.

Thursday, August 27, 2020

Symbolism In Cather And The Rye Essay free essay sample

, Research Paper Images of screen and The Rye In the book Catcher In The Rye by J.D. Salinger, there are numerous images. An image is something that speaks to something different by affiliation or similarity. A representation of an image that was reoccurring all through the book is the runing top. This is an image for looking for. Holden, the central character in the book, purchases a chasing top. This is an image for runing for Holden # 8220 ; runing # 8221 ; for an essentialness in his life. Holden ever thumping about how everybody is fake and he neer really pays taking care of his life. At the point when he purchases the chasing top, it seems as though he is looking for the goal in his life. Other than him have oning the chapeau in reverse resembles when a stopping board wears his protective cap in reverse and Holden needs to be a # 8220 ; screen in the rye. # 8221 ; The second outline of an image is the ducks. We will compose a custom paper test on Imagery In Cather And The Rye Essay or on the other hand any comparative subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page J.D Salinger alludes to the ducks however out the account. Holden is ever look intoing for where the ducks went. The ducks are an image for Holden # 8217 ; s life. At whatever point the ducks leave and proceed onward Holden does likewise. There is an aberrant association between the ducks and Holden # 8217 ; s life. The carrousel could other than be a representation of an image. At the point when his more youthful sister Phoebe is siting the auto ousel Holden needs to stop her from looking to find an aureate ring in the top since he is apprehensive she is making a trip to fall. At that point he stops himself since he understands that individuals need to larn from their blunders so they neer do it again. Another way the carrousel is an image is that it represents Holden’s life on the grounds that the carrousel goes about and about and it resembles the unending musicality of life. The Equus caballuss go here and there and that would embody the high points and low points or all sorts of challenges throughout everyday life. The foils are other than a decent outline of imagery. When Holden left the foils on the metro, it shows that Holden is untrustworthy. It other than indicated that he has no guard or security throughout everyday life. The foils are arms and are utilized for security and since they are lost it represents how Holden needs to help him self all completely and there is no 1 to help him. The finishing up outline of an image in Catcher in the Rye is the baseball hand. It represents Holden # 8217 ; s sentiments toward Allie. At the point when he composed the paper for Stradlater, he expounded on the amount he adores/misses his sibling. There are numerous images in the book Catcher in the Rye. A large number of them needed to make with Holden # 8217 ; s life and the way he feels. The images were expressed up above.

Saturday, August 22, 2020

Legal aspects of Health Care

Lawful parts of Health Care Free Online Research Papers Running Head: LAW AND LEGAL PROCESS Legal Aspects of Health Care Theoretical This paper will talk about explicit issues identified with California lawful rules and clinical treatment. It will address the lawfulness of an outside taught specialist publicizing premature birth benefits in the express, the timeframe a respondent needs to answer a claim, and any notification ahead of time the offended party must give the respondent. I will near to covering summons and a person’s commitment in reacting to a summon. DR. SAUNDERS In the 1973 Roe versus Swim choice, the U.S. Incomparable Court decided that a lady has a sacred option to pick premature birth preceding a baby being reasonable. Notwithstanding, as per the Business and Professions Code, Section 601, Dr. Sanders isn't permitted to publicize for fetus removal administrations or any related administrations. By just promoting for the administrations she wished to perform, Dr. Sanders submitted a lawful offense. Dr. Sanders has 30 days from the date the request is served to enter a composed arguing in light of the grumbling. On the off chance that no reaction includes been given inside the 30 days, the court will settle on a choice looking into the issue without your info. A respondent is likewise encouraged to contact a lawyer as fast as conceivable so as to record the arguing inside the multi day window. Code of Civil Procedure, Section 412.10-412.30, explicitly expresses that if the litigant neglects to react inside the multi day time span, the offended party may request any help he feels just and right. Joan’s lawyer must give Dr. Sanders at any rate 90 days earlier notification of the goal to initiate the activity as indicated by the Code of Civil Procedure, Section 364-365. Despite the fact that inability to agree to the necessary time limits set out by the code won't be justification for excusal of the case, any lawyer that neglects to conform to the arrangements might be dependent upon disciplinary activity by the State Bar of California. Accepting that Joan is guaranteeing proficient carelessness against Dr. Sanders, the claim may not fall into the extent of administrations for which the supplier is authorized. California doesn't perceive fetus removal as lawful, so there may conceivably be an issue with the claim contingent upon how it is introduced under the steady gaze of the court. A summon is the procedure by which the participation of an observer is legally necessary as per the Code of Civil Procedure, Section 1985-1997. A summon requires the individual to show up under the steady gaze of the court at a designated time and date with all necessary information, books, papers or whatever else recorded in the report. In the event that you are required to head out so as to satisfy your obligations, you may demand to be repaid for your movement expenses. Adequate time must be provided so as to make sure about all the essential travel and housing plans, whenever required. Your commitments to the summon include: complying with the request for the summon, swearing in under the steady gaze of the giving court, replying as an observer, and to buy in a testimony or statement when required. Inability to play out any of these activities might be rebuffed as a hatred of court by the giving court. In the event that you neglect to show up for the summon, you will be fined a total of $500 and all harms continued in accordance with your inability to show up. These harms might be recuperated in a common court. California law plainly expresses that an authorized clinical specialist may not publicize for premature births. Dr. Sanders ought to have explored the legitimateness of hanging her shingle out before opening her facility. Since laws change from state to state, it doesn't make a difference that her classmate’s facility is effective in another state, California law wins in this specific case. Dr. Sanders ought to have been given the full 90 days to react to Joan’s lawyer. In spite of the fact that this won't cause any issues with the claim, it shows absence of expert thought with respect to Joan’s lawyer. Basically a patient went to a center that ought not have been playing out the clinical method it was performing and got harmed. It will be dependent upon the courts to choose whether or not the patient has any culpability in the injury or in the event that it was totally the doctor’s flaw. Research Papers on Legal parts of Health CarePersonal Experience with Teen PregnancyThe Project Managment Office SystemPETSTEL investigation of IndiaCapital PunishmentThe Relationship Between Delinquency and Drug UseInfluences of Socio-Economic Status of Married MalesQuebec and CanadaIncorporating Risk and Uncertainty Factor in CapitalAnalysis of Ebay Expanding into AsiaStandardized Testing

Friday, August 21, 2020

Indus River Dolphin free essay sample

HIndus stream dolphin, bhulan, dazzle waterway dolphin, Indus dolphin, side swimming dolphin, Plataniste de lIndus (Fr), Delfin del Indo (Sp) Scientific name: Plantanista minor What are Indus stream dolphins? The Indus River dolphin (Platanista minor) is one of the universes rarest warm blooded creatures and the second most jeopardized freshwater waterway dolphin. The species is described by a long snout, adjusted tummy, stocky body, exceptionally little dorsal balance and enormous flippers. It depends on echolocation (sound sensors) to discover fish, shrimp, and other prey in the base mud. The Indus River dolphin swims on its side, now and again empowering it to move in water as shallow as 30 cm. At the point when it needs to breath, it swims to the surface, pivots upstanding to take noticeable all around, and afterward turns 90 degrees again as it swims back to the base. This one of a kind side swimming conduct isn't reliably found in some other dolphin, aside from the Ganges River dolphin. We will compose a custom exposition test on Indus River Dolphin or then again any comparable point explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page The Indus River dolphin gauges 70-110 kg (155-245 lbs). The greatest size is 2. 5m (8. 2 ft), with guys littler than females. Living space Biogeographic domain Indo-Malayan Range States Pakistan Ecological Region Indus waterway Delta Rann of Kutch Endemism Indus stream arrangement of Pakistan [pic] The flow circumstance. Roughly 1,100 examples of this species exist today in a little part of their previous range, the lower compasses of the Indus River in Pakistan. Why getting imperiled? The number of inhabitants in this species has bit by bit declined as a result of different elements, including water contamination, poaching, fracture of living space because of blasts, and dolphin strandings in the water system channels. What being accomplished for security? Notwithstanding endeavors to save their territory, including tending to issues, for example, stream contamination, WWF staff have likewise been engaged with salvage missions when singular dolphins become caught in trenches. WWF likewise organized the biggest overview of the species ever in 2001 in a joint effort with accomplices. WWF-Pakistan aids various instruction activities and has organized instructional classes for different foundations. An aeronautical review of the species extend was led in 2003. WWFs objective for freshwater cetaceans is to guarantee that territory corruption, strandings and fisheries bycatch don't compromise freshwater cetaceans.

Tuesday, May 26, 2020

Global Health Policy Efforts Is The Right Of All Humans On...

Global Health Policy Efforts The right of all humans on the planet is to have access to health, education, and environmental sustainability. In September of 2000, world leaders adopted the United Nations Millennium Declaration, which committed world leaders to eight millennium development goals that address poverty, hunger, disease, and lack of adequate shelter (Millennium Project, 2006). Centers around the world focus on global development in alignment with the Millennium Goals by improving health and healthcare in communities internationally through policy efforts, research, partnerships and collaborations. Center for Strategic International Studies The global health policy center is a leading policy research institution that falls under the umbrella of the Center for Strategic International Studies (CSIS). The center works with diverse stakeholders to make United States (U.S.) global health efforts more integrated and strategic by working directly with policymakers, collaborating with developing country experts and disease focused working groups. Their organizational structure consists of the following members: †¢ Thomas J. Pritzker, Chairman of Board of Trustees (since 2015) †¢ John Habre, President and CEO (since 2000) †¢ Board of Trustees †¢ Counselors †¢ Associate Staff CSIS is one of the most distinguished policy institutions in the globe and houses over 100 world-renowned experts located in Washington, DC. CCIS also maintains a network of non-residentShow MoreRelatedThe Warming Of The Arctic Antarctic And Greenland Ice Sheets Have Lost 5.5 Trillion Tons Of Ice1262 Words   |  6 Pagesearlier? If so, you’re not the only one. The Earth’s climate is constantly changing, and unfortunately it’s not for the better. Our planet that everybody calls home has a complex environment engulfed with diversity. These complexities also differ among location, which result in warm and cold regions. The regions also shift temperatures according to the location of our planet orbiting our sun. There is definitely an overall trend around the world that our climate is increasing in temperature. Even if it’sRead MoreFood Security Is A Basic Right Of Man And An Essential Condition For A Populace1606 Words   |  7 PagesFood is considered a basic right of man and an essential condition for a populace to be better nourished and healthy. According to Calhoun (2013), food security has become acknowledged as a significant health issue of the public. For instance in Canada, it is a social health determinant. Nonetheless, food security has not been realized by all society members. Food insecurity is experienced when frequent access to food that is nutritionally sufficient and safe is limited or indeterminate. In CanadaRead MoreThe Coca Cola Company s Corporate Responsibility Regarding People, Planet, And Profit1162 Words   |  5 Pagesrelation to society about justice, rights, as well as how their dealings affect human welfare. As a result, corporate actions and policies associated with corporate social responsibility represent crucial information sources that influence one’s judgments of corporate morality. Additionally, if a company fails to comply with the law or ethical standards of conduct attract negative publ icity rather than positive discretionary activities, for example, community-outreach efforts and philanthropy. This paperRead MoreCompanys Csr Sustainability Program1485 Words   |  6 Pagesneed for protection of intellectual property rights and improvement of public health lead the pharmaceutical industry to establish an agreement in 2001 with the World Trade Organization. In Sanofi’s earliest archived sustainability effort, Environmental Progress Report 2001, it states that Sanofi has taken initiatives to promote sustainable development as a reaction to the rise of wider and on going responsibilities. They have pursued these defensive efforts through promoting safety in the workplaceRead MoreThe Warming And Its Effect On Human Health1367 Words   |  6 Pagespolitics in the twenty-first century. Scientists agree: the planet is warming and something must be done. There is a consensus among the scientific community, with 97% of experts agreeing that humans are causing glo bal warming. For comparison’s sake, â€Å"scientists are as certain that humans are responsible for most recent climate change as they are that cigarettes are harmful to human health† (Romm 9). Despite this scientific certainty, many humans are still skeptical about climate change. Even more areRead MoreEssay about The Fastest Growing Problem in the World: Overpopulation630 Words   |  3 Pagesgrowing problems facing our human civilization. This serious condition is growing every year, every minute, and every second. It’s the root of most, if not all, of the world’s problems. Our planet now provides around 5.8 billion people, projected to be around 10 billion by the year 2050. One very serious effect of the population explosion is its devastating effects on the global environment. Increasing amounts of food, energy, and shelter are required to fulfill the needs of human society. Much of ourRead MoreHuman Capital And Services At Georgia College908 Words   |  4 Pagesmold and strengthen the planet we inhabit. In addition, globalization stems from the idea of exchanging goods and services across vast networks, and nursing interconnects with this phenomenon by exchanging human capital and services to the world at large. I have chosen this topic because nursing is what I am majoring in at Georgia College, and I want to discuss the ways in which nurses demonstrate their care for others as part of a larger scheme of globalization in health care. Although nurses compriseRead MoreIs Nursing A Profession?922 Words   |  4 Pagesaround us. Globalization connects with the field of nursing in that it is constantly creating different and better opportunities to mold and strengthen the planet we inhabit. In addition, globalization stems from the idea of exchanging goods and services across vast networks, and nursing interconnects with this phenomenon by exchanging hum an capital and services with the world at large. I have chosen this topic because nursing is what I am majoring in at Georgia College, and I want to discuss theRead MoreEssay Sustainable Development and Population Control1569 Words   |  7 Pagesnation with waves of third world immigrants. A Los Angles Times article decries the lack of an official United States population policy. What do these statements share in common?    The underlying theme in each of the sentences above is population control. In each case the rationale is that the earths six billion people exceed the planets carrying capacity. The planet is on the brink of a demographic catastrophe. The consumption of precious resources (land, food, water, clean air) threatensRead MoreClimate Change And Its Effects On Our Society1545 Words   |  7 Pagesthe topic of climate change. It has become a proven fact that our global ecological and weather patterns are changing in ways that occur at a much more rapid pace than natural cycles typically allow. According to a 2016 Monmouth University Poll, most Americans acknowledge, at least to some extent, that â€Å"the world’s climate is undergoing a change that is causing more extreme weather patterns and the rise of sea levels.† Since humans rely so heavily on their environment to provide a plethora of goods

Friday, May 15, 2020

I Am An American Born Asian Male Teenager - 1900 Words

I am an American born Asian male teenager. According to the East Asian Youth, there are two kinds of Asian guys: the smart, athletic kind and the cool, lenient kind. I don’t fit under neither types and as a result, I became self-conscious of the way I act, not to also mention my overweight body. I didn’t know how to be myself while conforming to the stereotypes. That’s when I discovered Kpop, or Korean Pop Culture. I immersed myself into the music, the dramas, and even the food. I found a second home, even if it was through my computer. These korean stars were talented, funny, and most of all â€Å"cool.† They had an aura around them that I was not able to find in any American stars. Maybe it is because they were all â€Å"trained† to do so; but†¦show more content†¦To start off, I will be explaining what Kpop is, what is the â€Å"Hallyu† wave, and Local vs Global identities. My second section is the K-pop production: what idols are , how idol groups are formed so that will be like recruitment, training, the so called â€Å"death contracts,† etc. My third section will be about where K-pop differs from American pop. This will already be mentioned in the first section but this will be in depth research on such â€Å"differences,† and this section will actually require me to use a lot of YouTube videos. This section will have me using a lot of react videos where â€Å"Americans† react to Kpop or vice versa. The fourth section is the real deal: the mula. Where does the money come in from, where does the money go to, why is so much money being spent, etc. For my last section this will be where my conclusion is formed. If an average Westerner were to be asked of a successful music artist, they might think of a band like Coldplay. Having global concert tours across Europe, North America, Asia, Australia, etc. Another may be Adele––who had sold over 8 million copies of her newest album ‘25.’ In short, one might expect the names of American or other Western artists to dominate the iTunes libraries and download charts in the United States. But while the American industry is certainly doing well, the Republic of Korea, a country whose population is only about 50.5 million, has managed to cultivate a vibrant and

Wednesday, May 6, 2020

Why Type I Diabetes Mellitus - 2475 Words

Introduction Diabetes mellitus is a group of diseases which affect the amount of glucose in the blood. The high blood glucose levels are caused by the body not being able to produce enough insulin to meet its metabolic needs. Insulin is a hormone released from the pancreas which controls the amount of glucose in the blood. When there is too much glucose in the blood insulin will be released which will move glucose into the cells. Once in the cells the glucose is used as an energy source or it is stored as glycogen. There are two diseases which fall under diabetes mellitus which are type I and type II. In type I diabetes the body cannot produce insulin due to the destruction of the pancreatic beta cells. Type II diabetes is†¦show more content†¦Polydipsia is also caused by hyperglycemia and due to dehydration as a result of polyuria. The fatigue and weakness is thought to be caused by caused by muscle breakdown as a result of insulin deficiency. Lastly, blurred vision is caused b y the effects of hyperglycemia on the lens and the vitreous humor. The excessive amount of glucose causes swelling of the lens, which results in vision problems. Gastrointestinal symptoms include: right upper quadrant pain and autonomic neuropathy if in late stage. Right upper quadrant pain in associated with acute fatty liver disease which is one of the complications of untreated type I diabetes. It is also caused by being overweight. Lastly, autonomic neuropathy is a nerve disorder that affects involuntary body functions, including heart rate, blood pressure, perspiration and digestion. It refers to damage to the autonomic nerves, which disrupt signals between the brain and portions of the autonomic nervous system, such as the heart, blood vessels and sweat glands. This leads to abnormal performance of involuntary body functions. This symptom usually presents itself after many years of chronic prolonged hyperglycemia.

Tuesday, May 5, 2020

Cyber Security 1990s Business Organisation

Question: Describe about the Cyber Security for 1990s Business Organisation. Answer: Introduction From the mid-1990s business organisation had embraced the internet (Rhodes-Ousley 2013). With the growth of e-commerce and business the question of security also arose. A classical case is the story of Egghead software company which dealt with software. Once the data of the company was stolen it could do nothing except to be sold to Amazon.com. With the growth of the internet, network security also evolved. E-business houses required that they give the required information to the customers as well as they also wanted the information about their own functioning at the same time. E-commerce industry requires that they share information about the products, they carry information about the customer and at the same time they conduct business by working with various financial institutions for the financial transactions. The customer visiting the website of a e-commerce industry requires the security of the information that he will provide while doing the business. All this requires a high level of cyber security from the e-commerce industry. Cyber security in e-business carries out four important functions: (1) it provides the e-business organisation an amount of security, (2) it enables the organisation to run the various application safely, (3) it provides a form of data security to the organisation and (4) it safeguards the technology assets of the business organisation (Whitman and Mattord 2011). According to the internet security threat report by Symantec at the close of 2015, there was a loss of 191 million data identities (Symantec.com 2016). According to Symantec the threat to a financial institution has increased to four times in a year in 2015. Literature Review By e-commerce, one does not only mention the selling and buying of products and services online, it also means the transactions between two agents of the market. These transactions are mostly monetary in nature. This attribute requires a security system as money is involved here. Here comes the cyber security. It protects both the buyers and sellers who are using the internet as the place of transaction. It protects their information from getting into wrong hands (Gupta 2016). Estonia, one of the developed nations faced cyber attack in the year 2007, which shows the need for a cyber security plan for every state. The plans for cyber security have to be updated regularly, as the hackers also updating themselves. If the consumers and sellers are not comfortable in e-commerce, it would increase the cost of a transaction, hampering the efficiency level and the output of the country. Since this attack, state-wise policy recommendations were made to secure the transactions that are taking place online. Leaking of the security can lead to a fall in a country's GDP (Czosseck, Ottis and Talihrm 2013). With the help of cloud computing, computing as a personal commodity is replaced by computing as a public utility. The exclusiveness in nature is what makes the e-commerce special among all the marketplaces. The need for cyber security is not only from the side of the customers but also from the seller's side. A loss of security can halt the actions in e-commerce, which will result in deterioration in terms of the economy of scale, market's flexibility, convenience, and other. This has the potential to change the structure of a market (Rabai et al. 2013). A lack of cyber security results in the development of false credentials. It can create an unsecured market. This kind of market never survives in the long run. Without the needed trust, the market will break. Computer and network security are must, as these can cause false information generation, which leads the economy in the wrong way. This can create loopholes in the market. False bank websites, false bankers, false buyers are the example of a lack of the cyber security of a state. Credit card fraud, false shopping sites, false billing and payments are result of this (Sudia 2013). Using the elements of co-creation, the authorities can point out the "nudges" in cyber security. Identifying these nudges will guide to the development of the best behavioural discipline. Insecure behavior in the wireless networks is the reason the e-commerce is not moving as smoothly as it could be. This is the reason of market inefficiency. This also causes the society a cost, decreasing the social welfare. This is also another form of negative externality. It shrinks the possibility of the market expansion (Coventry et al. 2014). A holistic cyber security system has to be adopted by the government of a state. This will let the authorities protect the citizens as well as the country's fund for the people. The cyber security strategies are taken by the government will ensure a regular update and relief from any chaos in the economy. The government has to ensure the top quality of cyber security as only it can ensure market stability. Cyber security is more like a public good than a private good, hence the government has to take the initiatives (Atoum, Otoom and Abu 2014). Many international; relations depends on cyber security. These relationships were mostly in the area of the countries' economy. These days, human rights, security agendas are also incorporated currently. Cyber security capacity building is taken as a project, which will help the government maintain international relationships. Cyber security works as a stabilizer in the political and social development. Rich industrialized countries show the potential dimensions in technology and other areas. The cyber security organization should have a computer emergency response team, In the case of any unusual behaviour the response team will take over all the present and future transactions (Klimburg and Zylberberg 2015). The agents of an economy are widely benefited by e-commerce. The openness of the internet is benefitting for some with good intentions, and the market as well. But this openness has lead to misuse of personal information. Many countries have now policy measures to protect the economic agents operating in the market. The approach of cyber security varies from country to country. The developed nations have a tighter security system than the countries Nigeria and other backward countries which are yet to enact any such measurements (Adelola, Dawson and Batmaz 2015). The History of e-commerce is not that old. It is younger than most of the existing market structures. This keeps an open end to the possibilities in which the policy measurements have to be taken by the government of a country. Thus, ensuring cyber security is not an easy task. Failure of taking proper measurements will lead to many adverse effects on the economy. There are a lot of start ups, who bank on the e-commerce falls due to breach of internet security. It costs people their jobs, leading to unemployment. It is the state authoritys responsibility to provide them a proper guard from the criminals who otherwise have the potential to bankrupt the entrepreneurs (Bayuk et al. 2012). The significant growth in e-commerce is followed by an increase in the rate of cyber attacks. The attackers primary choice of weapon is malware. This situation urges the state authorities to innovate new techniques to stop the attackers. Without proper measures from the government the online transactions will break the chain, resulting in a devastating situation. The recently developed malwares can put an economy back to the initial stages, as most of the government and bank transactions are now done through online activities. Leakage of this information will hurt the countrys economy. The countries linked to the former country through trade and other medium will also face the negative effects of the massacre. Hence, cyber security is an essential concept in the case of e-commerce (Jang-Jaccard and Nepal 2014). Research Methodology To address the present research on cyber security and e-commerce a survey questionnaire would be developed (Flick 2015). The survey questionnaire would be mailed to IT and cyber security experts who have experience of e-business. The survey questionnaire would test how the threat of cyber security has increased over the years. The research question would focus on the methods of cyber crimes that can occur with e-business. The research also focuses on the steps being taken by e-business organisations to provide cyber security. The challenges being faced by the e-business organisation would also be identified. The relation between cyber security and e-commerce would be established. The research would also try to seek the tools being used by e-business organisations in providing cyber security. Gantt chart Week 1 Week 6 Week 10 Week 13 Week 14 Introduction Literature review Data collection Data analysis Conclusion Figure 1: Gantt chart of the research (Source: created by author) Research Process The present research is based on the fact that the e-commerce industry is dependent on cyber security. The B2B and B2C are dependent on the web and the security being provided by the web. The present research aims to find the various challenges faced by the business organisation doing e-business. The data would be collected from IT experts who have adequate experience of cyber security to e-business organisation. The analysis of the data would represent the challenges being faced by cyber security agencies in providing security to e-business organisations. The analysis of the data would also provide insight into how the cyber security threat perception has increased and how the e-business houses are gearing up to the challenge of cyber security. Data collection The process of sampling is one of the most important processes of a research. For the purpose of the present research quantitative research methods would be used (Floyd 2013). The sample size would consist of 200 IT and cyber security experts who have an adequate experience of providing security to e-commerce would be selected. The experts would be mailed a survey questionnaire. The present research focuses on cyber security in e-commerce thus only people having adequate knowledge and background of the subject can form the respondents to the present survey. Data analysis Microsoft excel would be used to analyse the data (Winston 2014). The data would be mapped for the security vulnerability of the e-commerce house. The mapping would provide an answer to the different types of methods in which the cyber security of a e-business organisation can be breached. This would provide for what the e-business organisations thinks about cyber crime. The data analysis would provide an answer into what the business organisation thinks is important in cyber crime. The data analysis would provide an answer into the most common methods by which a cyber crime is conducted and the profile of a cyber criminal. It would also provide an answer into the mind of a cyber criminal. Whether the cyber criminal is a single entity or multiple persons working together. The analysis of the data would provide an answer to the various tools that are being used by e-commerce industry. This would also provide an answer to the efficiency of the tools used for cyber security. The analysi s of the survey would provide an answer to the reasons behind cyber security breach. Finally the analysis would provide an insight into whether cyber breach takes place on any particular days or it can happen on any given day throughout the year. Expected Research Outcome The present research would show how the threat perception to e-business has increased from 1990 when internet and thus e-commerce was born. It would also show the vulnerabilities to e-business. Cyber security poses of the greatest dangers to e-business. The dangers are not just to the business organisations but also to the customers of the e-business organisations. The outcome of the research would show how business organisations are coping with threat of cyber security. The present research would also show how e-business organisations have increased the cyber security of their websites and thus have been able to provide a sense of CSR to the customer. The present research would provide an insight into the financial implication of cyber security on e-business. It would provide a peak into the various tools being used by business houses to enable cyber security. The research would also provide information into how business houses conduct e-business. Conclusion The present research would show that with the growth of e-commerce the threat perception has also grown. It would show the threats being faced by the e-commerce industry. It would also show how e-business organisation have understood the requirements of providing cyber security in the changed domain and have upped the level of security. The present research would show how cyber security and e-commerce have had a symbiotic relationship. The present research would also show the probable impact of cyber insecurity to e-commerce. The present would provide an idea into the steps that have been taken by the e-commerce industry to secure themselves. References Adelola, T., Dawson, R. and Batmaz, F., 2015. Privacy and data protection in e-commerce in developing nations: evaluation of different data protection approaches. Atoum, I., Otoom, A. and Abu Ali, A., 2014. A holistic cyber security implementation framework. Information Management Computer Security, 22(3), pp.251-264. Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J. and Weiss, J., 2012. Cyber security policy guidebook. John Wiley Sons. Coventry, L., Briggs, P., Jeske, D. and van Moorsel, A., 2014, June. Scene: A structured means for creating and evaluating behavioral nudges in a cyber security environment. In International Conference of Design, User Experience, and Usability (pp. 229-239). Springer International Publishing. Czosseck, C., Ottis, R. and Talihrm, A.M., 2013. Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. Case Studies in Information Warfare and Security: For Researchers, Teachers and Students, 72. Flick, U. (2015). Introducing Research Methodology: A Beginner's Guide to Doing a Research Project. 2nd Ed. Sage Publication Fowler Jr, Floyd J. (2013). Survey research methods: 5th Ed. Sage publications. Gupta, B. ed., 2016. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global. Jang-Jaccard, J. and Nepal, S., 2014. A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), pp.973-993. Klimburg, A. and Zylberberg, H., 2015. Cyber Security Capacity Building: Developing Access. Rabai, L.B.A., Jouini, M., Aissa, A.B. and Mili, A., 2013. A cybersecurity model in cloud computing environments. Journal of King Saud University-Computer and Information Sciences, 25(1), pp.63-75. Rhodes-Ousley, M. (2013). Information security. Emeryville, 2nd Ed Calif.: McGraw-Hill/Osborne. Sudia, F.W., 2013. False Banking, Credit Card, and Ecommerce System. U.S. Patent Application 13/747,368. Symantec.com. (2016). Internet Security Threat Report 2016 | Symantec. [online] Available at: https://www.symantec.com/security-center/threat-report [Accessed 6 Oct. 2016]. Whitman, M.E. and Mattord, H.J. (2011). Principles of information security. 4th Ed. Cengage Learning Winston, W. (2014). Microsoft Excel 2013 Data Analysis and Business Modeling: Data Analysis and Business Modeling. Pearson Education.