Saturday, December 28, 2019

Pharmacy Software Business System - 1027 Words

HBS Pharmacy Software Since 1981 Health Business System (HBS) has been providing software and technology products to pharmacy industries, for example hospitals, retail, outpatient pharmacy, and nursing homes. HBS software offers applications for all levels of pharmacy, to help manage their companies efficiently. Offering different benefits designed to strengthen pharmacy production. HBS pharmacy software has an exclusive position in the marketplace, bringing combined profit to each pharmacy. To learn more valuable information about HBS software, a system demo helps explain how HBS can help different pharmacies. By viewing the system demo pharmacies can learn how HBS software will benefit them. Health Business System has experience†¦show more content†¦Ã¢â‚¬Å"HBS is a company of enduring commitment, provides its clients useful industry intelligence, offers expert and tireless service, and maintains an honest, constructive relationship.† HBS is also involved with outreac h programs. They have a long history of outreach and a commitment to better the quality of life in the communities. Knowing that a pharmacy software company is involved in helping the communities around them is amazing because you know that you are in great hands and that your pharmacy software will be a great benefit. HBS is a corporation identified as an established technology leader. HBS is devoted to pharmacy modernization and customer prosperity. This big commitment builds relationships and associations with leaders from the pharmacy industry, establishing business methods and solutions arranged to help pharmacies increase their working performance. Opening a pharmacy business is not easy, pharmacy owners need to be focus on implementing great care to the patients. HBS pharmacy software offers lots of different benefits to existing pharmacies as well as new pharmacy owners. They know that starting up a pharmacy business is not easy and that the owners need to focus on patient c are rather than technology equipment, which is why HBS offers the IT support and equipment built for pharmacies. HBS knows that patient care is vital to a pharmacy that’s why they make it easy to their customers by offering the support they need toShow MoreRelatedBeeman s Pharmacy : 340b Policy And Procedure1089 Words   |  5 Pages Beeman’s Pharmacy – 340B Policy and Procedure PURPOSE: To guide the 340B process at Beeman’s Pharmacy in a manner that is to be consistent with applicable laws and regulations governing the Health Resources and Administration Services (HRSA) 340B program. a. For contract pharmacies, the 340B guidelines state the following: â€Å"The guidelines provide that the covered entity will verify, using the contractor’s (readily retrievable) customary business records, that a tracking system exists which willRead MoreWork Breakdown Structure1152 Words   |  5 PagesProject Manager | | 1.3 Project Execution | Task: 1.3.1 Install test system and complete Integrated testing Task: 1.3.2 Procure and deploy hardware/software and User Training Task: 1.3.3 Install Live System Task:1.3.4 Go Live | IT Project manager and Vendor Project Managers, Systems Analysts, Systems Programmers, Clinical Informatics Specialist, Network Analyst, Ancillary Systems ManagerOpenlink Specialist, IT Techs, IT Operations Manager | | 1.4 ProjectRead MoreInventory Management Project1433 Words   |  6 Pages[pic] Comsats Institute of information Technology Lahore Campus Financial and Managerial Accounting Final Project Inventory Management In Pharmacy Submitted To: Farhan Ahmed By Group â€Å"A† MBA 3.5 Years Muhammad Bilal Ifran Mustafa Awais saeed Faisal Arman Hafiz Muhammad Akram Muhammad Ismail In the name of Allah, The Beneficent, The Merciful Dedication We dedicate this project to our teacher (Farhan Ahmed). Without their patience, guidance, understanding, support, and most of all loveRead MoreSecurity Controls : Hardware And Software Theft And Vandalism1187 Words   |  5 PagesControls – Hardware/Software Theft and Vandalism Hardware Theft is the act of staling computer equipment. Hardware Vandalism is the act of defacing or destroying computer equipment. The pharmacy could employ an alarm system or small locking devices for the prevention of hardware theft. They could also employ a Real-Time Location System (RTLS), which tracks and identifies the location of high-risk or high-value items. The pharmacy could also incorporate a property management system by which all equipmentRead MoreSystem evaluation paper925 Words   |  4 Pagesï » ¿ System Evaluation Paper Donna Jackson CIS/207 October 6, 2014 University of Phoenix MGD is an automated pharmaceutical management product and service for hospitals and healthcare facilities in the United States, Europe, and the Middle East (Bloomberg Business Week, 2014). Its automated medication dispensing systems include ServeRx system, which involves automation software, medication and supply cabinets, bedside solutions, and computerized orderRead MoreComputer Technology And Pharmacy : Computers1713 Words   |  7 PagesRaven Wells CSC 151-02 Professor Boonthum October 27, 2015 Computer Technology and Pharmacy Computer Technology and Pharmacy Over the past 40 years, information technology has had a major impact on the working lives of millions of people. Many industries have embraced computer technology because of the benefits of automated information processing. More importantly, Computers is a major part of our every day activities and it would be devastating if it was taking away because everything we do inRead MoreThe Stock Price Of Cvs1359 Words   |  6 Pagesone of CVS Caremark ´s primary goals. The goal of the acquisition of Targets Pharmacy and Clinic ´s Business is to expand their market reach further. â€Å"With the completion of the transaction, CVS Health acquired Target’s 1,672 pharmacies across 47 states and will operate them through a store-within-a-store format, branded as CVS/pharmacy. In addition, a CVS/pharmacy will be included in all new Target stores that offer pharmacy services†. It greatly increases their presence in the pacific area, whereRead MoreMemory Database And Cloud Computing1341 Words   |  6 Pagesapplications that allow natural human computer interactions. We envision users of enterprise applications to interact with their software tools in such a natural way, just like any Internet user interacts with a web search engine today by refining search results on the fly when the initial results are not satisfying (Plattner, 2011). Keeping up with the South River hospital and pharmacy s growth requires keeping up with this database te chnology. Subsequent queries are the second, third, and so on, queriesRead MoreTechnical Paper1324 Words   |  6 PagesTechnical Paper: Information Systems Security Shauna Martin Professor Keppler CIS 333: Networking Security Fund 6/8/12 As an information security officer for a small pharmacy there are a few things that need to be addressed. As with all companies it is top priority to make sure that the data that is input into the machines stays safe and to make sure that the people using the computers know it is their responsibility as well. As a security officer my supervisor has asked me to identifyRead MoreCurrent Trends in Business Communication847 Words   |  4 PagesCurrent Trends in Business Communication Current Communication Trends in Business Technology advancements over the recent years have made communication possible in different ways. Communication in the business world today can range anywhere from e-mails, personal digital assistants, text messaging, instant messaging, and through the use of web-cams, just to name a few. These different communication tools allow employees to communicate both internally and externally in a timely and more efficient

Friday, December 20, 2019

Antigone And King s Views On Civil Disobedience - 967 Words

Martin Luther King Jr. vs. Antigone Antigone and King’s views on civil disobedience are executed very differently. They both had their own purpose to follow what they believed in, but both were achieved differently. Martin Luther King Jr. followed his own beliefs to risk his life while Antigone risked her life to follow the Gods for honor just to make sure her brother was properly buried. I will show how Martin Luther King Jr. fought for freedom while risking his life for blacks not only in Birmingham Alabama, but also around the world. Also, how Antigone knew the consequences she would face to give her brother a proper burial, but still fought for what was right Martin Luther King Jr. disobeyed the law for the purpose to end segregation for thousands of blacks in the United States of America. In his Letter From a Birmingham Jail he says he was there because injustice was there. Martin explains that,† A just law is a man-made code that squares with the moral law or the law of God. An unjust law is a code that is out of harmony with the moral law.† He shows that he is in Birmingham to support the blacks that can’t fight on their own. He plans to break no just law, but an unjust law is willing to be broken for the sake of his people. In addition, â€Å"Nonviolent direct action seeks to create such a crisis and foster such a tension that a community which has constantly refused to negotiate is forced to confront the issue.† (Martin Luther King Jr.). I use this sentence toShow MoreRelatedCivil Disobedience, And Martin Luther King Jr. s Letter From Birmingham Jail1018 Words   |  5 PagesToday, the word disobedience car ries a negative connotation that acts as a deterrent for necessary disobedience. The common way in which people view disobedience is as a rejection of a rule, law, or a simple standard. Historically, rules were implemented in ways that were deemed immoral by society. Therefore, civil disobedience is justified to combat immoral standards implemented in society. However, civil disobedience is only justified under these circumstances, mainly for the betterment of societyRead MoreAntigone And Dr. Martin Luther King Jr. s Letter From Birmingham Jail1233 Words   |  5 PagesIn Sophocles’ Antigone and Dr. Martin Luther King, Jr.’s â€Å"Letter from Birmingham Jail†, Antigone and Dr. Martin Luther King, Jr. used resistance against powerful leaders to follow their morals and make a statement. Dr. Martin Luther King, Jr.’s approach towards the reconstruction of society’s cultural understanding of segregation used civil disobedience in a more public and lar ge-scale approach, whereas Antigone’s use of civil disobedience defied the law in a much more private, small-scale way toRead MoreAntigone And Letter From A Birmingham Jail Analysis716 Words   |  3 PagesSophocles’ â€Å"Antigone† and Martin Luther King Jr.’s â€Å"Letter From a Birmingham Jail† are two works of literature addressing the concept of nonviolent civil disobedience. â€Å"Antigone† is the story of a young woman, who the play is named after, who buries her brother against the law, as he was a traitor. She was then incarcerated and sentenced to death by the king of Thebes and her uncle, Creon. â€Å"Letter From a Birmingham Jail†, as the name implies, was written while King was arrested in Birmingham forRead MoreMartin Luther King Jr And Antigone1358 Words   |  6 PagesMartin Luther King Jr and Antigone were two people who used a nonviolent resistance technique to stand up for a cause they believed in. The technique t hey used is called Civil disobedience which is the refusal to comply with certain laws in a peaceful, non-aggressive protest. Both Martin Luther King Jr and Antigone were seeking justice for a cause without having to become physically violent with the opposing party. It took strength to go against their oppressors but they were willing to make self-lessRead MoreUnderstanding Of Cultural And Contextual Consideration Of Antigone By Sophocles968 Words   |  4 Pagesorals, my understanding of cultural and contextual consideration of Antigone by Sophocles has developed. You must receive further information about the playwright, the role of women, and the symbols used in Antigone to have a full understanding of the play. Without the knowledge provided from the interactive orals, the play would not have been understood as well as it is now. To understand the importance and meaning of Antigone, you must understand the playwright and his purpose of writing the playRead MoreAnalysis Of Thomas Hobbes s Leviathan 2457 Words   |  10 Pages Laviathan, Thomas Hobbes most important work and one of the most substantial philosophical texts of the Seventeenth century, was written largely as a response to the political violence and turmoil of England’s civil wars. In Leviathan, Hobbes, using science and reason as a foundation, attempts to create a concrete and methodological solution for peace and political stability. In the context of a historically violent and fear stricken period in which Leviathan was written, itRead MoreSophocles Antigone By Sophocles1892 Words   |  8 PagesAntigone †¢ Title: Antigone by Sophocles †¢ Genre: Play; Tragic drama †¢ Historical context: Written circa, 442 B.C.E. in Athens Greece. Performed circa, 441 B.C.A. Its literary period was classical. While Antigone was the first written of Sophocles’ three Theban plays, it was the last of the trilogy. It was performed during a time of national unrest. Sophocles was appointed to serve as a general in a military crusade against Samos. The significance of the historical events during that timeRead MoreThe Truth Of Courage : Socrates, Oedipus, And Antigone2414 Words   |  10 Pagesbelieve and the power of belief over our will. In Greek literature it can often be seen as the difficult path—an unconscious act of boldness, but before all it is the conscious decision of a person to act despite the danger. Socrates, Oedipus, and Antigone all manifest courage in their own ways. It can be displayed by human and divine acts of courage. One might focus more on self-sacrifice for the good of others, while another for a personal gain or expla nation. Ultimately there is no courage withoutRead Moretheme of alienation n no where man by kamala markandeya23279 Words   |  94 Pagesï » ¿ANTIGONE KEY LITERARY ELEMENTS SETTING This tragedy is set against the background of the Oedipus legend. It illustrates how the curse on the House of Labdacus (who is the grandson of Cadmus, founder of Thebes, and the father of Laius, whose son is Oedipus) brought about the deaths of Oedipus and his wife-mother, Jocasta, as well as the double fratricide of Eteocles and Polynices. Furthermore, Antigone dies after defying King Creon. The play is set in Thebes, a powerful city-state north of

Thursday, December 12, 2019

Impact of Cloud Computing in Business-Free-Samples-Myassignment

Question: Discuss about the Impact of Cloud Computing in Business. Answer: Introduction With the advent of the digital era business operations are becoming complicated as information is treated as the main resource. So every business needs a smooth single entry solution in a cost effective way to cope up with the environmental changes. With the technological advancements business can take reward of the above efforts by utilizing the concept of cloud computing. Cloud computing can drive business operation from its complex forms to a smooth form (Damsgaard Scheepers 2001). Business of all trade focus on profit and by utilizing the concept of cloud computing business can earn maximum profit with low budget. Access to data and other process can get done via promised inbuilt software. Even the business becomes portable as the end user can access from anywhere via the device used. Business is getting transformed to smooth and sophisticated form via cloud computing (Rahul et al, 2012). Irrespective of the workers of the IT departments the other departments gets active with th e advent of the cloud computing applications. With legal licensing the cost of cloud computing can get monitored with proper security and integrity. This helps business to go for the concept of cloud computing whether its small or big. And even the package system can get altered or updated in a dynamic manner as per the need of the business. Before going for the change an organization should analyze some aspects that are very crucial to make the cloud computing fruitful (Linthicum 2009). The factors that are important will be discussed in the literature review section. The topic selection for the business research lies in the fact that cloud computing is a user friendly interface for the users and more over the user can retrieve data without having much knowledge of IT and perform their operation smoothly. The concept of cloud computing is new and getting upgraded through advancement in technology. The users are using the data in real time and real time is the best time to correct errors. Pros and Cons of cloud computing will be the core research activities. Project Objective The primary objective of the research: Analyse the impact of cloud computing in business. Secondary objectives: Cloud computing as a tool for decreasing risk and increasing business revenue Determining Pros and Cons behind cloud computing in business Analyzing Cloud computing as driver for fighting competition Project Scope The scope of the project suits from small start-up companies to big business organization as per the requirements of the business operation and cost of operation. As the project needs to get completed in a specific period of time the researcher faced the following limitations: Time is limited The primary source of data is limited so mostly secondary data is used. Limited edition of literature review was found of the proposed topic Throughout the report the researcher has tried to distinguish the changes that cloud computing can bring in business operations. As the cost of hardware components reduces with time every company can increase profit margin with low investment. Critical analysis of Pros and cons of cloud computing is analyzed to great extent. Strategies required to overcome the risk associated with cloud computing is recommended by the researcher. Literature Review Background In this section critical analysis of the literature review of the impact of cloud computing is done. Critical analysis of the literature review enhances the research validation by data analysis against the problem statement of the research objectives (Saunders et al, 2009). In cloud computing internet computer technology are used in a standard manner by tuning the capabilities under a protocol. With minimum effort of the management of the organization the operations are processed under a network access by sharing the relevant information under a single point for gaining the results is termed as cloud computing. The data are stored, accessed and retrieved under a protocol for running the business in a competent manner with the environmental changes. In information technology the term cloud can be defined as the remote hub of data access where the date get stored and retrieved from any stand point, highlighted by Nabil, 2010. The definition of cloud computing is dynamic as various researchers have produced ideologies of their own about the concept. User can access data with the compatible application provided by the provider that gets linked with the cloud. The architecture of cloud computing is divided into four parts. Variation of Cloud Computing Concept Now a days various types of cloud computing packages are available in the market and so based on the requirement of the business and its size the package are chosen. Some common types of cloud computing that are in use are analyzed below: (IaaS): INFRASTRUCTURE AS A SERVICE (PaaS): PLATFORM AS A SERVICE (SaaS): SOFTWARE AS A SERVICE Small business house with limited business operation use IaaS. Even this package startup business can use for moving ahead with nominal costing. When the business operation size is huge and the tasks are complicated Paas and IaaS are utilized as SaaS has limited service and moreover this type of cloud computing software installation is highly cost intensive. Big business organization is taking advantages of third type of services. Amazon is using the components of IaaS and gaining huge profits in the market by being the biggest bookstore virtually. Several other IaaS are like the Google compute engine, HP cloud Etc. Companies using PaaS type of cloud computing are Microsoft Azure, SAP weaver cloud, and Amazon elastic beanstalk. Case Study For enhancing the validation of the business research the researcher has taken Google, Amazon, and IBM as the service provider. The global users choose the service providers as per their choice and requirement. IaaS SaaS PaaS GOOGLE The user using this model gets access to millions of information in a short period of time and from various options they can choose their requirements. Via Google Docs the service provider is placing this interface. The users are able to store, update, retrieve, and analyze data as per their requirements via Google App engine. AMAZON Multiple services are offered to the customers for the growth of the providers with better functioning of the users. This service is not provided by Amazon The users need to pay for the interface that Amazon is providing to the users. IBM Open interface interested users are provided by this interface. Public, Private and hybrid clouds are offered to the users. Loyal customers who have their own business functioning uses this interface. End users are using static computing infrastructure. Pros and Cons of Cloud Computing Reason behind business getting transformed to cloud computing: By 2020 it is forecasted that cloud computing will cross 240 billion$ market value (Columbus 2013). Cloud computing is transforming the complicated business operations to a smooth operations for increasing the profit margin by reducing the expenditure (Rahul et al, 2012). Some of the benefits of cloud computing is discussed below: Optimization of the cost of investment is one of the biggest advantages of going for cloud computing concept in the current business scenario. Companies can take advantage of the cloud computing model by either of the below given mechanism: Reduce the running cost of the technology that is in use Reduce cost of capital expenditure and increase cost of operating expenditure Getting the cost of technology reduced Increase business values by focusing on core competencies The above benefits are taken by business in their initial stages or the business that has just set up the cloud computing concept. Other than this there are several pros for getting business transformed to cloud computing. Pricing based on usage concept can be used in a pay as you go pricing concept where the users need to pay as per their usage of the IT support based on their business operations. So it suits the decision makers to purchase IT supports as per their budgets and requirements. So it is a low cost intensive move for the business to go for cloud computing model for their daily operations. As per the demand with time the infrastructure can get optimized in a dynamic manner for coping up with environmental changes and fight competition. The decision maker can regulate the cost management in a smooth and viable manner via a user friendly interface. Usage based pricing protocol enhances rise in operational expenditure from capital expenditure for business (Roomi et al 2013). Start up business or business with limited resources can run their business by investing nominally in their fixed investment via cloud computing model. Without investing a lot in infrastructure development some common components of ICT like computers, internet can be purchased for taking the advantage of the whole cloud computing model. Business can focus on operational expenditure instead of focusing on cost of expenditure for gaining return with low cost cloud computing model instead of remaining stick to high cost investment(Columbus 2013). Business owners can reduce the cost of the business by eliminating the cost of purchasing fixed cost hardware components in daily basis and not only that the maintenance cost also gets reduced. Beside that the service provider of the cloud computing assures the security and reliability of the functioning. Once the implementation is done the business can take advantage of the cloud computing model with a user friendly mode. The business operations become more flexible as whenever required the service can be updated and the obsolete operations can get eliminated when required. However for every operation some investments are required for purchasing softwares and other functional activities of cloud computing. Controlling risk in business operations is another important pros of the cloud computing model. The cloud computing support service providers are having team to handle all type of risks that are associated in cyber business operations. No one can be expert in every field and hence the business can get support to run the business and fight competition as risks can get anticipated by adopting cloud computing model. In a single package end user can get benefit of various business operations to risk management. The run time problems get eliminated once it is conveyed to the service providers. If the problem is not solvable the SaaS provider it gets solved by the external IaaS. Mostly the risks are eliminated by the SaaS service providers for the end user of the cloud computing model. Total cost of ownership (TCO) can be easily calculated by the end users as the model providers always propose a transparent cost of the required service without any hidden charges (ENISA 2012). So as per the bid end users can compare their requirement and purchase their needs with respect to time without going for mass investment in the initial stage. Even often single user packages can be shared with multi user discipline without extra charges. Resource can get shared and utilized to its extent with cloud computing model with low cost budget for better output. Challenge of cloud computing Beside superficial benefits there are some challenges in adopting cloud computing in business as said by (Reza 2013). As said by (Anthony 2011) the efficiency of the concept goes down when the utilization is more than 80% as the hardware peripherals becomes inactive for generating desired outputs. Other than that there are several challenges that must be taken into consideration before adopting cloud computing in business and are discussed below: Data thieving: as per (Anthony 2011) it is seen that security issues holds the main impact in adopting cloud computing according to the survey of International Data Corporation (IDC). Mathew 2013 concludes most of the service provider of cloud computing dont have their own server and they rely on third party server, this is a major issues in reducing the data security of the users. Report of (Abhinay et al. 2013) justify that more than 37% cloud computing users is getting affected from external hackers. In real life the case of Zappos is a true example of the malicious cyber attack. Malware injection assault: in this type of attack the hackers injects malicious code inside the cloud of the user and get access to users database said by Te-Shun 2013. SQL injection is the common strategy used by hackers for getting access to the database of the cloud highlighted by Sara Kausar 2012. Wrapping assault: in this attack the hackers utilize extensible markup language for gaining access to the web server highlighted by (Wen Ling 2010). By penetrating the cloud the unauthorized users gets access to the users database by reducing the security of the cloud highlighted by (Subramaniam Deepa 2015). Authentication attack: business using ineffective encryption system might get affected by this attack where the hackers hacks the cloud in the authorization step of the web server as described by Subashini Kavith 2011. Denial of service attack (DoS): This type of attack occurs in the peripherals either it can be in the network or in the CPU. In this type of attack usually the users dont get access to their server as the hackers miscues the stored data of the cloud, highlighted by (Wang, et al. 2014). Data privacy: the issue related to data privacy depends on the control and compliance of the users, improper operation management of the user increase reduces the data privacy level, justified by Waleed Li (2016). It is the responsibility of the users to store and retrieve data with validation for insuring data security of the cloud, addressed by Choubey Namdeo( 2015). Strategies for resolving challenge of cloud computing As discussed above cloud computing is having some bad effects that need to get resolved before going for cloud computing adoption in the organization. Below mentioned strategies can rectify the problems associated with cloud computing. Data thieving resolution: this type of threats can be reduced by the applications of generating new codes after the end of every session; this will conceal the penetration of hackers to enter the cloud for malfunctioning as suggested by Angadi et al. 2013. The control and monitoring process of the server plays an important role in reducing this kind of risk as its controllable. Malware assault resolution: for reducing this type of challenge the server should interfere in cross checking of the operating system related to security issues with the user to avoid the opportunity of the hackers to inject malware in the cloud as said by (Kazi Susan 2010). Wrapping assault resolution: the resolution for this is provided by Apurva et al. 2013; the server should generate extra bit security system for saving the operating system so that the hackers find it difficult to penetrate the cloud and get access to data. Authentication attack resolution: as per the suggestion of (Sumitra, et al. 2014), better key management program can reduce this type of risks, as better coordination between the server and the user via ID management increases the security of the cloud. Denial of service attack resolution: as per the suggestion of the (Poonam Sujata 2013) this type of risk can be reduced by utilizing the concept of firewall and signature. The use of firewall and signature will hike the security system and reduce threat from external hackers. Conclusions: The report focused on the adoption of cloud computing in business and the pros and cons associated with it. It is seen that there are various service providers in the market where the giant players are competing for money with their unique service interface. Profound knowledge about the mechanism of cloud computing is shared within the report and mostly secondary source of data are used for the critical analysis. Both pros and cons are associated with adopting the cloud computing mechanism in business. For the competencies of the mechanism business gains profits and for the cons business operation gets affected and incurs loss. The objective of the research is examined through the critical analysis of the literature review and theories. Cloud computing mechanism will not only enhance the profit margin but will lead to innovation among the business environment. Beside advantages there are certain challenges in developing cloud computing. The researcher has proposed strategies that can reduce threat of cloud computing. Standardization and virtualization process will allow the user to use the data that are in need with a user friendly interface with proper rules and regulations. Via cloud computing the information within the business can get shared smoothly without barriers that will lead to better decision making process for the wellbeing of the business and better job satisfaction of the employees. From the report it can be concluded that cloud computing adoption in business will lead to profit maximization without increasing the expenditure cost and the pros holds more weighted advantages compared to cons. References Abhinay, B. A., Akshata, B. A. Karuna, C. G., (2013). Security Issues with Possible Solutions in Cloud Computing - A Survey. International Journal of Advanced Research in Computer Engineering Technology, 2(2), pp. 652-661. Anthony, B. Syed, M. R., (2011). An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security Its Applications, 3(1), pp. 30-45. Angadi, A. B., Angadi, A. B. Gull, K. C., (2013). Security Issues with Possible Solutions in Cloud Computing - A Survey. International Journal of Advanced Research in Computer Engineering Technology, 2(2), pp. 652-661. Apurva, S., Sanjay, S. Rahul, C., (2013). Security Aspects in Cloud Computing. International Journal of Engineering Trends and Technology, 6(3), pp. 118-120. Bourne J, 2014 Enterprise cloud adoption goes up- and the bets are on SDN and NFV to make the most of it, viewed 5th August 2017 from, https://www.cloudcomputing-news.net/news/2014/nov/24/enterprise-cloud-adoption-goes-and-bets-are-sdn-and-nfv-make-most-it/ Columbus L, 2013 IDG cloud computing survey: security, integration challenge growth,: Forbes, US Damsgaard J, Scheepers R, (2001). Harnessing Intranet Technology for Organizational Knowledge Creation Austrian Journal of Information System, viewed 5th August 2017 from, https://vbn.aau.dk/en/persons/jan-damsgaard(e8fee34e-40a3-4ad7-9b84-ea830be27251)/publications.html ENISA 2012 (European Network and Information Security Agency)Cloud computing: benefits, risks and recommendations for information security, Greece, viewed 4th August 2017 from, https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment Hogan M, Liu F, Sokol A, Tong J, (2011). NIST Cloud Computing Standards Roadmap, National Institute of Standards and Technology, Tokyo Linthicum D, (2009).The integration challenges of cloud computing, Info world, viewed 4th August 2017 from, https://www.infoworld.com/article/2631583/cloud-computing/the-integration-challenges-of-cloud-computing.html Kazi, Z. Susan, V., (2010). Security Attacks and Solutions in Clouds. ACM, Berlin Poonam, Y. Sujata, (2013). Security Issues in Cloud Computing Solution of DDoS and Introducing Two-Tier CAPTCHA. International Journal on Cloud Computing: Services and Architecture, 3(3), pp. 25-40. Rahul M, Haque M J, Muntjir M (2012). Impact of cloud computing on IT industry: A review and analysis, Publishing: International Journal of Computer and Information Technology, viewed 5th August 2017 from, https://www.noexperiencenecessarybook.com/g9Ggj/title-cloud-computing-impact-on-business.html Roomi A, Ebrahim S, Buqrais S, Ahmad I, (2013). Cloud computing pricing models: a survey, viewed 5th August 2017 from, https://www.researchgate.net/publication/270527081_Cloud_Computing_Pricing_Models_A_Survey Rountree D, Castrillo I, (2013).The Basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice, Elsevier publishing, US Saunders M, Lewis P, Thornhill A, (2009) .Research methods for business students, fifth edition, Pearson Education, UK Sara, Q. Kausar, F. K., (2012). Cloud Computing: Network/Security Threats and Countermeasures. Interdisciplinary Journal of Contemporary Research in Business, 3(9), pp. 1323-1329 Subashini, S. Kavitha, V., (2011.) A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1), pp. 1-11