with the actuators as well as sensors, the technology becomes an instance of the more generalized cyber-phys ical systems class that also encompasses the technologies like the smart cities, intelligent transportation, smart homes as well as the smart grids (Miorandi et al. 2012). Application of Internet of Things Media the internet of things can make a scope for analyzing, collecting as well as measuring an ever-enhancing variance in the behavioral statistics (Xia et al. 2012). This datas cross-correlation could revolutionize the targeted marketing of the services as well as products. Data is the major device interconnectivity conjunction from the media perspective whilst being important in permitting more accuracy in making target (Wortmann and Flchter 2015). Thus, the Internet of things can transform the companies, media as well as governments by opening up a new era of the competitiveness and economic development (Miorandi et al. 2012). Environmental monitoring the applications in regards to the environmental monitoring of the Internet of things utilize typically the sensors for assisting in the environmental protection by monitoring water quality, soil or atmospheric conditions (Perera et al., 2014). These applications can also incorporate the areas such as monitoring the wildlife movements and their habitats. Infrastructure Management Controlling as well as monitoring operations of the rural as well as urban infrastructures like the on- and offshore-wind-farms and railway tracks is the major application of the Internet of Things (Xia et al. 2012). Manufacturing Network management and control of situation and asset management and manufacturing equipment bring the Internet of Things within the realm on the smart manufacturing and industrial applications as well (Wortmann and Flchter 2015). Energy Management Integration of the actuation and sensing systems connected to the internet is likely for optimizing the energy consumption as a whole (Turner et al. 2014). It can be expected that the Internet of Things devices would be integrated into all sorts of the devices of consuming energy as well as be capable of communicating with the utility supply organization in terms of effectively balancing the energy usage and power generation. Home and Building Automation The Internet of things devices can assist the integration of the information procession,, control as well as communications over several systems of transportation (Miorandi et al. 2012). The IoT application extends to all of the contexts of the systems of transportation. Physical Attack: The physical attack in the cyber security is nothing but a significant crime, which is mainly taken place with the help of the physical attempt to create vulnerabilities to the computer security. Therefore, a particular surface is also required in order to create a physical attack to the data in computer system of a specific user (Rid and Buchanan 2015). The surface of the physical attack is the totality of the vulnerabilities in the security for the users data in a given computer system those are present to an attacker in the similar location as the target. The surface of the physical attack to the computer system is exploitable across the threats like the social engineering intruders as well as ploys as well as rogue employees posing as the service employees especially in the public enterprises. As per the physical attack, the external threats incorporate the retrieval of the password from carelessly discarded passwords as well as hardware on the physical break-ins as well as the sticky notes. On the other hand, the physical access in terms of creating security vulnerabilities is a very direct surface of attack. An intruder can download or steal the details from the entire drive as well as extract the data those are in target at the later time, perhaps overcome the encryption with the potential CPUs or the GPCPU or the computing of General Purpose CPUs (Rid and Buchanan 2015). An physical attacker can only damage the equipments physically if the objective is merely for blocking the access or interrupting operations. The best approach to reduce the physical attack incorporate the enforcement of the secure authentication, by zeroing the hard drives before throwing out the old hard drives as well as refraining from leaving the details those are exploitable like the password reminders of sticky notes in the physical environment (Miorandi et al. 2012). Smart government: The smart government can be demonstrated as the capability off the government of the countries all over the world for understanding the unstated as well as stated requirements of the customers, visitors, residents or citizens; designing solutions for addressing those requirements and delivering the solution in an effective manner (Chourabi et al. 2012). The design of a set of processes of business as well as the underlying capabilities of Information Technology that can make enable the information for seemingly flowing across the government programs and agencies for becoming intuitive in order to provide high quality citizen services over all the activity domains and government programs. Transcending from the Open to the Smart Government for better serving the citizens The smart government maturity model should focus upon few major factors. These are as follows: The participation of thee citizens in the governmental business The enterprises are needed for engaging the public for enhancing decisions through the widely dispersed knowledge as well as enhance the public participation in government (Kirda 2015). Transparency of information in government the enterprises are needed for using technology for putting details regarding the decisions of the agency as well as agency operations online and in forums present to the public. Collaboration over the government entities for delivering better services of citizen Enterprises are needed for utilizing the innovative systems, methods and innovative tools for cooperating over all of the government levels as well as engaging the public in their government work. Smart City The Smart city is the vision of the urban development in terms of integrating several solution of ICT as well as Internet of things in a secured manner for managing the assets of the city. The city assets incorporate but are not limited to the information systems of the local departments such as schools, law management, waste management, water supply networks, power plants, hospitals, transportation systems, libraries as well as other systems (Wortmann and Flchter 2015). The smart government plays a significant role in order to develop smart cities. The objective of constructing smart city for the smart government is or improving quality of life by utilizing urban technology as well as informatics for improving the efficiency of the services and meeting the needs of the residents. Summary: This literature review section has portrayed the negative effects or the threats came from the ransomware attack as well as the physical attacks on the network security and the computer security in the context of the cyber crime. On the other hand, this section has also highlighted on the effectiveness and the application of the Internet of things over the computer and network security in order to reduce cyber crime. Furthermore, this discussion has also shed light on the activities of the smart government in order to develop smart cities in terms of mitigate the risks associated with the cyber security. Chapter 3: Research Methodology Introduction: This chapter is aimed at shedding some light on those approaches and techniques that have been utilized in conducting this particular research work. Researchers () are of the opinion that the utilization of suitable research methods would facilitate the process of understanding whether Internet of Things can be utilized to assist the formation of Smart Government in Australia. This is because the process of outlining the appropriate techniques and procedures to be used in conducting the study is dictated by the chosen methodology, thus setting the directions in which the research work would be conducted. The following sections of the chapter provide a detailed discussion on the research techniques to be utilized in conducting the research study being described in this report. Method Outline: Research Philosophy: Researcher Flick (2015) is of the opinion that the following research philosophies are utilized in conducting scientific studies: Positivism: is that particular research philosophy that helps in revealing hidden information through the application of logical deductions. Interpretivism: helps in the process of identifying those complex relationships that exist in the domain of business management. Realism: Researcher Smith (2015)is of the opinion that realism is essentially a combination of both positivism and intepretivism, thus incorporating the characteristic features of both the philosophies. Post Positivism: Researchers Panneerselvam (2014) consider post positivism as an amendment over positivism: this particular research philosophy not only includes the characteristics of positivism but also takes in consideration the very fact that the results of any research study depends in the background and experience of the researcher conducting the study. The post positivism research methodology was utilized in conducting this particular research work. The utilization of realism and interpretivism would not have been useful at meeting the objectives of this research work, while positivism would have not considered the scope of conducting further studies in the very same domain. However, since posposivitism considers the possibility of the outcomes of a study being affected by several environmental factors, the use of the same is justified. Research Approach: Researchers Neuman and Robson (2012) have identified the most widely used research approaches utilized in scientific research works as: Inductive approach is utilized when the research domain being studied is comparatively new and thus much information is not available so as to provide guidance for the new study. Figure: Research Approach (Source: Neuman and Robson 2012, pp-46 ) On the other hand, the deductive approach is utilized in conducting studies in domain that have been much researched on. The information available from the findings of the previously conducted studies can thus be utilized for the development of new theories. The research work being discussed in this report has been conducted utilizing the deductive approach. Several research studies have already been conducted on the domain of Internet of Things and the findings of these studies would be utilized for identifying the techniques using which the IOT can support the activities of Smart Governance. Thus, the selection of the approach is justified. Research Design: Researcher Pickard (2012)has made detailed discussion on the manner scientific research studies are designed. According to them, the utilization of the appropriate research design ( from those enlisted below) helps in the identification of the strategies that would be utilized for collecting and analyzing research data. Figure: Research designs (Source: Pickard 2012, pp-192) The exploratory research design facilitates the process of considering several theories and data required to conduct a research study. The explanatory research design, on the other hand, facilitates the process of identifying the causes behind the occurrence of specific incidents and their consecutive effect. Descriptive research works are conducted so as to gain detailed information regarding the topic being researched on. The research work being discussed in this report would utilize the exploratory research design, as the consideration of existing theories and concepts would be required for finding the strategies using which the IOT can be utilized to facilitate smart governance in Australia. Data Collection Procedure: Researchers Dumay and Cai (2015) are of the opinion that the collection of relevant data or information is essential for any conducting research work. The following sections of the report provide an insight into the methods and processes that would be utilized for collecting data required to conduct the study under consideration. Types of data sources: Primary and Secondary According to Neuman and Robson (2012) the different sources from which data utilized in a research study can be collected belong to the following categories: Primary sources of data: Those sources of data, that allow the collection of raw information, are considered as primary data sources. Researcher Smith (2015) point out the fact that the raw data collected from these sources require to be clarified and analyzed appropriately, so as to be utilized in any research study. Secondary sources of data: According to Lang et al. (2013), the data collected from secondary sources (like that of existing research articles, text books, journals etc) help in gaining insight into the topics being researched on, besides providing data sets that can be utilized for analytical activities. The research work being discussed in this report would utilize data collected from both primary and secondary sources of data. Experts in the domain of Information Technology would be interviewed so as collect updated information regarding Internet of Things and a review of several technical articles and literary works would be utilized to gain information regarding the various aspects of this technology and its use in running smart governance. Beside this, surveys would be conducted so as to collect information regarding the same. Data Analysis procedure: Qualitative and Quantitative Researchers Dumay and Cai (2015) consider the narrative form of information collected from primary and secondary data sources to be qualitative in nature and the statistical data available from survey to be quantitative. It has already been mentioned that both surveys and interviews would be utilized for collecting data, along with the consideration of existing literary articles. Thus, it can be said that both qualitative and quantitative data would be used in this research work. Ethical Considerations: According to Miller et al. (2012) adherence to the following ethical concepts would guarantee the standardization of the research work: Application of data: The data collected from various sources should be utilized only for the purpose of conducting the research work and not for any commercial purpose. Involvement of the respondents: No external influence would be conducted on the respondents participating in the surveys. Besides this, it is essential for maintaining the anonymity of the participants, such that their identities are not revealed in public. Chapter 4: Conclusion In the light of the discussion made in the sections above, it can be said that the proposed research work would be aimed at the identification of the IOT technologies and strategies that can be utilized in running a smart government in Australia. However, the research methods described in the report indicate that the following shortcomings would be associated with the study: The research study would utilize data collected from both primary and secondary sources so as to conduct the process of analysis. However, the validation of the data available from the secondary sources of data is near about impossible. The entire research work has to be completed within a time period of 6 moths thus imposing severe time constraint on the entire research work. Besides this, the research work has been allocated with limited budgetary resources, which might also affect the success of the study. Reference List Britz, M.T., 2012.Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson Education India. Choi, K.S., Scott, T.M. and LeClair, D.P., 2016. Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory.International Journal of Forensic Science Pathology. Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S., Nahon, K., Pardo, T.A. and Scholl, H.J., 2012, January. Understanding smart cities: An integrative framework. InSystem Science (HICSS), 2012 45th Hawaii International Conference on(pp. 2289-2297). IEEE. Cid, G.P., 2015. Smart Cities, Smart Governments and Smart Citizens. Costin, A., Isacenkova, J., Balduzzi, M., Francillon, A. and Balzarotti, D., 2013, July. The role of phone numbers in understanding cyber-crime schemes. InPrivacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on(pp. 213-220). IEEE. Dumay, J. and Cai, L., 2015. Using content analysis as a research methodology for investigating intellectual capital disclosure: a critique.Journal of Intellectual Capital,16(1), pp.121-155. Flick, U., 2015.Introducing research methodology: A beginner's guide to doing a research project. Sage. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions.Future Generation Computer Systems,29(7), pp.1645-1660. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions.Future Generation Computer Systems,29(7), pp.1645-1660. Harsh, A. and Ichalkaranje, N., 2015. Transforming e-Government to Smart Government: A South Australian Perspective. InIntelligent Computing, Communication and Devices(pp. 9-16). Springer India. Jimnez, C.E., Falcone, F., Solanas, A., Puyosa, H., Zoughbi, S. and Gonzlez, F., 2014. Smart Government: Opportunities and Challenges in.Handbook of Research on Democratic Strategies and Citizen-Centered E-Government Services, p.1. Kim, D. and Kim, S., 2015. Design of quantification model for ransom ware prevent.World Journal of Engineering and Technology,3(03), p.203. Kirda, E., 2015, June. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. InDetection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings(Vol. 9148, p. 3). Springer. Lang, T., Clarke, M., Newport, M., Enquoselassie, F., van Loggerenberg, F., Franzen, S., Furtado, T., Njuguna, P., Fegan, G. and Davey, G., 2013. A research methodology study to map the process of initiating and operating a randomised controlled trial of podoconiosis treatment in northern Ethiopia.Trials,14(1), p.1. McGuire, M. and Dowling, S., 2013. Cyber crime: A review of the evidence.Summary of key findings and implications. Home Office Research report,75. Miller, T., Birch, M., Mauthner, M. and Jessop, J. eds., 2012.Ethics in qualitative research. Sage. Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I., 2012. Internet of things: Vision, applications and research challenges.Ad Hoc Networks,10(7), pp.1497-1516. Moon, J. and Chang, Y., 2016. Ransomware Analysis and Method for Minimize the Damage.The journal of the convergence on culture technology,2(1), pp.79-85. Neuman, W.L. and Robson, K., 2012. Basics of social research: Qualitative and quantitative approaches. Panneerselvam, R., 2014.Research methodology. PHI Learning Pvt. Ltd.. Perera, C., Zaslavsky, A., Christen, P. and Georgakopoulos, D., 2014. Context aware computing for the internet of things: A survey.IEEE Communications Surveys Tutorials,16(1), pp.414-454. Pickard, A., 2012.Research methods in information. Facet publishing. Rid, T. and Buchanan, B., 2015. Attributing cyber attacks.Journal of Strategic Studies,38(1-2), pp.4-37. Savage, K., Coogan, P. and Lau, H., 2015. The evolution of Ransomware. Shujin, D. and Mei, G., 2015. Problems in the Development of Smart Government in China and Their Solutions.Journal of Baoding University,5, p.007. Silverman, D. ed., 2016.Qualitative research. Sage. Smith, J.A. ed., 2015.Qualitative psychology: A practical guide to research methods. Sage. Stone, S.D., 2015.Small organization vulnerability to Ransomware(Doctoral dissertation, UTICA COLLEGE). Summers, S., Schwarzenegger, C., Ege, G. and Young, F., 2014.The emergence of EU criminal law: cyber crime and the regulation of the information society. Bloomsbury Publishing. Taylor, S.J., Bogdan, R. and DeVault, M., 2015.Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Turner, V., Gantz, J.F., Reinsel, D. and Minton, S., 2014. The digital universe of opportunities: rich data and the increasing value of the internet of things.IDC Analyze the Future. Wortmann, F. and Flchter, K., 2015. Internet of things.Business Information Systems Engineering,57(3), pp.221-224. Wortmann, F. and Flchter, K., 2015. Internet of things.Business Information Systems Engineering,57(3), pp.221-224. Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things.International Journal of Communication Systems,25(9), p.1101.