Saturday, May 23, 2020

Analysis Of Citrate And Its Various Salts Essay - 848 Words

Overview: Citrate and its various salts have been researched extensively and found to be used in most commercial settings, such as a local supermarket, as food preservatives. Hence, the level of citrate salts of various metals in our daily food has to be allocated to acceptable levels; as well enforcement of these acceptable levels requires an analytical tool capable of quick, selective and sensitive detection and quantification of citric acid levels in our daily food. This analytical method utilizes a graphite sensor to determine citrate in various beverage samples. It requires the construction of a relatively simple graphite carbon electrode for the determination of citrate levels. This method uses graphite carbon electrodes, within a Flow Injection (FI) system, as potentiometric sensors for the determination of ascorbate in food products. The mechanism supporting this method is the process of adsorption and subsequent oxidation of ascorbate on the electrode surface and the potential differe nce after citrate introduction. The results from this analytical method were validated against a conventional procedure, i.e. a standard titrimetric method. There are many analytical methods for determining citrate levels in samples, however, too many of these methodologies are tedious and time consuming; they require expensive materials and expensive equipment. Araà ºjo et. al (2011) suggests this analytical method for it is relatively quick and inexpensive. It does not require largeShow MoreRelatedOrganisms Of Two Unknown Bacterial Cultures Essay1700 Words   |  7 Pages1: Streaking for Isolation result for unknown 33 CULTURE MEDIA PURPOSE REAGENT OBSERVATION RESULT MAC AGAR PLATE Demonstrate the ability of a gram-negative bacterium to metabolize Lactose Crystal violet dye, lactose, neutral red indicator, and bile salts Bright pink halo, bile precipitant (haze) around the colonies, and pink colony growth Ferment lactose- produced an acidic environment that appears pink. Gram Neg. BHIA SLANT Used for maintenance and preservation of pure cultures Brain heart infusionRead MoreTypes Of Gel Drug Administration1537 Words   |  7 PagesTherefore, this method cannot be adopted as a general method to prepare gels. In flocculation method, gelation is produced by adding adequate quantity of salt to precipitate to produce age state but inadequate to cause complete precipitation. It is important to ensure rapid mixing to avoid high concentration of precipitant. The addition of salts to hydrophobic solution brings about coagulation and gelation rarely occurs. The gels formed by flocculation method are thixotropic (time-dependent shearRead MoreCholera Outbreak in South India in Association with Religious Gathering 833 Words   |  4 PagesCholera outbreaks have been frequently reported from various parts of developing world mainly owing to poor sanitation of potable water. Most of its outbreak has been reported during monsoon (1). However, the outbreaks are not restricted to this period. Cholera outbreaks have also been reported in refugee camp, prison, funeral feast, etc., (2). Cholera is caused by two serogroups of Vibrio cholerae O1 and O139. Among them O1 has two biotypes Classical and El Tor. Classical biotype was completelyRead MoreLab Report Of The Copper Acetate Monohydrate1875 Words   |  8 Pagesdepends on the acidic pH. The remaining sol contains alcohol and citric ions. The nucleation rates depend on the gel viscosity and rigidity, which mainly depended on the copper salt mixed with citric acid. Tuning of pH appears to be particularly important in systems in order to optimize the formation of stable copper citrate species and prevent precipitation of individual hydroxides (Gi Dae Park et al. 2016). The observed change in morphology is due to the formation of bridging coordination betweenRead MoreProperties Of Nannoparticles Enhanced Composites1389 Words   |  6 Pagesproperties of NPs-doped films, a novel alteration proved to be more amenable as well as need low processing temperature compared to the traditional glass methods. Basically, the general process involves the formation of metal NPs from a soluble salt form via various methods like annealing and photochemical reactions [11], however, suffer a couple of constraints like size and shape, polydispersity and nucleation methods. This lead to an alternative method to provide more flexibility to include the particlesRead MoreUnknown Bacteria Lab Report1467 Words   |  6 PagesEnterotube II as instructed by our lab instructor, the tube was labeled and placed it in the 350C incubator for 24 hours. There were six different test media that were performed on the gram positive bacteria, starting with the inoculation of the mannitol salt agar (MSA) dish, using a flame-sterilized and cooled transfer loop. Two loop tranfers of our isolated gram positive bacterium were placed onto the surface of the agar, applying the quadrant streaking technique as illustrated on page 18 of the lab manualRead Moreenergy drink Essay3010 Words   |  13 Pagesinformation: a. What it is (very brief description: 1-2 sentences) b. What it does (very brief description of its physiological role in the body: 1-2 sentences) Red Bull ® Ingredients: carbonated water, sucrose, glucose, citric acid, taurine, sodium citrate, magnesium carbonate, caffeine, glucuronolactone, inositol, niacinamide, calcium pantothenate, pyridoxine HCl, vitamin B12, natural and artificial flavors, colors. Carbonated water What it is: Carbonated water is the primary ingredient of carbonatedRead MoreIndustrial Attachment Report at Cmr-Kemri9715 Words   |  39 Pages................................9 2. VDRL RAPID TEST FOR SYPHYLIS ...................................................10 3. BLOOD FILMS FOR MALARIA TEST..................................................11 2. URINE ANALYSIS ....................................................................................................13 3. STOOL TEST FOR OVA AND CYST ......................................................................15 5. CULTURE AND IDENTIFICATION OFRead MoreQUANTITATIVE DETERMINATION OF TOTAL HARDNESS IN DRINKING WATER BY COMPLEXOMETRIC EDTA TITRATION2148 Words   |  9 Pagesmeasure of the amount of calcium and magnesium present in sample water[1]. These calcium and magnesium ions have the capacity to replace sodium or potassium ions and form sparingly soluble products or precipitates.[2] Water hardness is involved in various aspects of industrial and biochemical processes. Large amounts of ppm CaCO3 in water can form precipitates when interacted with soap and form rings known as â€Å"scum† in several utensils and appliances. The formation of these â€Å"scum† in electrical appliancesRead MoreHelicobacter Pylori And Gastric Cancer2702 Words   |  11 PagesBeglinger, 2007).Though it was estimated in fourth place in incidence but it remans in second place in terms of mortality. There are several risk factors that has been identified for causing the stomach cancer including H.py lori infections such as salt-preserved foods, smoking, alcohol, obesity, radiation, family history and dietary nitrate (Crew and Neugut, 2006). The researchers has even found that the incidence rate of stomach cancer varied across different geographical region and such variation

Tuesday, May 12, 2020

The Principle Of Utility, And Hedonic Calculus - 905 Words

In this essay, I will explain whether act or rule utilitarianism is superior and why. I will begin by defining important terms like utilitarianism, the principle of utility, and hedonic calculus. Then I will move on to defining act utilitarianism and its strengths and weaknesses. I will then do the same with rule utilitarianism. I will argue that rule is superior to act, in the sense that it is more relevant to society as a whole, and it has more benefits for society. Rule utilitarianism is superior to act utilitarianism because it has less gray area, it is more stable with morality, and it has the flexibility to be general or specific. 2. I will begin by defining important terms to understand what rule and act utilitarianism is. Utilitarianism is teleological. It is when â€Å"the moral worth of an act is judged according to the goodness and badness of its consequences† (Angeles, 326). The principle of utility according to Mill is when â€Å"actions are right in proportion as they tend to promote happiness, wrong as they tend to produce the reverse of happiness† (Mill). Hedonic Calculus is Bentham’s â€Å"method of choosing an action based on the amount of pleasure that the action would provide. The amount of pleasure was determined by its intensity, duration, propinquity, certainty, fecundity, and purity† (Angeles, 124). A simple term is utility, and it means pleasure or happiness. All of these terms will tie into act and rule utilitarianism. 3. Act utilitarianism is when you shouldShow MoreRelatedThe Principle Of Utility And Hedonic Calculus Essay1374 Words   |  6 PagesBentham’s Principle of Utility and Hedonic Calculus and using these two concepts to decide whether or not animals should be allowed to be used for entertainment. I will then explain an advantage and a disadvantage to his hedonic calculus. The validity of hedonic calculus for me doesn t seem to be an overall method to tell what is right from wrong because it does not factor in the morality of the situation. However, it is a great place to start. First I will go on to explain Bentham’s Principle of UtilityRead MorePro Life And Pro Choice1403 Words   |  6 Pagesover what qualifications the fetus must display in order to have the rights that come with moral personhood. One ethical principle that can be applied to the issue of personhood in relation to abortion is the Value of Life Principle. Under the Value of Life ethical principle, prese rvation of life takes precedence over all other ethical values. Therefore, according to this principle, if it can be determined that the fetus has the right to life, that right must be preserved. However, even if it is determinedRead More Utilitarianism Essay examples1220 Words   |  5 Pagesand America, demands were being made for human rights and greater democracy. Bentham worked on legal reform. Utilitarianism is associated with the principle of utility. Utility means the amount of satisfaction or pleasure that somebody gains from consuming a commodity, product, or service, i.e.; useful. The hedonic calculus, which is his system for measuring how good or bad a consequence is: At the time Bentham put forward the theory it was instrumental. It changedRead MoreExplain Bentham’s Utilitarianism: (30 Marks)843 Words   |  4 PagesExplain Bentham’s Utilitarianism: (30 Marks) A man called Jeremy Bentham had a theory called the ‘Utilitarianism theory’. He was born in London at the time of the great scientific and social change and wrote ‘The Principles of Morals and Legislation’ in 1789. Bentham had the theory that all humans seek pleasure and avoid pain at all costs. Utilitarianism has been described as an act or a rule rather than a theory. We break this down into three parts: -Motivation: Bentham was a hedonists (‘Hedone’Read MoreThe Ethical Dilemma Of Abortion1319 Words   |  6 Pagesconsequentialism and utility. A teleological theory is a theory which operates on the basis that the ‘end justifies the means’, so it is not the action itself that is important, but the intended result of the action. Consequentialism means that whether an action is good or bad can be evaluated by the consequences it produces, so utilitarianism would evaluate an action based on the pleasure it produces, making it a theory based specifically on hedonistic act consequentialism . Utility, is defined by JohnRead MoreDiscussion of Utilitarianism Essay examples830 Words   |  4 PagesDiscussion of Utilitarianism In this paper I will be discussing utilitarianism. Utilitarianism is the theory proposing the principle of utility as the correct ethical standard. I will also be talking about the THEORY of RIGHT CONDUCT, which is also a part of moral theory. I have been asked to prove if Bentham or Mills’ version of utilitarianism is right for the sadistic voyeur case. I will begin by telling you about the case. Case: this man enjoys watching womenRead MoreUtilitarianism Essay740 Words   |  3 Pagescertain situations and was first introduced by a hedonist (pursuer of pleasure) named Jeremy Bentham who put forward the ‘Principle of Utility’ which said â€Å"The greatest happiness for the greatest number†. Utilitarianism is a theory which bases on the end purpose (teleological) of achieving pleasure, our decisions should be based on consequences in pursuit of the principle of utility (consequentialist) and is a theory which judges each situation independently (relativistic). Jeremy Bentham was the firstRead MoreThe, The Greatest Good For Greatest Number1354 Words   |  6 Pages would the terrorist be with or against torturing one to save thousands? Personally with what great knowledge I’ve obtained in class I can automatically say that a Utilitarian would be for torturing the daughter because it’s all about maximizing utility. With that being said A Philosopher by the name of Joshua Green found out just that. Joshua Greene basically argued in his piece â€Å"Moral Tribes† for of which what the â€Å"Father of Utilitarianism†, Bentham, states. Bentham said â€Å"The Greatest good forRead MoreEssay on Utilitarianism1031 Words   |  5 Pages Utilitarianism is mainly associated with the principle of Utility summarised by Jeremy Bentham, a social reformer, in 1768. This principle was to apply ‘the greatest good of the greatest number’ theory to all situations that may arise. This theory was that which is good is the act which provides the greatest amount of pleasure andRead MoreRelationship Between The Principle Of Utility And Moral Rules1462 Words   |  6 PagesEvaluate Mill’s understanding of the relationship between the principle of utility and moral rules. In this essay I will argue that Mill thinks that there is a strong relationship between the two concepts, although he regards moral rules as having a subordinate relationship towards the principle of utility. Mill is a rule utilitarian who believes moral rules are useful guidelines for everyday uses, but reverts to the principle of utility in complex moral situations. In this essay I will also argue

Wednesday, May 6, 2020

Hungergames Free Essays

Katniss Everdeen volunteering in Prim’s place as tribute and deciding to fight against the injustice of the Games Katniss enters slowly, stunned, and then as the realisation of the words set in, she races towards the front of the stage to face the panel. And the girl tribute for District 12 is †¦ Primrose Everdeen! Not Prim! Not my little duck! There must be some mistake! This can’t be happening! Stop! I volunteer! I volunteer as tribute in her place! I am Katniss and I wish to be Tribute for District 12. Don’t take Primrose! Katniss takes a minute to compose herself before continuing. We will write a custom essay sample on Hungergames or any similar topic only for you Order Now I promise I will do whatever I can to bring victory to this District and that I will be a true and brave Tribute if you allow me to stand in for Primrose. Moving towards the fence line where her friend Gale is standing. Gale– come and get her and take her away from here. Please – watch over my Mother and my sister – make sure they are safe and fed. I have to go! Turning on her heel, Katniss moves back to centre stage where she sees the crowd standing silently, with their three middle fingers on their left hand held to their lips. Is this really true? I see you and I understand the message you are sending me with your fingers touching your lips and then held out to me. This is our District sign – this is the sign that mearns thanks and admiration. I will try my hardest to be true to our District and to undermine this cruel and humiliating festival that is the Hunger Games. Katniss’ movements start to waver as the seriousness of what she has done starts to really sink in. She is moved to a room in the court house behind the stage. This room is where I finally await my fate and the reality of it is hitting me hard. The injustice of this reaping makes me physically ill. I want to throw up so bad! This room once seemed so big but now its walls are crushing me and closing in on me. I fear for my safety but I know I have made the right decision to stand in for Primrose. I feel so sad. Sad for my sister – tiny, sweet, delicate Prim – my â€Å"little duck†. I could never let her have to confront the degradation or torment of weeks of competition – she would not last a second. The other tributes would see her as a frightened deer – easy prey – and crush her like a bug. Pacing up and down and stopping every now and again to face the audience and look at them with conviction. Me on the other hand? At least I can hunt and I am pretty good with a bow. I am a sthronger person much more capable of looking after myself and using my wits to protect me than Prim will ever be. She is a baby! It astounds me how the Capitol can continue to hold these barbaric games. They have already taken our livelihoods and our freedom – what good could possibly come of the senseless slaughter of innocent children apart from the punishment for an uprising that happened so long ago, it is not in my memory. Why must the children be put to death? Moves to centre stage and sits The anguish I am feeling is rising up in my chest, threatening to flood over me and cause more misery and hopelessness than I am already experiencing. But I am sthronger than that! Stands again and moves stage left I will overcome this sense of utter desolation and take on the challenge of sticking to the Capitol in any way I can. Being led into this room reminds me of what prison must be like for those who betray the Capitol and it hardens my resolve. I am determined more than ever to fight for my freedom and the freedom of all children of Panem. We are not lambs bred to be slaughtered to teach the rest of Panem a lesson about subservience and submission. We are human beings! But am I really that brave? I am sthronger in spirit than many my age and that has got me in to all sorts of trouble so far. Maybe it will be to my advantage now. Katniss pauses and sits down pondering†¦ Maybe this was meant to happen. Maybe it is my task to do what I can to rebel against the insane faulty logic that governs the hearts and minds of the Capitol. I was once so close to accepting Gale’s offer to run off into the woods, to hide away from the rest of the world and live in relative safety out of the prying eyes of the all controlling, all pervasive Capitol. Now I know why that was not my fate. Katniss moves side stage and holds her It could be done! If I play cool and keep my head, I could turn this situation to my advantage. I could try to send a message to all in the Districts that Katniss Everdeen mearns business. She is not going to take this lying down. She is not going to give in to the brutality of the power-hungry Capitol, she is not a pawn to be played with like a rag doll. I must have some skills that I can use to survive this ordeal. The predators may have me in a corner and God knows, I am terrified, but a cornered animal is also a dangerous one. One wrong move, and it will destroy – it has the most to lose. Katniss becomes immobilised by an overwhelming sense of inadequacy What am I talking about? I can’t possibly win. This competition is way beyond my abilities. I am reminded of Gale’s final words to me: â€Å"Katniss – it is just hunting! You’re the best hunter I know. You know how to kill – swiftly and painlessly. † But I don’t want to kill children! It’s just too awful! Katniss runs to centre stage, resolute in her conviction again. But sometimes you have to do what you have to do to begin the long journey towards justice. I will do what I must to begin this war against the Hunger Games. Starting right now. How to cite Hungergames, Papers

Saturday, May 2, 2020

Information Security Outsourcing Information Security

Question: Discuss about the Report for Information Security of Outsourcing Information Security. Answer: Introduction Generally the information security is defined as the well informed sense of assurance that defines risk and controls associated with the information and data of users are in balance (Cezar et al. 2013). Though there are several advantages of information technology but there are several disadvantages of information security system (De Lange et al. 2016). Data-theft is one of the well known issues regarding the information security. This report elaborating a news story: Health Insurer Anthem Hit by hackers related to the information security breaches published in The Wall Street Journal. Justification of Choice Justification for choosing the topic: Health Insurer Anthem Hit by hackers The second- biggest health insurance company Anthem said that the hacker broke into the database containing the personal information about 80 million of its customers and employees. It was the largest data breach in the year of 2016 (Yadron 2016). The story helps to find the major elements that are important to understand the impact of information-security breaches (Dhillon et al. 2016). In addition to this, evaluation of this story presents the reasons and impact behind data theft. This aspect makes the perspective of user and organizational heads about preventive measures against the data theft issues (Disterer 2013). Therefore, this aspect helps to determine the resolving techniques of data thefts introduced in the technological world. In contrast with the information-security breaches this story explains one of the most important breaches in it. Relation of the topic with the information security breaches Information security breaches are recognized as the unauthorized access of data by any other person or system other than the authorized person (Gordon et al. 2014). According to this definition this story is also concerned with the unauthorized data accessing process. The concept of the data theft is completely related to the information security breaches. Anthem the health care giant of the world faced huge problems as about 80 million data was hacked due to the attack of the hackers (Huang et al. 2014). According to a spokesperson from Anthem, it was clarified that most of the data was related to the details of the consumer information stored in the database of them. No data were related to the financial information of their consumers such as: card details, account number or any other informative details related to the consumers financial data (Kolkowska and Dhillon 2013). Anthem accepted that they had faced these breaches due to lack of security system among their technical departments. In contrary with the context of the story presented in the Wall Street Journal it is clear that the hackers has stolen the data for either gaining profit by the user information or to spoil the fame of Anthem. Reasons for the breaches Technical perspectives According to Mr. Miller from Anthem, said that the technical departments recognized the incursion in the last week before the attack when the system administrator saw that database query was being run automatically as he was not accessing his identifier code (Yadron 2016). Investigators involved in this case tracked that the data was transferred to an outside web- storage service and they were able to freeze it there. There are mainly two perspectives that are important for analyzing the technical reasons behind the information security breaches (Lee et al. 2013). These are: lack of security and utilization of modern hacking techniques by the hackers. Lack of security for consumer data: According to Mr. Miller from Anthem they tracked the location of the hacker though they did not control their hacking system, as a result of which the hacker easily controlled their security system and steal around 80 million data from the database of Anthem (Yadron 2016). Modern hacking techniques utilized by the hackers: The hackers utilized one of the modern techniques that make thetrackers feel illusive that they have tracked the position of hacker but in reality it is not true (Parsons et al. 2014). The system followed by the hackers shows the variable positions of them to the trackers. Non- Technical perspectives There may several non- technical reasons for explaining the perspective behind this data theft (Peltier 2016). According to the information collected on this issue, it is found that the hacker may have the following intentions: a) to misuse the data in case of blackmailing the consumers of the Anthem, b) to hack the personal bank accounts used by the consumer through their account numbers or card details, or c) to make Anthem feel that they are losing their competitive market position (Potter and Waterfall 2012). These reasons are three main reasons for hacking. The hacker involved in the data theft in Anthem affected 40 million payment cards; this aspect introduced the financial reasons for the data theft (Renaud and Goucher 2014). Hackers are intentioned to steal the data related to the financial accounts that may open up the way for them to hack the personal bank account of the consumers of Anthem. Impacts Assess involved in the breaches and severity of the damages According to the story Anthem and consumers of the company faced the loss due to the loss of data (Siponen et al. 2014). The impact was positive on the hackers, they are the only actor in this story those have gained. These impacts are described as follows: Impact on Anthem: According to the story related to the information security Anthem faced many challenges. Trust with consumers is very critical matter of concern in healthcare industry (Thomas et al. 2013). Due to the loss of data related to consumers they have lost their trust on the company. This issue not only reduced their market value but also left a great impact on their future aspect. According to CEO of Anthem, Anthem has yet to demonstrate a path towards restoring this trust. Impact on consumers of Anthem: According to the information collected on data thefts in Anthem there were 80 million consumers who were suffering from critical identity theft. There was around several million account details stolen by the hackers (Vacca 2012). The organization provided one web support to their consumers for noting their problems they are facing due their identity theft. Impact on hackers: Among all impacts of this data theft only hackers have positive impact on themselves (Wang et al. ., 2013). The hacker got the chances to hack the financial information of the consumers of the Anthem. 40 million payment details were stolen due this data theft (Yadron 2016). Anthem is based in Indianapolis that has almost 37.5 million people within their range of service. This is the only matter in which the hackers got benefitted. The above discussed aspects elaborated the impact of the information theft on the consumers, Anthem and also on hackers. Social impact of the breaches Information theft is defined as illegally operated user data or theft of information. These have great impact on the social world as the users or consumers are facing critical identity theft. The consumers and user of stolen data faced so many problems (Williams et al. 2013). According to the research done on information theft it is found that attitude of the consumers are changed due this kind of theft which impacts upon the social image of those organizations that are being challenged by information theft (Zafar et al. 2012). The Centre of Democracy and technology listed ten privacy prevention policies that will be helpful for the consumers for preserving their social rights. In addition to this, health insurance industry faces trust issues due to the information theft. In contrary with the story it is clear that Anthem is facing many problems due to same issue. Remdies to the breaches Technical details of the resolving techniques of breaches According to the story about data theft in giant healthcare Anthem this was revealed that the company has arranged a special association for enquiring about hacker (Yadron 2016). This association established an advanced system that identified the position of the hacker and that was approximately China. In addition to this, Anthem also introduced one new web- server that was gathering information about queries of the consumers those faced identity crisis and other data- theft related problems. Conclusion Information security issue being addressed to the illegal operation of user data. This aspect has great impact not only on the consumers but also many organizations those are facing challenges for data theft. In contrary with this perspective this report has explained the impact and reasons behind the data theft with respect to one news story published in The Wall- Street Journal. In this story giant healthcare Anthem has faced the data theft issue within their organization and around 40 million consumer data are lost due to data theft. This report elaborated technical and non- technical reasons behind this data theft. In addition to this, remedies for data theft in Anthem are also provided in this report that described the severity of the data theft. References Cezar, A., Cavusoglu, H. and Raghunathan, S., 2013. Outsourcing information security: Contracting issues and security implications.Management Science,60(3), pp.638-657. De Lange, J., Von Solms, R. and Gerber, M., 2016, May. Information security management in local government. In2016 IST-Africa Week Conference(pp. 1-11). IEEE. Dhillon, G., Samonas, S. and Etudo, U., 2016, May. Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research. InIFIP International Information Security and Privacy Conference(pp. 49-61). Springer International Publishing. Disterer, G., 2013. Iso/iec 27000, 27001 and 27002 for information security management. Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2014. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(01), p.24. Huang, C.D., Behara, R.S. and Goo, J., 2014. Optimal information security investment in a Healthcare Information Exchange: An economic analysis.Decision Support Systems,61, pp.1-11. Kolkowska, E. and Dhillon, G., 2013. Organizational power and information security rule compliance.Computers Security,33, pp.3-11. Lee, C.H., Geng, X. and Raghunathan, S., 2013. Contracting information security in the presence of double moral hazard.Information Systems Research,24(2), pp.295-311. Parsons, K., McCormac, A., Butavicius, M., Pattinson, M. and Jerram, C., 2014. Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q).computers security,42, pp.165-176. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Potter, C. and Waterfall, G., 2012.Information security breaches survey. Technischer Bericht, infosecurity Europe und PricewaterhouseCoopers LLP, April 2012. https://www. pwc. co. uk/en_UK/uk/assets/pdf/olpapp/uk-information-security-breaches-survey-technical-report. pdf. Renaud, K. and Goucher, W., 2014, June. The curious incidence of security breaches by knowledgeable employees and the pivotal role a of security culture. InInternational Conference on Human Aspects of Information Security, Privacy, and Trust(pp. 361-372). Springer International Publishing. Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study.Information management,51(2), pp.217-224. Thomas, R.C., Antkiewicz, M., Florer, P., Widup, S. and Woodyard, M., 2013. How bad is it?a branching activity model to estimate the impact of information security breaches.A Branching Activity Model to Estimate the Impact of Information Security Breaches (March 11, 2013). Vacca, J.R., 2012.Computer and information security handbook. Newnes. Wang, T., Kannan, K.N. and Ulmer, J.R., 2013. The association between the disclosure and the realization of information security risk factors.Information Systems Research,24(2), pp.201-218. Williams, S.P., Hardy, C.A. and Holgate, J.A., 2013. Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective.Electronic Markets,23(4), pp.341-354. Yadron, A., 2016.Health Insurer Anthem Hit by Hackers. [online] WSJ. Available at: https://www.wsj.com/articles/health-insurer-anthem-hit-by-hackers-1423103720 [Accessed 25 Aug. 2016]. Zafar, H., Ko, M. and Osei-Bryson, K.M., 2012. Financial impact of information security breaches on breached firms and their non-breached competitors.Information Resources Management Journal (IRMJ),25(1), pp.21-37.