Tuesday, December 24, 2019

How Hitler Caused Wwii Essay - 1159 Words

Adolf Hitler Caused World War II May 1, 2012 Adolf Hitler Caused World War II As I’m sure most people know Adolf Hitler was the leader of the Germans from August 2 1934 to April 30 1945, but do you know that as Fuhrer of Germany he was the driving force behind the start of WWII. During his reign he tried to bring Germany back to the powerful country it had been before the First World War. In this paper I will prove that Hitler’s actions lead to start of WWII, and I plan to prove how his direct disregard of the Treaty of Versailles pushed the world into WWII. I will begin with a little background on Hitler and what led him to become the Fuhrer of Germany. Hitler was a member of the German army during the First World War and,†¦show more content†¦Then a month later President Hindenburg died, which made Hitler the head of state. This allowed him to control all aspects of Germany, and also allowed him to start rebuilding the military forces that had been ordered to disband with the passing of the Treaty of Versailles. This was probably the biggest step thus far that would send Germany to war yet again. Along with that he had personally taken over as leader of the military when Werner von Blomberg had openly told Hitler that he disagreed with him about having the military ready to go to war as soon as 1938. (Shire, 1960) Over the next few months he had stripped 16 generals and had 44 more transferred because they were believed to not be sufficiently pro-Nazi. On February 3, 1933 during a meeting with German military leaders Hitler said his foreign policy was the conquest of Eastern Europe (Weinberg, 1970), also in 1933 Germany withdrew from the League of Nations, which should have been a warning sign that they were planning something big. This along with the increase of the Wehrmacht (German Army) to 600,000 should have thrown up some red flags to Britain and France that Hitler was up to no go. This was another of Hitler’s direct violations of the Versailles Treaty, yet no one stopped him, instead they let him continue untouched. Then in March of 1936Show MoreRelatedThe War I And World War II Essay1639 Words   |  7 Pages which eventually laid out the foundation for WWII. The harsh terms of the Treaty of Versailles led to the aggression of Germany. The Treaty of Versailles was supposed to bring about peace, but Marshall Foch, generalissimo of the Allied Armies in France believed that instead, it was an armistice for twenty years. The causes of WWII can easily be traced back to the unresolved issues of WWI, thus bringing about the idea of the â€Å"Thirty Years War.† WWII is the second half of a longer â€Å"Thirty Years WarRead MoreHow Far Do You Agree That the Policy of Appeasement Was the Main Cause of WWII?1551 Words   |  7 PagesGermany, it ended the war between Germany and the Allied Powers. The Treaty of Versailles was signed on 28 June 1919. Hitler saw the Treaty of Versailles as a disgrace to the German people and an embarrassment to Germany. Hitler blam ed the German politicians for signing the Treaty of Versailles as he thought Germany could have avoided it and the problems it presented Germany with. Hitler first broke the Treaty of Versailles in 1934. The way he broke the treaty was over Germany’s armed forces, he brokeRead MoreAmerican War And The Vietnam War Essay1714 Words   |  7 Pagesthe 1940s through the 1970s. During WWII, the United States military fought a foe that the American public, and the world alike, saw as an enemy to the human race, which caused Americans to unify in their efforts to fight in the battle. In contrast, US military actions in Vietnam were not fully backed by the American public or American allies, in which caused many people from the country to lose trust and faith in America. Wars have points that define them. In WWII, it was the attack on Pearl HarborRead MoreThe Concentration Camps During The Holocaust1508 Words   |  7 Pagesunnerving events in not only WWII, but even world history . The treatment that citizens like Jews had to experience still influence people nearly 70 years later, after the end of World War II in 1945. The establishment that began this process was known as the Nazi Regime. Their ideas lead by Adolf Hitler brainwashed millions of Germans to believe that the concentration camps were the right thing to establish . The operation of concentration camps during the Holocaust in WWII was the most inhumane eventRead MoreWhy Did The Allies Win World War II?1480 Words   |  6 PagesEurope it is know for Adolf Hitler’s need for what he called the â€Å"superior race† (Adolf Hitler) that he believed everyone should be and the holocaust. (Hughes, Britannica, WWII) World War II was also the war that included almost every country in the world and caused the most deaths of all time, even today it still holds the record for most deaths especially for a six-year period of time. (Hughes, Britannica, WWII) The Beginning of World War II World War II began September 1939 and started when GermanyRead MoreIndustrial Revolution Essay1189 Words   |  5 Pagesincreased and was more valuable. However, not just factories came from the Industrial Revolution. Nationalism, which is the pride in ones country, resulted from the Industrial Revolution. People were proud of their products and being innovative, which caused the growth of military strength. With more time, militaries could be built up. So many things exploded from the Industrial Revolution which affected the way the world’s infrastructure and economy runs today. Next, the Enlightenment is anotherRead MoreThe Influence of the Treaty of Versailles on the Outbreak of World War II931 Words   |  4 Pages The Treaty of Versailles influenced the outbreak of WWII by angering the Germans, weakening their country, and making Germany vulnerable to Hitler’s influence. The Treaty of Versailles was made to keep Germany from stirring up commotion again by starting another war. It was signed at the end of WWI, which the Germans had lost, and therefore they were forced to sign the treaty, which took away their colonies, sectioned their land, made them pay for other countries military costs, and forcedRead MoreWorld War II1190 Words   |  5 Pagesï » ¿WWII Reading Questions http://www.digitalhistory.uh.edu/era.cfm?eraID=15smtID=2 1. Who was Joe Louis, why is he important, and why did he help to increase black enlistment into the military? He was important because he defeated a white boxer and encouraged blacks to enlist in the army 2. What was the first concentration camp and when was it set up? Dachau, 1933 3. What groups of people were targeted during the Holocaust? Jews, Gypsies, Polish Catholic, Russians, mentally and physicallyRead MoreThe Parliamentary Debate On The Munich Agreement Essay1452 Words   |  6 Pagesthe U.S. was great. Among other causes, the Munich Agreement was one of many things that came into in existence paving the way for WWII to begin. As addressed in the Parliamentary Debate on the Munich Agreement, many in the British Parliament (Winston Churchill, Neville Chamberlain, etc.) discussed the course of action that should be taken regarding Germany and Hitler. Many, including Neville Chamberlain signed this agreement in hopes of maintaining peace, others, like Winston Churchill believed thatRead MoreEffects Of War On Humanity : Wwii And The Holocaust1639 Words   |  7 PagesThe Effects of War On Humanity WWII and the Holocaust are two of the most horrific events in history. WWII was a global war that lasted from 1939 to 1945 and was the deadliest war in history. Adolf Hitler came into power in 1933 and remained in power throughout the rest of WWII. Hitler was disobeying the restrictions put on him by Treaty of Versaille and was gaining power. Other countries saw how powerful Germany was getting and didn t want to get in Hitler s way. They were scared that if they

Monday, December 16, 2019

Exploiting the Network Synergy, Product Placement Free Essays

The media industries have a suggestive and coercive power on society, embodied within the artifacts, images, and brands we consume. As these industries diversify, so do the products and the avenues in which they are offered. Synergy allows corporations the power to maximize advertising through a variety of cross-market promotional mechanisms, proliferating their products or logos exponentially. We will write a custom essay sample on Exploiting the Network: Synergy, Product Placement or any similar topic only for you Order Now Initially, this essay requires an explanation of the use of synergy and cross-market advertising. Subsequently, I will illustrate how television shows such as Nickelodeon’s SpongeBob SquarePants and MTV’s The Osbournes and Total Live Request (TRL), use the vast internal synergistic network of their parent company Viacom. Such programming appears to exploit its viewer-ship through commodification – product placement, branding, and celebrity endorsements. Synergy: The True Meaning of Cross-Market Advertising â€Å"We are reaching a position where the challenge for the 1990s should be to seek a greater understanding of the best ways, creatively, to exploit the potential for media synergy†(Confer, 10) The concept of synergy is not new, however evidence suggests it has only been fully realized and exploited over the last decade. Synergy is created through the integration or combination of different but complimentary business interests, each feeding off the other. Ultimately, large corporations or conglomerates are diversifying their market interests rather than specializing. This diversification benefits the company by offering a new strata of opportunities thereby complimenting its existing functionality. An example of this is a movie production company allying or buying out a major video game provider. The synergy created from such a merger allows for a film and a video game to use the same characters, story line or premise. Synergy works for two reasons. Primarily, synergy is an engine that provides cross-marketing and cross-selling opportunities, which would allow for greater sales, exceeding what would be possible from each division separately. (Hesmondhalgh, 141). Secondly, corporations also â€Å"plan and design texts, in order to encourage subsidiary spin-off texts† (Hesmondhalgh, 239). Even if these texts or preplanned products are not of great quality or a commercial success, they will still sell thus generating profit. This is because there is a pre-existing, underlying product network that has already been established through the fan base. If synergy can be classified as the â€Å"the ability to keep cash flows inside a corporate family† (Klein, 148), through its internal use of cross-market production, promotion, and sales; Sumner Redstone’s Viacom is a perfect example of synergy at work. The Viacom Empire has tapped into many markets throughout the entertainment and media industry. Viacom’s major subsidiaries include: Nickelodeon – children’s cartoon network; MTV – music network; NBC – television network; and Paramount – movie production company, which also runs numerous theme parks all over North America. Klein, 2000, comments on this phenomenon as â€Å"synergy nirvana† (160). According to Klein, ‘synergy nirvana’ is attained when a conglomerate works internally to â€Å"successfully†¦churn out related versions of the same product, like molded Play-Doh, into different shapes: toys, books, theme parks, magazines, television specials, movies, candies, CDs, CD-ROMs, superstores, comics, and mega-musicals† (161). Basically, ‘synergy nirvana’ is the proliferation of standardized products in different packaging, through a preexisting framework of cross-market advertising; which is done on a vast scale through the exploitation of many different mediums and industries in the name of profit. ‘Synergy’ is Viacom’s number one marketing tool for it allows them to link the vastness of their empire together, into a culmination, dissemination and consumption of products, images, ideals, and brands. Furthermore, ‘synergy’ in programming, such as SpongeBob SquarePants and The Osbournes, has evident implications for the viewer-ship. SpongeBob SquarePants: The Future of Product Placement â€Å"Nickelodeon has more children between the ages of two to eleven watching than the four major networks combined†¦ This is significant in the competition for the children’s advertising market, which averages about $500 million a year† (Roman, 223). SpongeBob SquarePants is a lovable, animated sea sponge that manages to find himself in undersea trouble during every episode. The â€Å"cartoon† (Mittell, 18) runs every â€Å"Saturday morning† (Mittell, 18) on Nickelodeon and is syndicated to most major television networks due to its incredible popularity among children viewers. What started out in 1999, as a comical concept for a children’s television program, has grown seemingly overnight into a ‘juggernaut’. Nickelodeon cannot only boast that it is â€Å"the number one rated program among children 2-11†, but according to Nielson ratings, â€Å"53. 7 million viewers tune into the show each month†¦including 22. 1 million kids 2-11, [and] 12. 7 million between 9-14† (Olson, blogcritics. rg). With such commercial success and an immense viewer ship, Nickelodeon’s SpongeBob SquarePants uses synergistic principals of massive product placement to have free rein and ‘seep into every pore’ of consumer culture. SpongeBob employs Viacom’s cross platform synergies to network and gain access to most children’s homes. The motivation is a given when children between the ages of 2 – 11 are not only watching between 24 – 28 hours of television a week (Roman, 74), but are â€Å"responsible for either spending or influencing the spending of $100 billion annually† (Roman, 74). This is clearly an influential and lucrative market. SpongeBob SquarePants should be the archetype for synergistic corporate product placement. With SpongeBob’s insurgence into popular culture, there have been similar synergistic trends of product placement. Support for this notion is found through looking back to 2004, days before the premier of the SpongeBob SquarePants movie in New York. Paramount, another Viacom subsidiary, launched a brand new SpongeBob SquarePants amusement park theme ride to coincide with the movie launch. Additionally, Burger King (also owned by Viacom), released a SpongeBob SquarePants value meal that comes with SpongeBob SquarePants plastic figurines from the movie – ‘collect all 42. ’ Nickelodeon, the Viacom subsidiary that operates SpongeBob must not be ignored. Nickelodeon aired a 24-hour SpongeBob SquarePants Marathon that hyped up kids for the movie and forced unsuspecting parents to shell out $12 a ticket. Furthermore, during the Marathon’s commercial breaks, SpongeBob advised the viewers to eat SpongeBob value meals, collect all 67 figurines, and go to Paramount Theme Parks to try his new ride. SpongeBob has saturated the market with his yellow sponginess, which must be overpowering to any parent; he can be found everywhere, in every nuance of daily life. Since the movie, product placements and cross-promotional marketing have skyrocketed. SpongeBob now has a line of clothing, DVD box sets, bed linens, and bowling balls with a real tenpin set. Of course a 5 year old needs a bowling ball and set of bowling pins with SpongeBob SquarePants on them – SpongeBob said so! MTV: Branding a Nation â€Å"MTV is associated with the forces of freedom and democracy around the world. When the Berlin Wall came down, there were East German guards holding MTV umbrellas† – Sumner Redstone, CEO of Viacom MTV is known for hosting different music video programs 24 hours a day, 7 days a week. In 1998, MTV was watched in â€Å"273. 5 million household worldwide† (Klein, 120), where it was reported, â€Å"85% of them watched everyday† (Klein, 120). The station offers a host television shows, including TRL and The Osbournes, that entrance its youthful audience through flashy music videos and the celebrities portrayed. MTV’s popularity, since its inception in the early 1980s, is as a self-perpetuating â€Å"fully branded media integration† (Klein, 44). Klein, 2000, writes: From the beginning, MTV has not been just a marketing machine for products it advertises around the clock; it has also been a twenty-four-hour advertisement for MTV itself†¦[where] viewers didn’t watch individual shows, they simply watched MTV†¦Advertisers didn’t want to just advertise on MTV, they wanted to co-brand with the station (44). Today, advertiser branding can be seen throughout MTV. As MTV endeavors to diversify in a changing market place, video shows like TRL are coupled with reality-based television shows intimately linked to ‘celerity’ including The Anna Nichol Smith Show or The Osbournes’. Beyond these shows lack of merit, their entire function is product branding and celebrity endorsements. Even though The Osbournes’ are a revival to the â€Å"original early 1950s format of the American sitcom† (Gillan, 55), I cannot fathom that product branding, product placement, and celebrity endorsements were as prevalent on national television in the 1950s as they are in modern programming. Within the first ten minutes of the show, the audience can blatantly see a mansion full of expensive electronics, furniture, and cars – at a closer look, the brand names facing the camera and are a part of the Viacom conglomerate in a myriad of ways. All The Osbournes offer the predominately teen audience (other than a few less brain cells) is copious amounts of product branding though celebrity endorsement. Product branding on MTV is a big issue. Much like the red carpet on Oscar night, where the predominant question on everyone’s lips is ‘who are you wearing? ’ MTV offers its audience the same intellectual stimulation, especially when all that its audience sees are ‘hella-cool’ rock stars and all the ‘bling’ they wear throughout their music videos, interviews, and award ceremonies. No wonder the Y generation is all about over consumption and bad taste. As we have entered the 21st Century, multi-media conglomerates have risen to great power in our society. They offer the consumer the media and entertainment that they desire. However through internal synergistic networks, these companies, such as Viacom, can link the lucrative children’s market or the 24-hour advertising nature of MTV, to all other aspects of their company. As consumers, we neglect what these companies are telling us to do – to consume – in order to watch our favourite programs. We refuse to witness how the realities of consumerism, and sickening nature that these corporations control the very artifacts and images that we relate to and enjoy for their own personal profit. How to cite Exploiting the Network: Synergy, Product Placement, Essay examples

Saturday, December 7, 2019

Accounting Information Systems and Controls for Human Error

Question: Discuss about theAccounting Information Systems and Controls for Human Error. Answer: Data Input The problems related to the use of manual data entry producers have been discussed. Too much cost incurred for the procedure due to the fact that the company has to provide money to the people who are working for the company in the process of data entry into the data base. Human error can arise at any moment for due to any mistyping, grammar error and punctuation (Raghupati Raghupati 2014). Due to the large volume of data all, the entered data cannot be checked again after the process has been completed. The process is time consuming, as the data is large in number and the time-required for the processing pf data is long. Humans are not fast enough for the assessment of large amount of data. The last problem can be for the error based on misinterpretation of the data that has been provided to the human for the data entry (Takeuchi et al. 2014). Different humans thin about a single data differently and thus the interpretation of the data can be different. The person who is inserting the data can interpret the data in a different manner and the datacan be inserted wrongly. Processing of Patient Records Security breaches can threaten the privacy protocol of the patient of the hospital due to the inclusion of confidential personal information as well as health related information. When the details of such patients are made public without the consent of the patient then the data can be said to be breached (Boulos et al. 2014). The problems can threaten the life of the patient, as the person who has the hold of the details will be able to clear out their bank details. Any kind of online digital format of data storage has the probability of a high risk factor in the form of data breaches. The use of security measures like firewall, antimalware and antivirus software and the use of intrusion detection software to be installed in the servers of the hospitals. To implement specific policies regarding the use of the servers for the maintenance of patient health records. This also helps in the maintenance of the privacy of the patient (Benchimol et al. 2015). To maintain this server employee s has to provide the employees of the hospitals with credentials, which needs to be shared during the accessing of the data. The security officer has to be employed by the hospital keep a track of the user who are logging into the system. Data Enquiry Data enquiry is a way of knowing personal information about an individual whose records are already been saved into the database and should be made by only an authorized person. In general unauthorized might try to access the information related to the patient and exposing medical information related to the patients could be serious act of lost of privacy (Hussain et al. 2016). The hospital management should build a strong authentication system in manner to track the authority and relation of the individual asking about the details of the patient and thereafter only, the management should provide details about the patient. Buffer Overflows It has been discovered in hacking circles, which uses input into the poorly implemented and pure harmless application that is made by intention and typically this input are made with the administrator or root privileges. Technically, it can be said that the buffer overflow attack is a way of harming the files through the inputs that has been longer than the programmer intentions related to the memory allocation system of the computers (Zeng, Chou Liu 2015). It can be said that the best defense for mitigating such threat is to write an unexplainable code or program that cannot be exploitable for any user. There should be call of safe string functions only during the execution or memory allocation for any data. While programming it should be noted that sprintf and strcpy functions should not be used in the overall programming. Few of the programming languages focuses on the more secure code, but it can also be noticed that they allows unsafe structure that could provide an unauthorize d user to access the data and information saved into the database of the system. SQL Injection It can be described as the Structured Query Language that has become a popular technique for the hackers to get access to the data or prevent the users from accessing the data. Until now, it has been used against PBS, LinkedIn, CIA, Yahoo, Sony Pictures, and Microsoft. Technically, it can be described as a command-and-control language for the databases like Oracle, MySQL, and Microsoft (Rahman et al. 2017). SQL server that has been already used on the back end of the data management system and web applications relating to the behavior and content of many websites has been built on the data into the server of the database. Using web application firewall, limiting the database privileges with the help of the context, avoiding user input while construction of the SQL, Eliminating the database capabilities those are unnecessary, suppressing errors, continuously monitoring SQL statements from the database-connected applications. Explained above objectives can be helpful measures and proce ss of mitigation of the SQL attacks and could play vital role in securing the privacy of the data that has been stored in the database. Cross-Site Scripting (XSS) It is one of the most common vulnerabilities that could be found in the wordPress plug-ins through a significant margin. These vulnerabilities are very easy to write and that much easy to recognize. For example writing PHP code in a WordPress Plug-in, can be a intrusion and could be described as the XSS vulnerability. However, a mass destruction can be made using such simple codes as an intruder might find a way to make the user exploit an XSS vulnerability and via this he or she could load their java script using the same vulnerability coding (Gupta Gupta 2016). PHP AntiXSS, xssprotect, xss_clean.php filter, XSS HTML Filter, HTML Purifier are some of the open source libraries that could be helpful in preventing XSS (Cross Site Scripting) attacks and protect the system and database from any of such intrusions. Introduction In this new world of technology cloud computing is playing vital role in enhancing the way of using information technologies. The purpose of this report is to provide a brief description on the cloud accounting that are being used and could be used within the organization for maintaining financial operations. This report put emphasis on cloud accounting and related benefits that are promoting it towards trending application or technology. Every coin has two faces, similarly there are certain risks related to the cyber security that has been also pointed out in this report. However, there are certain measures that could help in mitigating these risks that is also described in this report. Cloud Accounting It had been described to the similar self-install, on-premises, and traditional accounting software that can be helpful in the process of enabling the user to host the accounting software on a remote server. The process is very much similar to the process of Software as a Service (SaaS). This can be implemented in the business deployment model of cloud computing (Lakew et al. 2014). Data is returned to the user through cloud storage where it used to process the data first. The functions incorporated within the application users are allowed to access the software applications from anywhere via connecting to the internet or any other network that is being provided by the cloud service providers (Silva et al. 2013). It replaces the necessity of installing the software onto the desktop, maintains and manages the operational data and information along with the storage, and updates. Benefits of Cloud Accounting There are many benefits of cloud software among which some of the benefits are listed below: In real-time, it could be helpful in providing a clear overview of the current financial situation of the organization. It can be easily corporate within multi users providing online access to the data and information with the advisors and team. Other benefits can be described as the service providers that could save time for the users and ensures addition of new objectives (Drimiti Matei 2014). This makes the users to be relied on the third party that also eliminates the extra effort that was to be made for managing and maintain the application software. Every operation runs online that results in no extra effort for the user to backed up everything and install as everything is being managed online. It could also be helpful in eliminating installation of accounting software in manner to manage the operational data as it provides a single platform to perform all the related activities. New features are added as per the needs and feedback of the users with instant availability and fr ee update (Cleary Quinn 2016). One of the most important benefits is that, it could be helpful in reducing the upfront business costs. It provides various services such as maintenance, server failures management issues, system administration costs, version upgrades and many more. The third parties, who are the Cloud service providers, are handling these services. Cyber Security Risk in Cloud Accounting Despite of all the benefits stated above, there are various cyber risks in Cloud accounting and could affect the data and information saved in the Cloud. Data saved in the Cloud or in the internet are vulnerable to cyber attacks as intruders could get access to the data and could be able to expose them (Ko Choo 2015). Malicious virus attack is one of the concerning topic related to the cloud accounting in which an intruder could get access to inject malicious coding into the system and harm the organization in many ways. Data breach is another important topic that is affecting or can be said harming all the cloud services and internet services in which a hacker or intruder breaches the server and get access to the data stored in the server. An unauthorized user or intruder in manner to block the access of data exchange between the service provider and service consumers could also introduce Ransomware attacks. Security of the cloud server could be breached by certain coding attempts made by the unauthorized user that could give access to the intruder (Fernandes et al. 2014). Exposing data to an unauthorized user could lead to several issues related to the security and privacy of the individuals or the organization whose data is being saved into the internet. Measures to Mitigate Cyber Security Risk Very first objective for any organization is to crosscheck whether the security policies implemented for the security of data and information by the third party (Cloud service providers) complying with the organizational data security or not. The cyber security of the cloud service provider should meet the expectations of the organization (Chou 2013). Training and educating the users about how to keep their credentials protected and safe could also help in minimizing these threats to the extent level. Data encryption can be stated as the best precaution from resisting unauthorized users to access the data and manipulate them. Cloud service providers are able to provide 24x7 services but they should provide the security staff on-site 24x7x365. Intrusion detection system can be another approach towards detecting the intrusion and stop them at the highest priority. Anti-virus, updated firewalls and original operating systems could also be helpful in resisting the users to enter the data base and access the data. Concern should be given to the credentials (password), it should be strong with alphabets, numbers and symbols (Suresh Gupta 2017). Generally, auto generated password and password change on regular basis could be most emphasizing approach. Conclusion Based on the above report it can be concluded that Cloud accounting is a greatest approach towards replacing traditional accounting software and providing best services. Cloud accounting is helpful in providing 24x7 services and data accessibility from anywhere via connecting to the network that could alternatively reflect on the overall revenue. However, there are certain issues related to the implementation and application of cloud accounting software among which cyber security is the greatest concern. This paper discussed the related cyber security risks with certain preventive measures that could be helpful in enhancing the information security of the system. References Benchimol, E.I., Smeeth, L., Guttmann, A., Harron, K., Moher, D., Petersen, I., Srensen, H.T., von Elm, E., Langan, S.M. and RECORD Working Committee, 2015. The REporting of studies Conducted using Observational Routinely-collected health Data (RECORD) statement.PLoS medicine,12(10), p.e1001885. Boulos, M.N.K., Brewer, A.C., Karimkhani, C., Buller, D.B. and Dellavalle, R.P., 2014. Mobile medical and health apps: state of the art, concerns, regulatory control and certification.Online journal of public health informatics,5(3), p.229. Cleary, P. and Quinn, M., 2016. Intellectual capital and business performance: An exploratory study of the impact of cloud-based accounting and finance infrastructure.Journal of Intellectual Capital,17(2), pp.255-278 Dimitriu, O. and Matei, M., 2014. A new paradigm for accounting through cloud computing.Procedia Economics and Finance,15, pp.840-846. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Incio, P.R., 2014. Security issues in cloud environments: a survey.International Journal of Information Security,13(2), pp.113-170. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Incio, P.R., 2014. Security issues in cloud environments: a survey.International Journal of Information Security,13(2), pp.113-170. Gupta, S. and Gupta, B.B., 2016. XSS-SAFE: a server-side approach to detect and mitigate cross-site scripting (XSS) attacks in JavaScript code.Arabian Journal for Science and Engineering,41(3), pp.897-920. Hussain, J.A., White, I.R., Langan, D., Johnson, M.J., Currow, D.C., Torgerson, D.J. and Bland, M., 2016. Missing data in randomized controlled trials testing palliative interventions pose a significant risk of bias and loss of power: a systematic review and meta-analyses.Journal of clinical epidemiology,74, pp.57-65. Ko, R. and Choo, R., 2015.The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress. Lakew, E.B., Xu, L., Hernndez-Rodrguez, F., Elmroth, E. and Pahl, C., 2014, September. A synchronization mechanism for cloud accounting systems. InCloud and Autonomic Computing (ICCAC), 2014 International Conference on(pp. 111-120). IEEE. Raghupathi, W. and Raghupathi, V., 2014. Big data analytics in healthcare: promise and potential.Health information science and systems,2(1), p.3. Rahman, T.F.A., Buja, A.G., Abd, K. and Ali, F.M., 2017. SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm.JCP,12(2), pp.183-189. Silva, F.A., Neto, P., Garcia, V., Trinta, F. and Assad, R., 2013, May. Accounting federated clouds based on the jitcloud platform. InCluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on(pp. 186-187). IEEE. Suresh, N. and Gupta, M., 2017. Impact of Technology Innovation: A Study on Cloud Risk Mitigation.Information Technology Risk Management and Compliance in Modern Organizations, p.229. Takeuchi, H., Miyata, H., Gotoh, M., Kitagawa, Y., Baba, H., Kimura, W., Tomita, N., Nakagoe, T., Shimada, M., Sugihara, K. and Mori, M., 2014. A risk model for esophagectomy using data of 5354 patients included in a Japanese nationwide web-based database.Annals of surgery,260(2), pp.259-266. Takeuchi, H., Miyata, H., Gotoh, M., Kitagawa, Y., Baba, H., Kimura, W., Tomita, N., Nakagoe, T., Shimada, M., Sugihara, K. and Mori, M., 2014. A risk model for esophagectomy using data of 5354 patients included in a Japanese nationwide web-based database.Annals of surgery,260(2), pp.259-266. Zeng, Q., Zhao, M. and Liu, P., 2015, June. Heaptherapy: An efficient end-to-end solution against heap buffer overflows. InDependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on(pp. 485-496). IEEE.