Sunday, December 29, 2019

Hobbes Laws of Nature Essay - 700 Words

Based upon the assigned segment of Thomas Hobbes’ The Leviathan, I find that it contrasts very strongly with my own perception of humanity and our motivations. I consider his conclusions to be both ignorant and uninformed (ironic, considering I’ve only ever read one segment of his works†¦) at least in regard to human nature. Hobbes takes the position that in a â€Å"state of nature† there are no laws and as such the concept of justice and injustice is null, because there is no law to violate or enforce. Which, in the most basic, factual and literary sense, is true. But in application, I don’t believe that the theory holds much merit. Hobbes’ basis for the state of nature is that in such a state, there is no authority, and without authority,†¦show more content†¦Ignoring the seemingly self-contradicting aspect of Hobbes’ theory, then by his own definition, if somebody where to invade for the sake of fighting, that would be unjust , as it would violate his natural laws. If not injustice, what would Hobbes claim a selfish and violent act such as rape or murder be? In our society, there exist plenty of people who do not recognize the right of government (theoretically placing them in a state of nature), but out of either principle or (a concept which I believe Hobbes neglects) sympathy, they do not rape or murder whomever they could gain something from. Without yet even considering the possibility of justice in the state of nature, Hobbes’ views already seem preposterous. With no applied government, if somebody were, hypothetically, to steal something from another person and an observer were to stop the thief and return the stolen item, then whether there are laws or not, that -- at least by my definition -- would be considered justice. Hobbes does however differentiate good and bad from just and unjust. Good being what men desire and bad being what men hate. These definitions being of childlike in their simplicity are in Hobbes’ eyes, applied on a person by person basis. Perhaps the question, in light of Hobbes’ views and the modern understanding of these words should then be rephrased: â€Å"Is there good or bad in a state of nature?† Which I think depends on the majorities feelings. Perhaps the definitions haveShow MoreRelatedLocke Vs. Hobbes : The Need For The Social Contract1238 Words   |  5 Pagesbeneficial to individuals in a group. The original social contract required that there was a strong leader who could protect all involved from harm, since the world was a dangerous and deadly place. This allowed the original social contract that Hobbe’s beliefs are based on, and at the time, it is possible that an autocratic society was necessary. We obviously did not have the capabili ty to govern ourselves yet. It wasn’t until around 3000 years ago that humanity got this chance, with the destructionRead MoreThomas Hobbes State of Nature in Leviathan Essay847 Words   |  4 Pagesdeemed paramount. Within the State of Nature that is, outside of civil society we have a right to all things ‘even to one another’s body’, and there would be no agreed authority to ensure the moral grounds of our decisions. Therefore since there are no restrictions and no shared authority; man is naturally un-guarded and prone to conflict and each individual is deemed a potential threat to our resources. From this concept Hobbes deduces that the state of nature is thus primarily a state of war,Read MoreComparing Thomas Hobbes and Augustine Essay878 Words   |  4 PagesAn Antedote For It nbsp;nbsp;nbsp;nbsp;nbsp;Augustine believes that the condition of war arises when the perfectly ordered and harmonious enjoyment of God is disrupted (The City of God, 690) whereas Hobbes believes that the original state of nature is a condition of constant war, which rational and self-motivated people want to end. nbsp;nbsp;nbsp;nbsp;nbsp;Augustine argues that peace is more than the absence of hostilities - it is a state of harmony that makes possible the full functioningRead MoreCompare and Contrast Hobbes’s and Locke’s Views of the State of Nature and the Fundamental Purpose of Political Society. Whose View Is the More Plausible? Why?1564 Words   |  7 Pagesviews of the state of nature and the fundamental purpose of political society. Whose view is the more plausible? Why? Introduction Thomas Hobbes and John Locke were both natural law theorists and social contracts theorists. While most natural law theorists have predominantly been of the opinion that humans are social animals by nature, Locke and Hobbes had a different perspective. Their points of view were remarkably different from those perpetuated by other natural law theorists. On theRead MoreHobbes And Locke s Political Legitimacy1530 Words   |  7 Pagespolitical legitimacy might look quite similar at first glance, because each theorized about the nature of mankind and the right political systems that would meet the needs of individuals. However, in Hobbes’ perspective, political authority does not pre-exist in individual’s state of nature, rather, it is created by the social contract and serves to ensure self-preservation which is threatened in a state of nature. In contrast, Locke thought that the social contract does not create authority, but that politicalRead MoreConflicting Moral Argum ents : Louis Vaughn s Philosophy, Moral Relativism And Moral Objectivism872 Words   |  4 Pageshow things should be† (2). In Philosophy, moral relativism and moral objectivism are two conflicting but somewhat overlapping school of thought. These beliefs govern the way an individual acts; they also decide the ethical guidelines from which the law is written. In this essay we will delineate the differences between the two sects of belief. Pojman asserts that many people self-report as moral subjectivists; he writes that humans fall victim to rashly praising relativism for its tolerance of otherRead MoreU.s. Foreign Policy Policies916 Words   |  4 Pagesin trading as we can see in the United Nations and the Trans Pacific Partnership that is currently being debated on. Political realism supports Hobbe’s view of the state of nature. Hobbes asserts that without a presiding government to legislate codes of conduct, no morality or justice can exist. â€Å"Where there is no common Power, there is no Law: where no Law, no Injustice if there be no Power erected, or not great enough for our security; every man will and may lawfully rely on his own strength andRead MoreThe Social Contract: Hobbes, Locke and Rousseau1377 Words   |  6 Pagespunishment to the performance of their covenants and observation of those laws of nature...† (Levithian, Pt. 2 Ch. 17 s. 1) Locke, similarly feels that, he purpose of law is not to restrict the freedom of man but rather to preserve man and grant him liberty. â€Å"†¦ the end of law is not to abolish or restrain, but to preserve and enlarge freedom: for in all the states of created beings capable of laws, where there is no law, there is no freedom: for liberty is, to be free from restraint and violenceRead MoreThe Fault Of Our Sovereign1638 Words   |  7 PagesThe Fault in our Sovereign In Hobbe’s, â€Å"Leviathan,† he gives a detailed account of what he believes is the best way to live, a big part of this is establishing something along the lines of a government. Hobbes believes that every one is a psychological egoist and takes this into account when forming his ideal form of government. Hobbes believes that having a sovereign is the best route one can take to live as an egoist. I believe that it is ultimately not the best route for an egoist, first becauseRead MoreRussian Mafia1601 Words   |  7 Pagescommit a crime, in this case, this would apply to whether members of the Russian Mafia are egocentric and advancing their own personal gains and interests in practicing the activities they do. Rational theorists say that its in our human behavior and nature to self-advance our own interests and causes. According to the rational choice theory, we could make the argument that members of the Russian Mafia are people, who are freethinking, independent r ational decision-makers. If we trace back to the beginning

Saturday, December 21, 2019

Satyam Scandal - 1623 Words

SATYAM SCANDAL I. Analyze the case and respond to the following questions: (a) Discuss the earnings management techniques employed by the management of Satyam. In this case of Satyam, I can conclude that the obvious technique employed by the said management are: 1. â€Å"Big Bet on The Future†. When an acquisition occurs, the company acquiring the other is said to have made a big bet on the future. As refer to this case, Ramalingam Raju the Chairman of Satyam Computer Services Ltd. believes the acquisition of Maytas Infra and Maytas Properties will benefit Satyam and boost its earnings in the future. The first instance is when he knows both Maytas companies are highly growth company in developmental infrastructure. So,†¦show more content†¦The manager of the company needs to understand the effects of the accounting reporting that they reported so they can make the best decision on behalf of the company. In addition, earnings management is a strategy used by the management of a company to appropriately manipulate the company’s earnings so that the figures match a pre-determined target. This practice is carried out for the purpose of income smoothing. Thus, rather than having years of good or bad earnings, companies will try to keep the figures relatively stable by adding and removing cash from reserve accounts. So, the financial statements of the company will be seen smoothly over the years with the smooth earnings or net profits. The reasons for many companies using earnings management within the company are whether to maintain steady earnings growth or to avoid reporting in losses. So, people use earnings management in different ways to cover their activities, whether the activities are acceptable or not acceptable. The earnings management is not be called as not acceptable activities if the activities not manipulate financial statements and report results that is not really incurred in reality. In other word, the earnings management will be not acceptable if it misrepresenting financial results. Some earnings management can be classified as acceptable and some can be classified as not acceptable. The instance of acceptable earnings management is advertisingShow MoreRelatedSatyam : India s Biggest Corporate Scandal1959 Words   |  8 PagesExecutive Summary Incorporated in 1987, Satyam Computer Services Limited (a foreign private issuer) was India’s fourth largest IT company that operated in 65 countries around the world, including 9 offices in the United States. It had American Depository Shares traded on the New York Stock Exchange during the fraud period (2003-2008) and changed its name to Sify Technologies Limited in October 2007. Now, Satyam has a new senior management team consisting of members formerly associated with Tech MahindraRead MoreSatyam : India s Growing Success Essay1041 Words   |  5 PagesSATYAM COMPUTER SCAM Satyam Computer Services Limited was formed in 1987 in Hyderabad (India) by Mr. Ramalinga Raju. The firm began with 20 employees and grew rapidly as a ‘global’ business. It offered IT and business process outsourcing (BPO) services spanning various sectors. Satyam was as an example of â€Å"India’s growing success.† Satyam won numerous awards for innovation, governance, and corporate accountability. From 2003-2008, the company grew measurably. Satyam generated Rs. 25,415.4 millionRead MoreEthics in Accounting1196 Words   |  5 PagesUniversity – New York Accounting for Decision Making, MBA 640 Fall 2011 Required Research Paper Page 1 of 11 Table of Contents Number Content Page Number 1 Introduction 3 2 Ethics in Accounting 4 3 Enron Scandal 6 4 Satyam Scandal 8 5 Conclusion 10 6 References 11 Page 2 of 11 Introduction †¢ What is â€Å"Ethics†? Ethics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, conceptsRead MoreEssay about External Auditors Must be Independent1154 Words   |  5 Pagesauditor, Arthur Andersen became one the most popular accounting scandal where it is still being talked about even after a decade has passed. Following this scandal, other massive organizations like WorldCom (2002), AIG (2004), and Satyam Computer Services (2009) shared the same fate. Since then, there have been questions being asked on the issue of the independence of auditors being one of the major contributors to these accounting scandals. Firstly, it’ll be good to know the definition of auditingRead MoreThe nature, incidence and ethical issues of creative accounting4406 Words   |  18 Pagesmanipulate the figures reported in the accounts of a business (Naser, 1993, p.59). Creative accounting, at root, is the origin of numerous accounting frauds. Many accounting scandal cases (like the scandals in Enron, WorldCom, and other firms) in the past few years had happened with the result of collapse. Most of these scandals were conducted by the senior management of organisations and many victims include the employees, shareholders as well as the society had been suffered from these fraudulentRead MoreFraud As White Collar Crimes1581 Words   |  7 Pageswhether to believe to business, corporate companies and even our neighbours. These days corporate scandals are increased in frequency and severity, we are even believe them and guess the effects of them, we can call corporate scam as white-collar crimes . The scams like Enron, WorldCom, Satyam and Augusta helicopter scams are few examples of biggest frauds in the last two decades. If we go in depth with Satyam computers scam that occurred in 2009, we will know what the fraud is, they manipulated theirRead More‘Satyam – the Enron of India’999 Words   |  4 PagesINTRODUCTION The case study ‘Satyam – the Enron of India’ looks at Satyam Computer Services Limited and its involvement in corporate fraud leading to one of India’s largest white-collar crimes. The Satyam scandal marks as one of India’s biggest corporate scandals where its stakeholders were continually fed misleading financial information from its late chairman Ramalinga Raju. This once promising, global IT company provided its services for some of the largest companies in Australia and the UnitedRead MoreTata Computer Services Ltd.1927 Words   |  8 Pagesemerging tech market, Rama Raju and Ramalinga Raju, incorporated a private limited company titled Satyam Computer Services Ltd., on June 24th 1987. Embarking off on a business venture, with just 20 employees, the Raju brothers begin selling software development and consultancy services to large corporations. Located in Hyderabad, India, which is the state capital of Telangana and a beehive for technology, Sat yam begin offering strategy consulting right through to implementing IT solutions, for industriesRead MoreComputer Services Scandal And The Media Scandal Essay1244 Words   |  5 PagesOne day while enjoying Sunday morning, I have been reading a newspaper mean while my focus goes on a major news about Mr.Ramalinga Raju sent to jail and fine imposed 7 Crore on him then I was curious to know about the famous Satyam scam also known as Computer Services  scandal, and   quot;India#39;s Enronquot;(Enron was a US based company which was inflicted with a similar accounting fraud)the news grab by attraction I was eagerly starts reading that news and I was completely shocked after readingRead MoreEthics in International Business842 Words   |  3 Pages2013) A more recent, and similar, scandal is the Satyam scandal of 2009. Satyam Computer Services revealed that it had engaged in fraudulent accounting practices. Satyam was an Indian company that provided outsourcing services to over a third of the Fortune 500 companies. They were engaged in business at the global level, their actions affected many companies and many people. The irony is that Satyam was viewed as a firm with excellent corporate governance. Satyam was given an award in 2008 by the

Friday, December 13, 2019

Concepts of Developmental Psychology Free Essays

General adaptation syndrome (GAS) and its stages (think of real-world examples) 8. Lazarus’ primary and secondary appraisal (think of real-world examples) 9. Problem-focused and emotion-focused coping (think of real-world examples) 1 1 . We will write a custom essay sample on Concepts of Developmental Psychology or any similar topic only for you Order Now Type A and Type B behavior pattern 12. Optimism 13. Sexually transmitted diseases CHAPTER 11 STUDY GUIDE (Define,’describe all terms) 1. Personality 2. Sigmund Freud and his emphasis on unconscious forces 3. Unconscious, preconscious, conscious 4. ‘d, ego, superego – what they are and what â€Å"principle† the operate with 5. Defense mechanisms – list and define 6. Psychosocial stages of development (see chart on page. 358) Know how to apply these! 7. Alfred Idler’s individual psychology . Inferiority complex 9. Conditions of worth 10. Characteristics of self-actualization individuals 11. Unconditional positive regard 12. Trait theories 13. Cardinal and central traits 14. Raymond Chattel’s source traits 15. Five-factor model 16. Extroversion and introversion 17. Reciprocal determinism 18. External and internal locus of control Please reproduce the pyramid and label the levels representing Mascots Hierarchy of Needs. The five questions that help determine whether behavior is abnormal 2. Definition of psychological disorder . Cognitive perspective 4. The category of disorders that is most prevalent in the U. S. 5. Panic disorder 6. Generalized anxiety disorder 7. Social phobia 8. Obsession 9. Compulsion 10. Major depressive disorder 11. Bipolar disorder 13. Risk factors for suicide 14. Psychosis 15. Schizophrenia 16. Delusion 17. Paranoid schizophrenia 18. Dissociation disorders (remember, this is NOT THE SAME THING as schizophrenia) 19. Dissociation identity disorder 20. Antisocial personality disorder (Define,’describe all terms) 1. Insight therapy 2. Psychodrama therapy 3. Techniques used in psychoanalysis 4. Carl Rogers, humanism, and person-centered therapy 5. Humanistic therapy 6. Person-centered therapy 7. Types of relationship therapies 8. Behavioral therapy 9. Time out 10. Factors that increase the effectiveness of time out 1 1 . Systematic desensitizing 12. Flooding 13. Exposure and response prevention 14. Aversion therapy 15. Participant modeling and Bandanna’s observational learning theory 16. How to cite Concepts of Developmental Psychology, Papers

Thursday, December 5, 2019

Flow Foundations Of Positive Psychology - Myassignmenthelp.Com

Questions: What Are The Limitations Of Cloud Computing? What Are The Negative Impacts Of Cloud Computing In A Business Organization? Is Cloud Computing Secure Enough For An Organisation? What Are The Possible Threats Of Using Cloud Computing In A Business Organization? Is The Advantages And Disadvantages Of Using Cloud Computing Industry Specific? What Approaches Of Using Cloud Computing Are Incompetent For Generating Profit? How The Services Of Cloud Computing Can Be Improved? Answers: Introduction The business research is conducted for analyzing the strengths and weaknesses of the cloud computing that is being used by the business organization in Australia. The cloud computing has revolutionized the way business functions and even managed business applications, computer software and servers to deliver computing resources through use of internet. The internet is enabled for managing the cloud computing and has created better scopes and opportunities for providing computer processing resources and servers to other computer systems based on the needs and requirements (Baskerville and Wood-Harper 2016). One of the major advantages brought up with the implementation of cloud computing system is the accessibility to various kinds of computer applications and programs with the help of internet. The other advantages include reduction of operational costs, on-site hosting of price for deploying the computer applications in the cloud and management of physical resources properly as well . Project Objective To identify the probable ways by which data and information can be stored and processed on a private cloud. To evaluate the impact created by using the cloud computing by the retail organizations in Australia. To assess the various ways or approaches that are required to undermine the cloud computing system and prevent issues related to data security and accessibility To recommend necessary measures for improving the effectiveness of cloud computing system implemented by the retail organizations in Australia Project Scope The scope of the project is enough to find out the various ways by which cloud computing can be done along with the benefits obtained from it. It can be seen that cloud computing provides better services for managing the fluctuating bandwidths and manage the remote servers properly. Cloud computing helps in managing disaster recovery as well as manages automatic software updates to keep the computer system secure and free from any kinds of viruses and malwares (Bryman and Bell 2015). The files that are stored on databases can be accessed from anywhere with the use of internet connection. In spite of the benefits, cloud computing has several drawbacks too like additional charges for managing bandwidths, not being able to access data in case on no internet connection, sharing and exchange of private data may not be possible when required and lack of ability to manipulate files and data locally (Bykztrk 2017). Cloud computing The cloud computing enables storage for data and information that can be maintained, managed and backed up even, thereby allow the users of services to store files online in a secured manner as well as gain accessibility to those from anywhere over the world by using internet. With the advancement in technology and communication, business management organizations need to sustain properly and for that it is important to manage storage of data, maintain good system architecture, enable autonomic computing system and ensure that all information are properly stored and accessed (Collis and Hussey 2013). The servers of networks are used that are hosted on the internet for handling data storage, accessibility and processing rather than using a local server or personal computer system. Advantages of cloud computing The major benefits of using the cloud computing are improving the technological infrastructures to expand flexibility and reduce the costs of expenses incurred while managing the cloud computing system. The cloud computing system is location independent, because of which, the users can access data from anywhere just by utilizing the internet facility. The businesses can follow a centralized approach that can reduce the cost of operations and overhead as well as increase the effectiveness of systems with ease and effectiveness (Csikszentmihalyi and Larson 2014). There are better scopes for managing disaster recovery and the security measures have improved as well. Cloud computing system enables self-service provisioning that allows the end users to compute the resources and manage workload according to the demands. The businesses can easily scale up with the increase in needs of computing whereas the scaling down happens when the demands are decreased (Marshall et al. 2013). The users could pay for the resources and workloads used by them, which further could result in avoiding the necessity to make investments. Disadvantages of cloud computing Few disadvantages of using the cloud computing are that lack of usability and convenience, poor bandwidth, etc. If data and information are transferred from the local storage device to the cloud storage, then it would be permanently moved and it could not be retained in the original folder where it was found earlier. The cloud storage devices have certain limit for bandwidth and in case the organization moves beyond the limitation of bandwidth, then additional charges will be required (McDonald et al. 2013). Thus, business organizations need to look at the bandwidth prior to considering the cloud storage. If there is no internet connection, there is no benefit of cloud computing and data cannot be accessed even. The security of data and information is hampered because sharing and exchange of information and data to other organizations can create complexities for business. All the services must be downloaded on all devices to manage the changes of data and information (Saunders, Lewis and Thornhill 2012). The cloud computing has offered extensive services like encryption and decryption along with better management of security of data and information effectively. This could prevent identity thefts as well as loss of important data and information with ease and efficiency. Literature gaps The gaps found in the literature are related to the articles and documents that are not authenticated and validated, due to which the research has taken some additional time for completion. The articles and documents consisting of relevant data and information must be assessed again to determine the negative outcomes that might be generated as well as accomplish the research in much more details (Schaufeli, Maslach and Marek 2017). Research Hypothesis H0: The cloud computing used within the Australian retail sector has created some major issues while accessing data and information H1: The use of cloud computing system has improved the efficiency of business processes by managing servers, accessing and storing data with better flexibility. Research Question Research questions are the backbone of the research on which it is carried out. It is impossible to carry out research in any discipline without formulating proper research question. The questions are identified through the literature review, where the gap is identified to find out the scope where additional research is needed. The research questions are broadly divided into two categories that are primary and secondary. The primary research question focuses on the detail that needs to be answered, whereas the secondary questions are formed to obtain the answers for the primary question. Both the primary and secondary research questions helps the researcher to direct the research in a particular direction. Research Design and Methodology In this part of the research proposal, the discussion is based on different methodsa and designs that will work as a vessel to carry out the entire research. According to Baskerville and Wood-Harper (2016), research methodology and design is the framework of any research, which is associated with a set of paradigm assumption, and this assumption will conduct the research. Henceforth, it is necessary to identify the methods that are essential for the success of the research (Baskerville and Wood-Harper 2016;Bryman and Bell 2015). The research methods are broadly divided into two categories that are qualitative and quantitative research method. Qualitative methods are used to collect the qualitative data. This type of data can not be quantified or put in number. The analysis are done by its quality not quantity. On the other hand, quantitative methods are used to collect the measurable numeric data. There are various methods used in data collection. Some of them are specific to one cat egory and some of them are used in both the methods (Bryman and Bell 2015). This particular research will incorporate some specific data collection method that will be fruitful and provide significant data. They are as follows. Qualitative Research and Quantitative Research Both of these can be used in both the researches. The process of selecting the target population on which the study will be conducted is called sampling. The process marks out of segments a small portion of a larger population. It identifies the part of the larger mass that is potential to provide accurate data on the research. It is done in the initial part of the research (Collis and Hussey 2013). On the other hand, sample size is the number of the number of a sample on which the research is likely to be conducted. (Marshall et al. 2013) Data Collection Method The data collection method can be further divided into two types Primary data collection method and secondary data collection method. If the data is collected from the primary sources such as from the organization CEO, employee who are directly related to the organization, it is primary data collection method. Whenever the data are collected for secondary sources such as literature, it is referred as secondary data dollection method (Saunders, Lewisand Thornhill 2012). Reliability and Validity Csikszentmihalyi and Larson (2014) points out that when a particular instrument is used multiple times on the same topic in order to get similar topic, it is called reliability. It is for verifying the authenticity of the data. Validity of the other hand is the mandatory requirement for all types of research (McDonald et al. 2013). Research Instrument Research instruments are the tools used for collecting data. Various research instruments will be utilize in this research such as questionnaire, interview, observation, and reading (Schaufeli, Maslach and Marek 2017). Quantitative Data Analysis Process These are the numeric data collected using a range of methods and instruments. The management of cleaning and coding has been done to present the data in a detailed manner based on proper analysis and interpretation. All these are important concepts of the quantitative data analysis (Bykztrk 2017). Interview and Questionnaire Design One of the most important method used in this particular research is the interview and questionnaire method. When the researcher directly interacts with the informant and indulges in a question answer process for obtaining information, it is called interview. Both open ended or closed ended questions are asked in this particular process for accessing particular information. Questionnaire on the other hand is also a type of interview where the subject is provided with a set of questions. S/he has to reply to the questions in yes and no format. These two methods are important in organizational research where primary authentic data is necessary (Willis 2015). Research Limitation Every research has a limitation and it cannot address everything related to the topic. Too much data can sometimes spoil the research. The researcher himself sets some limitations whereas; some are imposed by the external factors. Time is an important external factor that sets limit for the research. Only a limited amount of data is possible to collect and analyzed in a particular timeframe. On the other hand, limitation set by the researcher is important to focus on a particular aspect of the study. Objectives of the research plays crucial role in setting limits as the research focuses in meeting the particular objectives(Veld-Merkoulova and Viteva 2016). Time Schedule (Research Plan) The research will be carried out over 2 year relying on both primary and secondary data. The secondary data includes the articles, journals, reviewed articles etc. On the other hand, the primary data are the data collected through interview method and questioner design. In both the cases, both qualitative researches and quantitative research will be carried out for collecting the data. The time schedule specifies particular timing and order to carry out the research successfully (Collis and Hussey 2013). It can also be refer as research plan, which specifies the topic, background, objective, methods, data, and analysis of the data and the timing and order it needs to be conducted. Main activities/ stages Month Jan 2016 Month Jun 2016 Month Dec 2016 Month Jan 2017 Month Jun 2017 Month Dec 2017 Selection of topic Collecting data from secondary sources Constructing the research layout Literature review Development of research Plan Selection of Appropriate Research Techniques Primary data collection Analysis Interpretation of Data which are collected Conclusion Development of Draft Final Work submission Conclusion Various researches conducted on the cloud computing demonstrates potential advantages and approaches of using the service in a business settings. The impacts of incorporating cloud computing in a business organization have been identified. However, there are only limited researches that focus on the disadvantages and limitations of cloud computing in business organizations in different industries. It is important to identify the limitations, disadvantages and negative impacts of the services to improve the service and extract the maximum profit out of it. Moreover, the possible threats of using cloud computing and the vulnerability of the system are the important area of research to make necessary innovation in the service. The confidential data of the business organizations needs absolute protection from the external threat. Therefore, understanding the negatives will throw lights in the areas that require development. The proposed questions mentioned in the proposal are capable of addressing these problems. The methodology and design of the research discussed in the report are essential to carry out the research in a favorable structure. However, there are some limitations of the research due to the limited time and access. Hence, the research will be carried out in the given boundaries. Reference List Baskerville, R.L. and Wood-Harper, A.T., 2016. A critical perspective on action research as a method for information systems research. InEnacting Research Methods in Information Systems: Volume 2(pp. 169-190). Springer International Publishing. Bryman, A. and Bell, E. 2015, Business Research Methods, (Fourth Edition), UK, Oxford University Press. Bykztrk, ?., 2017. Sosyalbilimleriinverianalizi el kitab?.PegemAt?f?ndeksi, pp.1-213. Collis, J. and Hussey, R., 2013.Business research: A practical guide for undergraduate and postgraduate students. Palgrave macmillan.Saks, M. and Allsop, J. eds., 2012. Researching health: Qualitative, quantitative and mixed methods. Sage. Csikszentmihalyi, M. and Larson, R., 2014. Validity and reliability of the experience-sampling method. InFlow and the foundations of positive psychology (pp. 35-54). Springer Netherlands. Marshall, B., Cardon, P., Poddar, A. and Fontenot, R., 2013. Does sample size matter in qualitative research?: A review of qualitative interviews in IS research.Journal of Computer Information Systems,54(1), pp.11-22. McDonald, C.M., Henricson, E.K., Abresch, R.T., Florence, J., Eagle, M., Gappmaier, E., Glanzman, A.M., Spiegel, R., Barth, J., Elfring, G. and Reha, A., 2013. The 6?minute walk test and other clinical endpoints in duchenne muscular dystrophy: Reliability, concurrent validity, and minimal clinically important differences from a multicenter study.Muscle nerve,48(3), pp.357-368. Saunders, M., Lewis, P. and Thornhill, A. 2012. Research Methods for Business Students 6thedition, Pearson Education Limitedf. Schaufeli, W.B., Maslach, C. and Marek, T. eds., 2017.Professional burnout: Recent developments in theory and research. Taylor Francis. Veld-Merkoulova, Y. and Viteva, S., 2016. Conclusions, Limitations and Future Research. InCarbon Finance (pp. 129-131). Springer International Publishing. Willis, G.B., 2015.Analysis of the cognitive interview in questionnaire design. Oxford University Pres