Tuesday, December 24, 2019

A Unique Leadership Style And Transformational Leadership

Leadership is the process of motivating others toward completion of a common goal and/or task. Luthans Avolio (2003) also introduced the concept of authentic leadership development, which is one of the many psychological perspectives of leadership. Authentic leadership is often defined as a pattern of transparent and ethical leadership behaviors’ that encourage openness in sharing information needed to make decisions while accepting followers’ input (Bass, 1999). I truly believe deep in my heart that I have a unique leadership style; I believe that I am a combination of an authentic and transformational leader. Transformational leaders are prone to instigate followers to amend expectations, perceptions with the ability to motivate workers toward a common goal. According to Burns, â€Å"leaders followers make each other to advance to a higher level of moral and motivation† (Burns, 1978). A leader that is able to move others forward in a positive manor is often considered a leader that uses positive organizational behavior which is the process of leading which focuses on positive constructs such as hope, resiliency, efficacy, optimism, happiness, and well-being as they apply to organizational commitment of employees. According to Berkovich, â€Å"A key element in all existing definitions, however, is that authenticity involves becoming aware of one’s â€Å"true† self† (2014). A leader must first understand his or her own needs prior to subjecting others to ones views or opinions. AShow MoreRelatedThe Importance Of Transactional And Transformational Leadership1243 Words   |  5 PagesDifferentiating Transactional and Transformational Leadership There have been identified leaders in the world as far back as history has recorded. In addition, there have been negative and positive leaders, as this is the human condition. Leadership models and theories have been the subject of research for over 100 years. The contributions of leadership theories may have altered the delivery of leadership throughout modern age for positive leaders, because he or she saw the ‘new and different’Read MoreTransformational Leadership And Transformational Leaders968 Words   |  4 Pages Transformational Leadership Style Tanya Schankel ORG300 – Applying Leadership Principles Colorado State University – Global Campus Dr. Anne O Bryan June 21, 2015 â€Æ' Transformational Leadership Style Are you ready for a change? Transformational leaders pave the way for implementing change. Transformational leaders are visionaries who do not look at today without envisioning a better tomorrow. Smith (2011), states that this leadership style focuses on not only the leader, but also the contributionRead MoreSteve Jobs as a Visionary and Transformational Leader1165 Words   |  5 PagesJobs unique approach to leadership and visionary approach to creating, producing and selling innovative products, combined with his innate ability to orchestrate increasingly complex companies have earned him many accolades. Fortune Magazine named him the best leader of the Decade and countless other publications, colleges and universities have given him many accolades and honorary degrees. All these external measures of success reflect who Steve Jobs is on a daily basis, and how his unique and highlyRead MoreThe Role of Leadership In Health Care Leadership is often described as the behavior of an1000 Words   |  4 PagesThe Role of Leadership In Health Care Leadership is often described as the behavior of an individual when directing the activities of a group of people with a shared goal (Al-Sawai, 2013). It can be difficult to examine leadership in the context of health care, because research and theories of leadership were created in a business environment. These leadership styles are then applied in a health care framework, which has its own unique complexities (Al-Sawai, 2013). The complexity of the healthRead MoreBusiness Strategy And Leadership Style : Impact On Organizational Performance1243 Words   |  5 PagesLynn Roth Worcester State University BA490 Business Policy and Strategy M 6-9 Prof. Anthony Aiello December 1, 2016 Business Strategy and Leadership Style: Impact on Organizational Performance in the Manufacturing Sector Lynn Roth Worcester State University The quality of leadership and strategy is generally viewed as instrumental in maintaining and improving upon competitive performance. This is a topic that has started to gain some attention, especially in this era of increasingRead MoreImportance Organizational Leadership Has on Companies Today1657 Words   |  7 Pagesreading an article about organizational leadership, I was more enlightened on the value and importance organizational leadership has on companies today. The article discussed the significance of organizational leadership and how leaders can motivate their followers to accomplish corporate objectives and help them realize their full potential. More importantly understanding the organizational leadership theories can support the growth and development of leadership skills and identify potential leadersRead MoreThe Transformational Leadership Model Of A Business Environment1426 Words   |  6 PagesThere are several different theories that can be applied to leadershi p. Hence, there are no right or wrong theories, purely just diverse perceptions. The trait theory of leadership believes that leaders are born and not made. This theory claims that leadership is inherited, and great leaders are born with natural leadership traits. Zaccaro, S. J. (2007) defines this as a â€Å"unique property of extraordinary individuals whose decisions are capable of sometimes radically changing the streams of history†[Pg6]Read MoreLeadership Essay1476 Words   |  6 PagesLeadership is one of the main areas of study nowadays. A number of books, articles, and research papers are written on this discipline and we receive much information about this. Leadership is a relationship between leaders and followers, and building this relationship requires an appreciation for the personal values of those who would be willing to give their ener ¬gy and talents to accomplish shared objectives. Transformational leadership and leader-member exchange are popular theories in the leadershipRead MoreLeadership Styles : Transformational Leadership1112 Words   |  5 PagesLeadership Style Leadership is a process by which a person influences the thoughts, attitudes, and behaviors of others (Agard, 2011, p. 330). Leadership models can enable or hinder an organizations success. Additionally, leadership styles impact how effectively organizations reach their goals. When leaders understand their dominate leadership style, they can identify their strengths and weaknesses and gain insights on their abilities, values, and beliefs. In addition, understanding a leadersRead MoreLeadership Styles And Leadership Qualities1662 Words   |  7 Pagesshared traits between management and leadership, they both provide direction and the ability to influence the people around them. They need to create an atmosphere where people are motivated to meet the goal, no matter if it is planned or unplanned. With that being said, Yoder-wise differentiated leaders and managers when she stated, â€Å"Managers address complexity and change, whereas leaders primarily address change† (2014). The leadership style or a leadership I emulate; qualities I possess that make

Monday, December 16, 2019

Research Paper on the Effects of Mass Media on the Perfect Body Image Free Essays

How can you determine what body image should be? The desire for the perfect body has been prevalent throughout society for a vast majority of time. What makes teenage girls feel the need to strive for this â€Å"perfect body†? Some have asked, â€Å"†¦a rapidly growing body of research addresses the question of whether body perfect ideals in the mass media are a core risk factor for negative body image, particularly in women† (Dittmar, Helga) My hypothesis is â€Å"Does the media influence adolescent girl’s weight concerns and their perceptions of body weight and shape? The media in many aspects controls the way that people see themselves and the way they do things. So with teenagers striving to look like what they see in the media some of them go through drastic means to achieve these looks. We will write a custom essay sample on Research Paper on the Effects of Mass Media on the Perfect Body Image or any similar topic only for you Order Now â€Å"The role of mass media influences and parental marital status in the onset of eating disorders. In particular, teenagers tend to be the main target of trying to look like this image. † (Irala-Estevez, Martinez-Gonzalez, Lahortiga, Alonso, Cervera, Gual) Eating disorders is a major medical problem that most teens face. Among girls, eating disorders symptoms were directly affected by sociocultural influences, in particular media influences†(Rodgers, Paxton, Chabrol). If the media keeps influencing how teenagers see themselves it can not only damage their life but their families. The Health Information Network as done research on diets has shown â€Å"Anorexia is the Number one killer of teenage girls and in total more than 90% of those with eating disorders are adolescent young women.In many girls, the problems appear to set in from a very early age and is caused by peer pressure and exposure to media advertising† Does media have a major influence in the way teens look at themselves? â€Å"Media causes body dissatisfactions since they are the ones who define this perfect body. † ( Furnham, Greaves) I will test whether different outlets of media from T. V advertisements and shows, magazines, and street ads have a strong influence on how teenage girls look at themselves.Also to what measures will they go to, to achieve the perfect body that they see in the media. In this ever changing society the perfect body has had many different definitions. â€Å"This ideal standard of beauty is conveyed to individuals via a number of sources including fami ly, peers and the mass media. † (Hargreaves) There has been other research down to measure the influence media has on the perception of the perfect body image. A study was done by psychologists with individuals from Fiji where there was little edia influence. Their results showed that, â€Å"Key indicators of disordered eating were significantly more prevalent following exposure. Narrative data revealed subjects’ interest in weight loss as a means of modeling themselves after television characters. † (Becker) After being exposed to American TV shows there was a huge change in body image. Not only with T. V shows but as well as magazines have a great influence on body perception. One researcher as shown the relationship between magazines and body image, from the Department of Medicine from Harvard Medical School they concluded â€Å"There was a positive linear association between the frequency of reading women’s magazines and the prevalence of having dieted to lose weight because of a magazine article, initiating an exercise program because of a magazine article, wanting to lose weight because of pictures in magazines, and feeling that pictures in magazines influence their idea of the perfect body shape. With my research, this type of study would hard to replicate because it’s impractical to find a somewhere in the United States that has no or little media influence. The ideal woman and man portrayed in the media practically do not exist.It sets up images that fool viewers and readers to think that there are actually people that look like models. â€Å"The average American woman weighs 140 pounds and is 5’4† tall, reports Eating D isorders and Prevention, Inc. In contrast, the typical model is 5’11† and weighs 117 pounds. That makes the model thinner than 98 percent of American women. (Strahan) This makes young people have enormous pressures and when they can’t measure up to this image prevailed by the media, their self-esteem suffers. So in my research I will test girls from the ages of 13-19 from high school and college. I will give them surveys that will ask how much media they are exposed to. With questions that see if they are watching TV shows like 90210, or Melrose Place and magazines such as Seventeen, and Cosmopolitan. Then the girls can then be split into two groups; Group 1 with the girls that are exposed to little forms of media, and Group 2 with girls that are exposed to many forms of media.They then will be given another survey that will ask how much they weigh, how they see themselves, and what type of body image they desire. Body-image is being measured by the â€Å"conceptualized as a multidimensional construct that represents how individuals think, feel, and behave with regard to their own physical attributes† (Morrison , Kalin) If Group1, the group with little exposure to media, has a normal body perception and doesn’t desire a skinnier body image in contrast to Group 2. Where Group 2, the group an immense exposure to media, has poor body perceptions and desires a skinner body.The conclusion then can be made that the amount of media exposure has an influence on body image and perception. There are many challenges that can come up during research on the â€Å"perfect body† image. Some teenage girls might show a change in how they view themselves during the course of the experiment. But it may not be because of media influence but maybe their peers influenced them or their culture demands for a certain body image. â€Å"Both peers and popular culture, independent of each other, exert influence on girls’ weight control beliefs and behaviors. (Field, Camargo, Taylor, Berkey, Colditz) If we come to the conclusion that media indeed has a great influence on body perception; how are we going to try to fix the damage media causes on many individuals? Why not media? â€Å"Social activism and social marketing approaches are suggested as methods for fighting negative media messages. The media itself is one potential vehicle for communicating productive, accurate, and deglamorized messages about eating and shape-related disorders. † (Thompson, Heinberg) If media has such a great influence on creating negative body image, we can use media to create a positive body image.With media showing normal body image it might help teenage girls feel less pressured to desire an unhealthy body image. Therefore, over time it will become clearer as to whether actions will be taken against the media in order to end teenagers from trying to achieve the perfect body. Teenagers need to see that being different is good and the media is only brainwashing them to be like everyone else. Hopefully with more research done to show the great effects media has on teen’s body perception and the measures they go to, to obtain that perfect body image.Media will stop putting out such a negative body image, and more of a natural, average body image. How to cite Research Paper on the Effects of Mass Media on the Perfect Body Image, Essays

Sunday, December 8, 2019

Neglected Dimension of Global Security †Free Samples to Students

Question: Discuss about the Neglected Dimension of Global Security. Answer: Introduction The recent age, technologies have mainly disrupted or transformed both the commerce as well as the environment. Few example that can be taken into consideration are the world wide web, amazon, tablets and google. The most important phenomenon which played a very vital role is the technology of the cloud computing. Likewise taking into consideration a view of a different field, in the laboratory automation, medicine, computers, monoclonal antibodies, immunoassay can be considered as example of technology which are considered disruptive technology. Currently, there are many potentially and emerging technology which can be termed disruptive that could possess threat of direct displacing a technology which is established. The technology can lead to a major change in the field of economy as well as commerce. The concept of the technology can be sub divided into two parts namely sustaining and disruptive [1]. The sustainable technology mainly relies on the incremental improvements taking i nto consideration an already established technology. On the other hand, the disruptive technology lacks the part of the refinement, they are often encountered with the problem of performance due to the factor that it is new, direct appealing to an audience which are limited and may not have been proven problematic in the field of application. Taking into consideration a case study it can be stated that the concept of Alexander Graham Bells electric speed machine which is now better known as call the telephone can be considered as one of the best example. Another term which can be directly be related with the concept is the term digital disruption. It can be referred to as a flip side of the digital opportunity [2]. In this essay the main concept which is taken into consideration is the concept of the disruptive and the emerging technologies. On the other hand, relating to the concept the use of disruptive weapons in the aspect of changing the use of the force are also taken into consideration in the discussion. This section mainly focuses on the analysis of the emerging and disruptive technology which are very much likely to play a role in the near future. These technological aspects may include: Additive manufacturing: This technology is under the focus of the researchers and under the research sector for more than 30 years, initially with the point of view of tool related to rapid technology [3]. Development in the sector of additive manufacturing are very much likely to create a new field of application that will have a significant impact on the methods which are related to the traditional manufacturing. Advanced Robotics: An example of primary successful application of the industrial robotics is in the field of automotive manufacturing. The concept intensively uses the concept of the robots that are extensively implemented in the process of welding, painting process and material handling [4]. The new and the advanced robotics will be increasingly in the implementation in the precision of the concept of the assembly and manufacturing and even in the sector of human robotics environment which can be beyond the scope of manufacturing [5]. Digital manufacturing: Recent advances in the concept of the digital design, simulation and engineering have involved in a transformational impact on the enterprise which are related to the manufacturing. The experimental approach and the traditional experiential approach in order to develop the product, validation and the manufacturing process design, supply network development and the factory automation are being replaced by the concept of highly digital threats which are efficient [6]. This approach can be considered to be very much efficient. In order to conduct the analysis, the nature of the disruptive technology should be taken into consideration. The concept of the nature which is related to the disruptive technology can be divided into three parts namely changing the global landscape, effect of the education of the future generation and the attributes which are related to the disruptive technology. The concept of changing the global landscape the global economy continued to be fuelled by quickly flow of information, swiftly knowledge generation and the myriad application found for this knowledge and information. The new global economy is mainly characterized by the increased uncertainty, flexibility and the openness and the choices all of these majorly impact the lifestyle, business model, the environment which is related to the working, the educational system and the national security [7]. On the global scale the population increase with the manpower being on the lower end and a lower cost is becoming the continual goal of all the operation, making the consistency increased which is related to the productivity a target which is relentless. Another shift in the paradigm occur when the off shore operation which is related to the US corporations, whose initial function was the manufacturing. The concept has majorly changed to the scientific research and the technological developm ent. On the other hand, the Effect of the education of the future generation: education is another very much important aspect of the ground work for the disruptive technology which can be considered [8]. Geographical and influence of culture This area of the analysis mainly includes not only the aspect of the geographical and cultural influence but also take into consideration the concept of the influence it has beyond the boundary. On the other hand, the influence of the stemming from the aspect pf the demographic that is globally impacted by the technology savvy youth. Each of these dimensions may serve to impede the development and the aspect of the diffusion of the technology which is taken into consideration [9]. Taking into consideration each of the dimensions may serve to accelerate, to impede the development and the diffusion of a given technology. Historically there has been a concern for the stemming from the concept of the geopolitical influence in the areas of where transparency is minimal due to the factor of the intentional disregard for the international disregard for the international conventions or the norms [10]. For example, although many nations have majorly accepted limitations on the use of the biological and the weapons which are chemical in nature, there is no such guarantee that can be taken into consideration that the state of the United States will not encounter such weapon on the future battle ship. Other techniques which can be considered to be symmetric made it very much possible by the technology which are merging may fall to fall into this category [11]. There are mainly two types of technology that can be termed as disruptive technologies. One type majorly displaces the incumbent technology in the transition phase during which the users adopts the new technology over a pre-defined time period. An early example of this was the major transition from the buggy to the horse to the automobile. The latter concept revolutionized disruption and transportation not only in the sphere of older transportation but also in the field of several ancillary means [12]. The second class of the disruptive technology creates a market or the capability when none of it ever existed. One of the example of this class is the personal computer. Before the invention of the computer, the services which are related to the computation are only available for the organisation of larger scale, institution and government sectors. The major key outcome which can be related to the concept when relating to the field of manufacturing as an example are: The flexibility is greater in order to produce the products that are very much multiscale, multi material and multifunctional. This have been considered as a greatest characteristic of the performance. Greatly reduce the time which is concerned with the marketing and the use of the modelling which is related to the digital aspect and the simulation of the tools in order to evaluate and plan the manufacturing processes and the design of the system and the network system configuration. Significantly improve the quality and the productivity. The issue which is generated is the issue of the labour cost and the better return on the investment in the capital. The high efficiency aspect which is related to the operation of the assets of the factory by the major use of the industrial big data and the advanced data analytics. The improved concept of the utilization of the resources and its material and the reduced energy consumption process. A manufacturing sustainable paradigm. While these disruptive and emerging technology are major causing significant excitement there are also some potential barriers that can be related to it. Significant R D investments are needed in order to develop these technologies. The levels of the investment which are required is beyond what the private sector can directly effort. Therefore, effective private and public partnership are very much essential in order to support the R D efforts. The new technology adaptation and the insertion process would be taking many years to implement, during which the process of the co-existence of the legacy of the manufacturing methods and the technology which are merging are expected. Future workforce development and the concept of the training must keep space with the technology adoption rate. It is very much likely that the operating future manufacturing company factories would directly require different set of skills sets than those of the current workforce. The development of the disruptive manufacturing which is sophisticated may future widen the concept gap which is between the developing country and the advanced countries. It is very much essential to bridge the gap which is majorly caused by the technological advancements. The robustness which is related to the concept of the emerging and the disruptive technologies is expected in order to improve gradually. False expectation may lead to affect which are detrimental on the development of the technology. Ultimately taking into consideration the new technology their cost effectiveness must be addressed if they are to make impact on the field of industry related to manufacturing [13]. North Korea: The plutonium program which was initiated in the year 1985, brought into operation a small gas cooled (carbon dioxide), moderated graphite, natural uranium (metal) fuelled experimental reactor of power of about 25 MWt at Yongbyon. It exhibits all the features of a plutonium production. This place was located on the west coast 55km north of pyongtyang. Israel: Israel is one of the few counties who have initiated the process of nuclear weapon. In the year 1952 after the isreal atomic energy commission was formed and in the year 1955 the USA agrred to supply a 5MWt pool type reactor for Nahal Soreq, south of Tel Aviv. This IRR -1 required enriched uranium supplied to the USA. It started up in 1960 and from the outset which is required to be under the IAEA safeguard Libya: after the months of continuous negotiation, Libya agreed in December 2003 to halt its process of the development of the nuclear weapon. For a tenure of more than a decade it was engaged in the process of the development of a uranium enrichment capacity and the construction of now dismantled pilot scale centrifuge facility. It can be stated from the above example that the use of disruptive weapon has changed the use of the forces. When taking into consideration whether a technology is disruptive or not, it is very much useful to think of it as disrupt. It should be taken into consideration that disruptive technology is impactful and the affect the other technologies. In many of the cases it is not the technology that can be considered to be disruptive but on the other and how the technology combines with the other factor or is applied can be termed as being disruptive in nature [14]. Taking into example the intercontinental ballistic missile (ICBM) which was combined with a rocket motor, a guidance missile and a nuclear warhead. The guided system mainly made the ICBM very much effective and disruptive. The committee which was involved with the system mainly categorised the disruptive technology into three distinct categories, to one of which truly every destructive technology must belong. Enabler: This technology mainly makes it possible one or more of the new technology, processes or the application for example, the integrated circuit, the gene splicing, the transistor and the cellular technology. Catalyst: Technology which mainly changes the rate of the technology development or the improvement rate of one or more technology. For example, the concept of the cloud computing and in the concept of the molecular biology, polymerase chain reaction (PCR) Technique for the DNA sequence amplification [15]. Morphers: Technology which is when combined with other technology creates one or more other new technology for example wireless technology and microprocessor. Enhancers: technology that mainly modifies other technology in order to cross a certain threshold. For example, technology which are already existing such as fuel cell, lithium ion batteries. Supersede: Technology that are majorly obsoletes another technology replacing the technology it with a superior concept (faster, better, cheaper, and more capable) of technology. Breakthrough: Technology or discover that majorly changes a fundamental understanding of the nature or which directly enables what had seemed nearly impossible (if not improbable). For example, fusion power, quantum computing [16]. The use of force in the context of the law enforcement may be directly defined as the amount of effort required by the police to compel compliance by an unwilling subject. A Destructive weapon can be termed as a weapon that can cause destruction or kill a large amount of people epically a chemical, nuclear or biological weapon. Conclusion This report mainly focuses on the concept of the disruptive technologies that should be taken into consideration. It can be stated that not all technology is destructive in nature but the affect it has on other technology are mainly considered as destructive. The concepts such as categories, attributes and the timelines associated with the technology are majorly taken into consideration. These terms play a very vital role in term associated with the technology being destructive. The timeless which is related to the deployment of the technology does not necessarily involve time period which is very short. This concept cannot be deployed for a technology which can be called a destructive technology. The life cycle of the technology can be varying, with most of the technology undergoing a series of S curves of growth and the deployment. The approach like the likelihood of a given technology disruption is also put direct limelight in the report. Bibliography Ahlborn, C. (2016). The Normative Erosion of International Refugee Protection through UN Security Council Practice. Leiden Journal of International Law C Foundation of the Leiden Journal of International Law, 24, 10091027. https://doi.org/10.1017/S0922156511000471 Ashenden, D., Lawrence, D. (2016). Security Dialogues: Building Better Relationships between Security and Business. IEEE Security and Privacy, 14(3), 8287. https://doi.org/10.1109/MSP.2016.57 Carr, M. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, 92(1), 4362. https://doi.org/10.1111/1468-2346.12504 Chernobrov, D. (2016). Ontological Security and Public (Mis)Recognition of International Crises: Uncertainty, Political Imagining, and the Self. Political Psychology, 37(5), 581596. https://doi.org/10.1111/pops.12334 Christie, D. J., Montiel, C. J. (2013). Contributions of psychology to war and peace. American Psychologist, 68(7), 502513. https://doi.org/10.1037/a0032875 Cohen, D. K. (2016). Rape During Civil War. Belfer Center for Science and International Affairs. Retrieved from https://belfercenter.ksg.harvard.edu/publication/26785/rape_during_civil_war.html?utm_source=SilverpopMailingutm_medium=emailutm_campaign=Cohen_RapeDuringCivilWar_Sep16%2520(1)utm_content=spMailingID=15360669spUserID=Mjk4ODAxMDExODgS1spJobID=86051625 Conklin, W. A. (2016). IT vs. OT security: A time to consider a change in CIA to include Resilienc. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2016March, pp. 26422647). https://doi.org/10.1109/HICSS.2016.331 Di Sarno, C., Garofalo, A., Matteucci, I., Vallini, M. (2016). A novel security information and event management system for enhancing cyber security in a hydroelectric dam. International Journal of Critical Infrastructure Protection, 13, 3951. https://doi.org/10.1016/j.ijcip.2016.03.002 Doucet, M. G. (2016). Global assemblages of security governance and contemporary international intervention. Journal of Intervention and Statebuilding, 10(1), 116132. https://doi.org/10.1080/17502977.2015.1054656 Duffy, R. (2016). War, by Conservation. Geoforum, 69, 238248. https://doi.org/10.1016/j.geoforum.2015.09.014 Enamorado, T., Lpez-Calva, L. F., Rodrguez-Casteln, C., Winkler, H. (2016). Income inequality and violent crime: Evidence from Mexicos drug war. Journal of Development Economics, 120, 128143. https://doi.org/10.1016/j.jdeveco.2015.12.004 Figueiredo Pereira de Faria, A. C., Berchin, I. I., Garcia, J., Barbosa Back, S. N., Andrade Guerra, J. B. S. O. de. (2016). Understanding food security and international security links in the context of climate change. Third World Quarterly. https://doi.org/10.1080/01436597.2015.1129271 Foster, D. (2016). The International Test Commission Guidelines on the Security of Tests, Examinations, and Other Assessments: International Test Commission (ITC). International Journal of Testing, 16(3), 181204. https://doi.org/10.1080/15305058.2015.1111221 Garcia, D. (2016). Future arms, technologies, and international law: Preventive security governance. European Journal of International Security, 1(1), 94111. https://doi.org/10.1017/eis.2015.7 Hendrix, M., Al-Sherbaz, A., Bloom, V. (2016). Game Based Cyber Security Training: are Serious Games suitable for cyber security training? International Journal of Serious Games, 3(1). https://doi.org/10.17083/ijsg.v3i1.107 Hussein, N. H., Khalid, A. (2016). A survey of cloud computing security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), 5256. Retrieved from https://search.proquest.com.library.capella.edu/docview/1764183503?accountid=27965%5Cnhttps://wv9lq5ld3p.search.serialssolutions.com.library.capella.edu/?ctx_ver=Z39.88-2004ctx_enc=info:ofi/enc:UTF-8rfr_id=info:sid/ProQ:criminaljusticeperiodicalsshellrft_ Ijaz, S., Shah, M. A., Khan, A., Ahmed, M. (2016). Smart Cities: A Survey on Security Concerns. International Journal of Advanced Computer Science and Applications, 7(2), 612625. https://doi.org/10.14569/IJACSA.2016.070277 ISO/IEC. (2016). ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary. ISO.org [Online]. Retrieved from https://standards.iso.org/ittf/PubliclyAvailableStandards/c066435_ISO_IEC_27000_2016(E).zip Kirby, P., Shepherd, L. J. (2016). Reintroducing women, peace and security. International Affairs, 92(2), 249254. https://doi.org/10.1111/1468-2346.12550 Klahr, R., Amili, S., Shah, J. N., Button, M., Wang, V. (2016). Cyber Security Breaches Survey 2016. Cyber Security Breaches Survey 2016, 56. https://doi.org/10.13140/RG.2.1.4332.6324 Kozhemiakin, A. V. (2016). Expanding the zone of peace?: Democratization and international security. Expanding the Zone of Peace?: Democratization and International Security. https://doi.org/10.1007/978-1-349-26687-6 Liu, C., Zhang, Y., Li, Z., Zhang, J., Qin, H., Zeng, J. (2016). Dynamic defense architecture for the security of the internet of things. In Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015 (pp. 390393). https://doi.org/10.1109/CIS.2015.100 Lowe, D. (2016). Surveillance and international terrorism intelligence exchange: Balancing the interests of national security and individual liberty. Terrorism and Political Violence, 28(4), 653673. https://doi.org/10.1080/09546553.2014.918880 Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I. (2016). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015 (pp. 336341). https://doi.org/10.1109/ICITST.2015.7412116 Marr, D. G. (2013). Hanois War: An International History of the War for Peace in Vietnam. Critical Asian Studies (Vol. 45). https://doi.org/10.1080/14672715.2013.758826 Meger, S. (2016). The fetishization of sexual violence in international security. International Studies Quarterly, 60(1), 149159. https://doi.org/10.1093/isq/sqw003 Odutayo, A. (2016). Human security and the international refugee crisis. Journal of Global Ethics, 12(3), 365379. https://doi.org/10.1080/17449626.2016.1251484 Ooms, G. (2016). Disease diplomacy: international norms and global health security. Global Change, Peace Security, 28(3), 334336. https://doi.org/10.1080/14781158.2016.1195805 Pelletier, B., Hickey, G. M., Bothi, K. L., Mude, A. (2016). Linking rural livelihood resilience and food security: an international challenge. Food Security, 8(3), 469476. https://doi.org/10.1007/s12571-016-0576-8 Pouliot, V. (2016). Hierarchy in practice: Multilateral diplomacy and the governance of international security. European Journal of International Security, 1(1), 526. https://doi.org/10.1017/eis.2015.4 Qian, J., Xu, H., Li, P. (2016). A novel secure architecture for the internet of things. In Proceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016 (pp. 398401). https://doi.org/10.1109/INCoS.2016.36 Rashid, A., Naqvi, S. A. A., Ramdhany, R., Edwards, M., Chitchyan, R., Babar, M. A. (2016). Discovering unknown known security requirements. In Proceedings of the 38th International Conference on Software Engineering - ICSE 16 (pp. 866876). https://doi.org/10.1145/2884781.2884785 Richmond, O. P. (2016). The Transformation of Peace. Transformation, 286. https://doi.org/10.1057/9780230505070 Rotte, R. (2016). Western drones and African security. African Security Review. https://doi.org/10.1080/10246029.2015.1124043 Sands, P., Mundaca-Shah, C., Dzau, V. J. (2016). The Neglected Dimension of Global Security A Framework for Countering Infectious-Disease Crises. New England Journal of Medicine, 374(13), 12811287. https://doi.org/10.1056/NEJMsr1600236 Sherif, E., Furnell, S., Clarke, N. (2016). Awareness, behaviour and culture: The ABC in cultivating security compliance. In 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015 (pp. 9094). https://doi.org/10.1109/ICITST.2015.7412064 Soomro, Z. A., Shah, M. H., Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215225. https://doi.org/10.1016/j.ijinfomgt.2015.11.009 Sovacool, B. K. (2013). An international assessment of energy security performance. Ecological Economics, 88, 148158. https://doi.org/10.1016/j.ecolecon.2013.01.019 Sovacool, B. K. (2016). Differing cultures of energy security: An international comparison of public perceptions. Renewable and Sustainable Energy Reviews. https://doi.org/10.1016/j.rser.2015.10.144 Thakur, K., Qiu, M., Gai, K., Ali, M. L. (2016). An Investigation on Cyber Security Threats and Security Models. In Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015 (pp. 307311). https://doi.org/10.1109/CSCloud.2015.71 Torabi, G. (2013). Armaments, Disarmament and International Security. Political Studies Review, 11(3), 418. https://doi.org/10.2307/2625592 van Ittersum, M. K., Giller, K. E. (2014). The First International Conference on Global Food Security - A Synthesis. Global Food Security, 3(34), 119124. https://doi.org/10.1016/j.gfs.2014.10.008 Weeks, J. L. P. (2014). Dictators at war and peace. Cornell studies in security affairs. Woody, C. (2016). Security Engineering Risk Analysis (SERA). 3rd International Workshop on Software Engineering Research and Industrial Practice, SER and IP 2016, 2324. https://doi.org/10.1145/2897022.2897024 Yoo, H., Shon, T. (2016). Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture. Future Generation Computer Systems, 61, 128136. https://doi.org/10.1016/j.future.2015.09.026 You, I., Bertino, E. (2016). MIST 2016: 8th International Workshop on Managing insider Security Threats. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS16 (pp. 18901891). https://doi.org/10.1145/2976749.2990482 Zhang, H., Mu, Y. (2016). Cyberspace security. China Communications. https://doi.org/10.1109/CC.2016.7781719