Sunday, May 17, 2020

Administration of Roman Empire During Augustus Reign

Administration of the Empire Much chaos surrounded Rome with the fall of the Roman Republic. After seizing Egypt, Octavian returned to Rome and became the first emperor of the Roman Empire in 27 BCE. â€Å"His restructuring of the senatorial and equestrian orders, and the subsequent emulation between the two, provided the human resources, power dynamics, and incentives necessary for his administration†. It was easier for Augustus to carryout such major changes in administration because there was a universal desire for peace, stability, and material gain. Augustus developed a new administration for the empire in three different levels: those in Rome, Italy, and the provinces. Besides from being emperor, Augustus acquired multiple titles and†¦show more content†¦Monuments depicted visually what Augustan poetry worshiped in words, all providing all with a material imagery of imperial ideology. Augustus paid special attention to four areas of the capital: the Roman Forum, the Forum of Augustus, the Campus Martius, and the Palatine. He also accomplished many major road projects, in order to create easy access to and from Rome and center it in the middle of the Empire. â€Å"In 7 BCE, he divided the urban territory into fourteen districts (regions), each in the charge of a magistrate chosen by lot from the praetors, tribunes of plebs and aediles. These districts were themselves divided (in total) into 265 quarters (vici)†. All the divisions and the entire administration of the capital came under senatorial rank. Italy, in a similar manner, was divided into eleven regions. It was divided for several reasons, undoubtedly for fiscal purposes and voting at their place of origin. Italy consisted of a large population ranging from five to eight million people, and it shared a similar administration as Rome, simply on a larger scale. Italy transitioned easily, but a different approach was taken in regards to the provinces outside of Italy. â€Å"Indifferent to (rather than respectful of) indigenous traditions,Show MoreRelatedWas The First Emperor Of Rome So A Good Thing?1214 Words   |  5 PagesAccording to many historians Augustus was not only the first emperor of Rome but also the greatest. During his long and impressive career Augustus dissolved the faulty governmental system of the Republic and created a new basis of Roman government that stood for three centuries. On his death bed Augustus was purported to have said: â€Å"Did I play my part well?† Through examination of his reforms of the Roman tax and legal system, as well as his role in creating the Pax Romana and a stable military itRead More Augustus Caesar Essay1118 Words   |  5 PagesAugustus Caesar Works Cited Missing Augustus Caesar, the Romes first true Emperor was the historical figure who had the greatest impact upon the western world between the dawn of civilization and the end of the middle ages. Augustus Caesar (31B.C. - 14 A.D.) was originally named Gaius Octivian, the name Augustus was granted by the Roman Senate, which means magnificent. The success of Augustus was he developed an honest government, and during his reign, he rebuilt many structures to improveRead MoreAugustus s Life During The Civil War1741 Words   |  7 PagesAugustus had a discouraging childhood as he was unhealthy and did not have many connections with the government. Augustus was born on 23, September 63 BC. He was the son of a man from Velitrae who was in the position of praetorship and died unexpectedly when Augustus was 4. At this same time, Rome was dangerous because of extensive civil war. Augustus’ great uncle, Julius Caesar, was involved in this war. Augustus’ father was married to Atia, who was the daughter of Julia, Caesar’s sister. LaterRead MoreTiberius- Roman Empire1507 Words   |  7 Pagescontributions to the Roman Empire during his reign†¦ The Julio-Claudian dynasty refers to the first five  Roman Emperors:  Augustus, Tiberius,  Caligula  (also known as Gaius),  Claudius, and  Nero and the family to which they belonged. They ruled the  Roman Empire  from its fo rmation, in the second half of the 1st century 27 BC, until AD 68, when the last of the line,  Nero, committed suicide. The ancient historical writers,  Suetonius  and  Tacitus, write from the point of view of the Roman senatorial aristocracyRead MorePax Romana816 Words   |  4 Pages The Roman Oration was written and delivered by Aelius Aristides, a popular Greek orator who lived during the Roman Empire, glowingly praising the Pax Romana (which literally means Roman Peace). In this oration, Aristides used hyperbole and exaggeration to describe the Roman Empire whilst managing to capture the universalism and cosmopolitanism that characterized it. Pax Romana was not only the long period of relative peace and minimal expansion by military force experienced by the Roman EmpireRead MoreClassical Civilizations: The Reigns of Caesar and Augustus1138 Words   |  5 PagesClassical Civilizations Dear Friend, The expansion of Roman territory into Gaul and the Rhine River are signs that the republic is continuing to enlarge its borders. This occurred with Julius Cesar successfully invading and capturing these areas in 60 BC. To achieve these objectives he had won election to the Senate and secured the support of key allies. Moreover, Cesar controlled a total of four legions. This gave him the ability to move further North into Britannia and secure the other sideRead MoreEssay about The Roman Emperor Tiberius1974 Words   |  8 Pagesearly first century AD, the Roman Empire was subject to autocratic rule and the old Republic was long dead. Augustus had been ruling for forty years and most of that time he was loved and praised by the Senate and the people of Rome. Throughout his reign, Augustus had the one lingering problem of finding a successor to take over the role of Emperor. He had chosen 3 different heirs in his time of rule; however, they all passed before they had the chance to inh erit Augustus’ esteemed power. His fourthRead MoreArt and Literature in Augustan Rome1252 Words   |  6 Pagescauses Octavian and Antony to break out into war. He then takes his great-uncles name of Augustus and claims his leadership over Rome by defeating Mark Antony. Much art and literature was dedicated to the support of Augustus, which helped to bring together his empire. The Aeneid is an example of such propaganda in favor of Augustus, which people often find parallels between Aeneas and Augustus. In order for Augustus to maintain his newly gained power he uses such art and literature to influence his peopleRead MoreAugustan Art and Propaganda Essay1964 Words   |  8 PagesAugustan Art and Propaganda Julius Caesars reign was an unfavorable and chaotic period for Rome, and after his death, a large portion of the empire was handed down to his adopted son, Gaius Octavian. From the ashes of his father, Octavian was able to build an Empire unparalleled. Later, the name Augustus was given to him by Senate. Augustus ostensibly maintained the form of the Roman Republic while in actuality creating the Roman Empire. He introduced the administrative reforms that led to theRead MoreThe Rise And Decline Of The Roman Empire1809 Words   |  8 PagesEmperor of Rome, result in the Pax Romana? Augustus reigned from 27 BCE to 14 CE after his great-uncle, Julius Caesar, was murdered. The Pax Romana was a time of Roman peace after many civil wars which had occurred after Julius Caesar’s death due to the fact that Senates wanted to attain the power of the throne. But the Pax Romana lasted from 27 BCE to 180 CE with the death of emperor Marcus Aurelius. The place investigated will be the Roman Empire during this time and will be accomplish by using

Wednesday, May 6, 2020

Biology Transpiration Practical - 1603 Words

An experiment proving transpiration in leaves Aim To see how different environmental conditions affect transpiration of a leaf and which side of the leaf transpires the most. Background Information Plants put down roots into the soil to draw water and nutrients up into the stems and leaves. Some of this water is returned to the air by transpiration (when combined with evaporation, the total process is known as evapotranspiration). Transpiration rates vary widely depending on weather conditions, such as temperature, humidity, sunlight availability and intensity, precipitation, soil type and saturation, wind, land slope, and water use and diversion by people. During dry periods, transpiration can contribute to the loss of moisture in the†¦show more content†¦The water will not be able to evaporate. There are though some stomata on the upper side and there could be some water loss (evaporation). * Top Vaseline – There will be a significant amount of water loss. Most of the stomata are located on the underside of the leaf, and that hasn’t been covered. The upper surface does have some stomata, but not very much. * Whole Vaseline – This leaf will have t he least amount of water loss. Every single stoma on the leaf has been covered. The lipids in the Vaseline should stop the water from evaporating. Therefore, in order of 1-4 (1 – lost most water, 4 – lost least water), in terms of water lost – 1. Control 2. Top Vaseline 3. Bottom Vaseline 4. Whole Vaseline Apparatus * White tile * Figure [ 1 ] 4 leafs (similar size and type) * Vaseline * Weight scale * 2 stands * Thread * Labels * Tissue napkins Method 1. Gather your 4 leaves. 2. Take two stands and tie a thread (as shown in the Figure 1) 3. Take each leaf, put the Vaseline, then measure the mass and then hang it onto the thread. a. Leaf A – Control; No Vaseline used. Simply take mass and hang onto thread. b. Leaf B – Vaseline only on the top (and stem). Take mass over tissue on scale and then tie on the thread. c. Leaf C – Vaseline only on the bottom (and stem). Take mass overShow MoreRelatedThe Effect Of Salinity On Resistance, Proline, And Mineral Nutrients747 Words   |  3 Pageshydroponic culture. Plant Disease 82.10 (1998): 1165-1170. 13. Eliasson, Peter E., et al. The response of heterotrophic CO2 flux to soil warming. Global Change Biology 11.1 (2005): 167-181. 14. Bar-Tal, A., et al. Nitrogen nutrition of greenhouse pepper. II. Effects of nitrogen concentration and NO3: NH4 ratio on growth, transpiration, and nutrient uptake. HortScience 36.7 (2001): 1252-1259. 15. Davies, F. T., J. R. Potter, and R. G. Linuerman. Drought resistance of mycorrhizal pepper plantsRead MoreThe Process of Photosynthesis and Practicals3109 Words   |  12 Pages(Jackson, 2008). Chlorophyll b is similar but absorbs light in the 450-480nm and 650nm range whilst carotenoids absorb light in the blue light region (450-510nm) of the light spectrum (Campbell et al. 2009). Objective The objectives of this practical experiment were to: Separate leaf pigments and identify them by a paper chromatography technique; Isolate the leaf pigments as well as measure the light wavelengths absorbed by them; Examine the relationship between photosynthesis and leaf anatomy; Read MoreRevision Checklist for Igcse Biology6564 Words   |  27 PagesRevision Checklist for IGCSE Biology 0610 Guide for Students REVISION CHECKLIST for IGCSE Biology 0610 A guide for students How to use this guide The guide describes what you need to know about your IGSCE Biology examination. It can be used to help you to plan your revision programme for the theory examinations and will explain what the examiners are looking for in the answers you write. It can also be used to help you revise by using the tick boxes in Section 3, ‘What you need to know?’, toRead MoreA Research on Moringa Oleifera2858 Words   |  12 Pageswritten for  The Sunday Times,  The Observer,  The Guardianand  The Independent  and has contributed opinion columns on science for the  Times. Dr Marlene Rau was born in Germany and grew up in Spain. After obtaining a PhD in developmental biology at the European Molecular Biology Laboratory in Heidelberg, Germany, she studied journalism and went into science communication. Since 2008, she has been one of the editors of  Science in School. Review This is a thought-provoking article that uses theoretical scienceRead MoreA Research on Moringa Oleifera2858 Words   |  12 Pageswritten for  The Sunday Times,  The Observer,  The Guardianand  The Independent  and has contributed opinion columns on science for the  Times. Dr Marlene Rau was born in Germany and grew up in Spain. After obtaining a PhD in developmental biology at the European Molecular Biology Laboratory in Heidelberg, Germany, she studied journalism and went into science communication. Since 2008, she has been one of the editors of  Science in School. Review This is a thought-provoking article that uses theoretical scienceRead MoreInvestigatory Project3204 Words   |  13 Pagessoon* 151. Microbial antagonism   coming soon* 161. Reaction of planaria to pH, light and temperature conditions [Exp] 162. Reaction of paramecia to pH, light and temperature conditions [Exp] 171. Plant tropisms and growth hormones   [Exp*] 181. Transpiration rates for different plants and conditions  [Exp] 191. Sugar level in plant sap at different times and dates   [Exp] 211. A study of territoriality in mice  [Exp*] 221. A study of the cleaning habits of mice  [Exp*] 251. Learning and perception inRead MoreAn Introduction to Hydrophonics and Controlled Environment Agriculture40110 Words   |  161 PagesWater movement upward through the xylem due to â€Å"root pressure†. *DIFFUSION: Movement of molecules from high to low concentration. Ex: Movement of perfume molecules from an open bottle outward. Ex: Movement of water molecules out of the stomates (transpiration). *OSMOSIS: Movement of water molecules through a semi-permeable membrane from high to low concentration. Example: Plants maintain high salt levels in their root cells that make the relative concentration of water lower inside and therefore waterRead MoreUniversity of Nairobi Bsc. Civil Engineering Degree Programme Details6511 Words   |  27 Pagesand safety precautions. Civil Engineering Technology Woodwork, blockwork, concreting and plumbing. Mechanical Engineering Technology Machine tools, metalwork, fasteners, welding. Electrical Engineering Technology Wiring, soldering. Le ctures and practical work. SECOND YEAR OF STUDY - SEMESTER I FCE 201 - Theory of Structures IA (45 hrs) Statics: Introduction to statics. Plane statics. Structural forms and introduction of statically determinant structures. Axial force structures tension (cable) structuresRead MoreSexually Transmitted Diseases35655 Words   |  143 Pagesenclosure: the heat produced, if not properly removed, can cause fusing (melting) of the tracks. Thermal and electrical conductivity often go together. For instance, most metals are both electrical and thermal conductors. However, some materials are practical electrical conductors without being good thermal conductors. Insulator An insulator, also called a dielectric, is a material that resists the flow of electric current. An insulating material has atoms with tightly bonded valence electrons. TheseRead MoreBiology Ecology Project22611 Words   |  91 Pagesand their abundance, leading to three questions ecologists often ask about organisms : Where do they live? Why do they live where they do? And how many are there? Because of it’s great scope, ecology is an enormously complex and exciting area of biology, as well as one of critical importance. Ecology reveals the richness of the biosphere—the entire portion of Earth inhabited by life—and can provide the basic understanding that will help us conserve and sustain that richness, now threatened more than

Cyber Crime Risks & Responsibilities-Free-Samples for Students

Question: Disucss about the Cyber Crime Risks and Responsibilities for Businesses. Answer: World has become more technological, there are so many changes done in the business due to developments in technology. Internet has become more advanced in todays world. However, the emerging technologies of internet have been challenged by pornographic. It enhances the chance of developing international terrorism. Internet is being used by many criminals to share the information in all over the world. In the context of negative aspect of internet, various kind of terrorist such as nationalist, revolutionaries, fascist, separatists and anarchists are able to share the propaganda to their supporter by using internet to overall execute their information. Apart from that there can be other issues arise such as data lose, security corrupt and cyber crime (Tonge, Kasture and Chaudhari, 2013). Franke and Brynielsson, (2014) argued that cyber security is the cover of technologies, practices and process which is designed to prevent networks, programs, computer and relevant data from unnecessary attack and unauthorized access. BHP Billiton is the Australian company which mainly deals in the mining, metals and petroleum dual listed public. The Headquarter of this company is located in Melbourne, Australia. It is the trading entity. It was the fourth largest company by revenues measured by market values of 2015. The business of BHP Billiton is higher, so it is required to keep the data securely (Franke and Brynielsson, 2014). All shapes of organization are living in online environment and use the device of mobile for automation to improve the interaction with customers. There are billions of customers who use online services with business and organization have obligation to prevent relevant information that could personally recognize their customers. Unfortunately, the setup of the internet is extremely familiar with cyber criminal (Yan, Zhang and Vasilakos, 2014). It is considered as decentralized and therefore lack of controlling on subject, it cannot be censored, allow anyone to use it. BHP Billiton is concern about its data and that is why it is set to house which has major capability of cyber security in Melbourne. It is the part of its plan to enhance the size of its stable workforce of IT globally. There are transactional data which might involve system identifiers such as machine identifiers and internet protocol. Business should be more active to take action against the hacked data (Jacobs, 2016). However, it is seen many times that the best interest of organization and customers for a loss or breach to be informed, it must be known in the point of necessity that there is no law in Australia regarding this process. To being as giant mining organization, BHP Billiton recruit nine security architecture and the professional of cyber security to revealed the major IT expansion. It is done by company to protect the data of company secured. It has branches in Singapore and Houston and it is also placing same quality of resources there. As per the article of Crozier, (2017), company stated that there is technology and cyber unit separately in BHP Billiton, and at least six Australians sit, inside the companys wider security governance, risk and compliance group. In BHP Billiton, groups are categorized that is having the specialization in security. It is the plan of company to employ cyber incident response that should be specialized in proactively detect and immediate respond to incidents, able to conduct post-mortems and bring changes in technology of operation. It is the initiate of BHP Billiton to protect from cyber crimes, this role which is the part of it plan will be liable for defending against the incidents of technology incidents along with that they should be capable to recognize, analyze, communicate and contain these incidents in the time of occurrence (Crozier, 2017). Comparative analysis It has been analyzed with the support of article A Comparative Analysis Of Cyber security Initiatives Worldwide, that many policy makers have been showing their concerns regarding the insecure information and wanted to share at highest level that it would be threaten for economic growth and national security. As consequences of these concerns, the emerged has been developed of web of regional, national and multilateral initiatives. It has been evaluated that recent publications offers a collection and evaluation of the efforts of cyber security in 14 countries. The overview of issues has been provided by the international CIIP Handbook, in the ground of information infrastructure information. There are five focal points which have higher importance that has been emerged in the cross comparison company surveys. That is critical sectors, organizational overview, early warning approaches, current topics in laws and legislation and research and development (Rahman and Choo, 2015). In the context of critical sectors, there are two interrelated but differ concept of perceptions of critically. That is critically as systematic approach and critically as a symbolic approach. However the organizations of Australia are found under critical sectors and sub sectors. In the comparison of two concepts, the most observing similarity is the focus on essential goods or services (Xie Ou, 2010). It defines that the actual object of protection is not the part of static infrastructure as that much, but focus on services, in the flow of physical and electronic. This is far level of abstract of understanding essential assets. In the term of organizational overview, several organizations in Australia are responsible for CIP. For instance, Australias infrastructure such as virtual and physical structures, terrorism is found there. Cyber security has been observed as a component of the effort of counter-terrorism of overall country. Therefore, defense signals directorate, Australia n Federal Police and the Australian Security Intelligence Organization are the part of Critical Infrastructure Protection Group members. In the order of early warning approaches, the Australian company BHP Billiton has cross-border Co-operation (Pepper, McIntosh, Fitzsimmons, Gebhardt and Dillenbeck, 2015). This co-operation is made internationally and it is more sensible when one observes the inherently cross-boundary nature of threats CERT has been developed which have been set up mainly at national and international level, and these kinds of organizations get incident response of any cyber crime. There are legal issues because national laws are developed autonomously. In the company of BHP Billiton, there should be data protection and security in electronic communications, protection of personal data, international harmonization of cybercrime law and identifications and digital signature (Lebek, Uffen, Neumann, Hohler and Breitner, 2014). It has been evaluated in the comparison of Australia, USA and EU had well efficient team of research and development in the field of cyber security. The US has a crucial role in recognizing and promoting essential research topics. The EU plays a leading role in helping cross-rational RD in the field of cyber security of Europe. There is no objection that RD will face the challenge of cyber security in the future. Figure 1: uses of security technology Source: (Goo, Yim and Kim, 2014). It has been found from the report of computer society that most of the cyber security breached by authorized users of organization. Moreover, an overwhelming it has been observed that 72% organizations are reported that there is no policy insurance which help them to manage the risk of cyber security (More Kumar, 2014). There are many kinds of cyber attacks. Cyber security attacks refers to utilize the various deliberate actions whether it is over extended period of time for the purpose of altering, disrupting, deceiving, degrading or spoiling computer system which has adverse situations or information or networks (Soomro, Shah and Ahmed, 2016). These effects on adversary system have indirect influence on organization to reliant on them. A cyber attacks can turn system and organization into untrustworthy or unavailable. Figure 2: Types of Cyber Attack Source :( More Kumar, 2014) These all are types of cyber attack. It is required to BHP Billiton to protect their data from these types of cyber attack and take initiative action to against it. It has been analyzed that BHP Billiton has forensics and investigations specialist which will be brought onto mitigate vulnerability and conduct information and investigations of cyber security, it will be developed for the purpose of protecting the assets of BHP Billiton across entire locations. Testing and assurance manager has been recruited by the company for code reviews who is accountable for patch analysis. They will be liable to maintain the relationship with enforcement of law and federal intelligence agencies such as ASIO, Interpol and NSA (Bana and Hertzberg, 2015). It would be the part of its plan to employ a CIRT (Critical incident response team) which will be leaded by Melbourne globally along with those resources in other components of the world. The CIRT will be able to investigate all errors, alerts, malware and intrusions along with that recognize who was liable, revise remaining security system. It will move forward recommendations and necessary improvements to protect the cyber attack from occurring in the future (Lumbreras and Ramos, 2016). BHP Billiton is reinforcing its organization security architecture resources in outside the domain of specific security domain. The organization security architecture team of BHP Billiton will be leading globally based out of Melbourne. This team will provide the overall direction along with leadership for entire security architecture of technology and design activities inside the organization of BHP. Moreover, BHP expects to recruit principal security architects in number of locations for the purpose of designing, implementing, documenting and supporting of architecture of security and the commodities of infrastructure. Figure 3: Security Method Used Source: (More Kumar, 2014) Collective security of society is dependent on every user being for aware security and exhibiting discipline about the personal information and calculating resources. It has been evaluated by security experts that the user is considered as the weakest link in the security chain and the measurements of technical cannot be able to resolve the issues of cyber crime lonely. Cyber crime and breaches can be reduced by conducting adequate audit trail of the activity which should be the component of application. It can be reduced if company has skilled responder who should be able to assist the team of application in forensics and root-cause analysis. BHP Billiton has a cyber security team which is recognized by globally. It is highly technical and innovative. To prevent the cyber attack the security system of BHP Billiton is included in to its core functions. The core functions of this organization are scheduling work based which should be basis on business priorities and perform administrative task for the head of Global Cyber Security. To prevent the data, meeting should be managed while building the agenda for each year with all information from fellow members of team. WebEx capability should be there in the time of critical team meetings. Coordination is in the organization which is helpful to assist the sub functions of wide goals, policies and objectives. It has the team of tracking the objectives and actions of leaders to ensure the time frames that are able to meet the cyber security function initiatives in partnership with higher level of authority. It has been included that a cyber crime has increased day by day, there is need to protect data of an individual as well as company. In this literature review BHP Billiton Company has been take which is leading its business in the field of mining, petroleum and metals. It is the fourth largest company in all over Australia. Throughout the literature review it has been found that there is requirement to conduct the research to analyze a comprehensive approach for the aim to protect sensitive data. It will be worth to take appropriate action. The security system of BHP Billiton is secured and company is trying to develop approachable substance to protect its data appropriately and in its mission, it has become successful almost because it is the company which has efficient cyber security team. There are so many kind of cyber attacks which has been elaborated in this literature review, it has been recommended that company should be aware about that kind of attacks time to time and take initiative action to develop software which should be able to recognize attack and inform immediately. References Rahman, N.H. and Choo, K.K.R., 2015, A survey of information security incident handling in the cloud. Computers Security, 49, pp.45-69. Bana, A. and Hertzberg, D., 2015, Data Security and the Legal Profession: Risks, Unique Challenges and Practical Considerations. Bus. L. Int'l, 16, p.247. Choucri, N., Madnick, S. and Ferwerda, J., 2014, Institutions for cyber security: International responses and global imperatives, Information Technology for Development, 20(2), pp.96-121. Crozier, R, 2017, BHP Billiton to create big Aussie infosec unit, retrived on 19th August 2017 from: https://www.itnews.com.au/news/bhp-billiton-to-create-big-aussie-infosec-unit-450875. Franke, U. and Brynielsson, J., 2014, Cyber situational awarenessa systematic review of the literature, Computers Security, 46, pp.18-31. Goo, J., Yim, M.S. and Kim, D.J., 2014, A path to successful management of employee security compliance: An empirical study of information security climate, IEEE Transactions on Professional Communication, 57(4), pp.286-308. Jacobs, T., 2016, Industrial-sized Cyber Attacks Threaten the Upstream Sector,Journal of Petroleum Technology,68(03), pp.42-50. Lebek, B., Uffen, J., Neumann, M., Hohler, B. and H. Breitner, M., 2014, Information security awareness and behavior: a theory-based literature review, Management Research Review, 37(12), pp.1049-1092. Lumbreras, S. and Ramos, A., 2016, The new challenges to transmission expansion planning, Survey of recent practice and literature review. Electric Power Systems Research, 134, pp.19-29. More,R, M Kumar, A, 2014, A Study of Current Scenario of Cyber Security Practices and Measures: Literature Review, International Journal of Engineering Research and General Science Volume 2, Issue 5, August-September, 2014 ISSN 2091-2730. Xie, P. J. Li, X. Ou, 2010, Using Bayesian Networks for Cyber Security Analysis, Proc.40th IEEE/IFIP Intl Conf. Dependable Systems and Networks. Pepper, A., McIntosh, P., Fitzsimmons, R., Gebhardt, T. and Dillenbeck, E., 2015, The Unconventional Global Endowment: Results of BHP Billiton's Global Assessment. In International Conference and Exhibition, Melbourne, Australia 13-16 September 2015 (pp. 283-283). Society of Exploration Geophysicists and American Association of Petroleum Geologists. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016, Information security management needs more holistic approach: A literature review, International Journal of Information Management, 36(2), pp.215-225. Tonge, A.M., Kasture, S.S. and Chaudhari, S.R., 2013, Cyber security: challenges for society-literature review, IOSR Journal of Computer Engineering, 2(12), pp.67-75. Yan, Z., Zhang, P. and Vasilakos, A.V., 2014, A survey on trust management for Internet of Things, Journal of network and computer applications, 42, pp.120-134.