Monday, December 30, 2019

Evaluation Of Norm Sample - 757 Words

Evaluation of Norm Sample for KeyMath-3 DA The following evaluation presents the components of the normative sample applied in the KeyMath-3 Diagnostic Assessment (KeyMath-3 DA). For reference, a norm sample characterizes as a selected sample of test-takers from various common characteristics such as gender, age, grade, race, ethnicity, socioeconomic status, or some combination thereof, for the purpose of creating test norms. The KeyMath-3 DA is a comprehensive, norm-referenced measure of essential mathematical concepts and skill which is untimed and individually administered (Connolly, p. 1, 2007). Furthermore, the test consists of 372 full color test items and 10 subtests covering three general math areas: Basic Concepts (numeration, algebra, geometry, measurement, data analysis and probability), Operations (mental computation and estimation; addition and subtraction; and multiplication and division), and Applications (foundations of problem solving and applied problem solving). Additionally, data from the U.S. Bureau of th e Census (2004) reinforced the integrity of the normative sample to establish the target counts in age, grade and season, race/ethnicity, geographic region and socioeconomic status. Ages/Grades of Students To accomplish an age norm sample, the KeyMath-3 DA tested students beginning from the ages of 4 years 6 months through 21 years 11 months. In order to accommodate the goal of testing 220 students per group, Connolly (2007) divided the groups suchShow MoreRelatedEvaluation Of Norm Sample754 Words   |  4 PagesEvaluation of Norm Sample for KeyMath-3 DA In order to determine the components of the norm sample applied in the KeyMath-3 Diagnostic Assessment (KeyMath-3 DA), an evaluation is presented. For reference, a norm sample is defined as selected sample of test-takers from various common characteristics such as gender, age, grade, race, ethnicity, socioeconomic status, or some combination thereof, for the purpose of creating test norms. The KeyMath-3 DA is a comprehensive, norm-referenced measure of essentialRead MoreCultural Evaluation Of Eddi-31277 Words   |  6 Pagesdisappointing, suggesting the screening components were more helpful than the scales. Technical evaluation Norms EDI-3 relies on the age and diagnostic status of individuals. Age effects can influence some sub-scales when comparing adolescents and adults. Therefore, two normative groups were derived: 11 to 17 years, and 18 years and older. There was no normative group for those under 11 or over 53 years. The norms refer to specifically to females only. The adult normative groups are Caucasian femalesRead MoreThe Assessment Instrument You Are Reviewing1536 Words   |  7 Pagesassessment (criterion referenced or norm referenced) (2 pts.) This assessment is a norm referenced assessment because it designed to compare an individual performances with the performance of the standardization sample. Norming information: how were the individuals in the norming sample selected? Determine if the normative sample is representative of the population in terms of gender, ethnicity, geographical areas, and parental status. (4 pts.) The standardization sample was selected from most statesRead MoreContent Validity And Its Effects On The Research Instrument1331 Words   |  6 Pagesfactors or popularly known as ‘structural model’. In SEM, a researcher must aware the irregularities that may occurred in their proposed structure. Bagozzi Yi (1998) suggested three criteria to evaluate the compatibility of a model: Preliminary Evaluation Criteria, Overall Model Fit Criteria and Internal Sturcture Fit Criteria. The first criteria requires the model to be exempt from negative error variances, loading factors correlations that larger than one, and very high standard errors. The nextRead MoreUses Of Rasch Calibration Parameters1187 Words   |  5 Pagesfor each form to determine start and stop points. Vertical scaling involves linking the total raw scores from different item sets (within subtests). Next, parallel form equating was completed using the equipercentile method and the entire grade norm sample . As a result, item order is not strictly based on level of difficulty. Instead, these subtests contain item sets with decision points to continue or discontinue testing. Item analyses were completed using IRT, specifically a Rasch analysis inRead MoreThe Brigance Diagnostic Inventory Of Early Development II1158 Words   |  5 Pages(Davis 1). It also helps in assisting with program evaluation. The subtests in the IED-II include 11 areas of development. These areas include preambulatory motor skills, gross motor skills, fine motor, self-help skills, speech and language skills, general knowledge/comprehension, social emotional development, readiness, basic reading skills, basic math for criterion-referenced and manuscript writing (Davis pg 2). The Brigance test is both norm and criterion referenced, and both are appropriateRead MoreAccounting Procedures For Problem Evaluation Essay1670 Words   |  7 Pages2.4 PROCEDURES FOR PROBLEM EVALUATION In general, the problems detailed in the EPA manual are those most commonly encountered. However, the procedures mentioned in the EPA manual can be used for any type of problem evaluation. The first step in problem evaluation is to determine if the plant is meeting design performance standards by comparing its effluent quality and overall removal efficiencies with those specified by the design. If the plant does not routinely meet performance specificationsRead MoreTiger Tools Case Study Essay1613 Words   |  7 PagesIndustries, was about to launch a new product. In this regard, the Production Manager asked her assistant Jim Peterson to evaluate the capability of the existing equipment used in the process. He proceeded to obtain eighteen random samples and the results of these samples were put in a table. His subsequent conclusion after analyzing the data would be that the process was not capable. This was on the basis of the width specification of 1.44 cm. Given the ambition that the company had, of introducingRead MoreBilingual Children973 Words   |  4 Pagesare the most common. These include: norm-referenced standardized measures, criterion-referenced measures, language-processing measures, and dynamic assessment. Each method measures the child’s abilities in speech and language using different approaches where each has its strength and weaknesses. The norm-referenced standardized measure is a standardized test where the child’s results are compared to a normative sample (Laing, 2003). Using the clinical evaluation of language fundamentals (CELF-3)Read MoreCritique of the Gifted and Talented Evaluation Scales1469 Words   |  6 Pagesvalue. They are the original numerical values associated with the subject’s test performance which are converted into standard scores (Jarosewich, Pfeiffer, Morris, 2002). The percentile rankings are normally used in scholastic and psychosomatic evaluation. Percentages illustrate ranking of those assessed performance as compared to the current student. Standard scores are the most useful of the test scores. These scores are normalized against the predetermined mean and standard deviation to detail

Saturday, December 21, 2019

Poetry Analysis Between Taylor Swift and William Blake

‘What connections did you find between poems studied this year and what links can you make between the world of your poets and your world?’ Love and the breakdown of love or relationships is a theme explored in many poems. The songs Long Live by Taylor Swift and the poems The Sick Rose and The Garden of Love by William Blake all question and explore the theme of love. The song, Long Live, by Taylor Swift, was written in 2010. At first listening to the song, we hear a fun, buoyant song about love, friendship and loss. However, careful analysis reveals a complex piece of poetry that relies on its strong imagery and upbeat tune to convey strong meaning to the audience. Essentially, the song is about love or friendship and the loss of it.†¦show more content†¦The Garden of Love also follows a strict rhyme scheme of ‘ABCB’; ‘I went to the Garden of Love, And saw what I never had seen: A Chapel was built in the midst, Where I used to play on the green’ The last stanza however, does not follow this rhyme scheme. Instead Blake uses internal rhyme in the last line with the words ‘briers’ and ‘desires’; ‘And binding with briers my joys and desires’ The three pieces of poetry are all connected through their meaning of the loss of something. Unlike Blake, Swift sings about the loss of love in as experiential. Instead of looking at the breakdown of the relationship in a depressed manner, she instead sings about it in a cheerful way about the positive things that happened throughout the relationship. Swift and Blake both use the technique of sight rhyme in their poems. Swift uses it with the words ‘mind’ and ‘wild’ and Blake with ‘storm’ and ‘worm’ in The Sick Rose and ‘love’ and ‘bore’ in The Garden of Love. Even though Taylor Swift and William Blake lived centuries apart, they both talked about loss in similar ways. Both poets use strong rhythms and images to convey the message of the poems. Above all else, the three poems are connected through their meaning of loss which is a part of life everyone experiences. Word Count:Show MoreRelatedChildrens Literature13219 Words   |  53 Pagesand John Locke: Late 1600s 8 3. Beginning of Children’s Literature: Late 1700s 10 4. Fairy and Folk Tales 12 The Golden Age of Children’s Literature: Late 1800s 12 5. Victorian Childrens Literature 16 6. Contemporary Childrens Literature 18 6. Analysis of Harry Potters’ series 21 7. Conclusion 30 8. Summary 31 Children’s Literature Definitions 31 The Ancient World [ancient Rome; 50 BCE to 500 CE] 31 The Middle Ages [500 to 1500 CE] 31 The European Renaissance [1500-1650 CE] 32 The 17th Century

Friday, December 13, 2019

Historical Development of Nursing Timeline Free Essays

Historical Development of Nursing Timeline Olga NUR/513 Historical Development of Nursing Timeline Nursing is an art and a science. This coexistence assists in the development and advancement of nursing to a higher level of professional practice. The art of nursing emphasizes interpersonal relationships between the nurse and the patient, empathy, and dedication to caring for a patient. We will write a custom essay sample on Historical Development of Nursing Timeline or any similar topic only for you Order Now The science is the foundation of nursing that guides nursing care based upon the latest scientific discoveries within the nursing and other related disciplines such as medicine, psychology, and social sciences (Walker Avant, 2011). In biblical times, female members of societies were responsible for caring for ill. There was neither organized care, nor science behind the methods of caring: the approaches were passed among the women and were centered on their religious views on sickness and health. The people who provided care were untrained and often belonged to the lowest economic classes, such as slaves. The first organized groups who performed nursing care were male nursing orders in 1300s, such as the Knights of St. John of Jerusalem (Anderson, 1981). During the 16th and 17th century, nursing jobs fell into â€Å"dark ages† becoming synonymous with alcoholism, prostitution, and the waste of society (Anderson, 1981, p. 20). The first nursing school, the Deaconess School of Nursing at Kaiserwerth, Germany was established in 1836. Physicians instructed nursing students about bedside care and how to provide nursing care (Anderson, 1981). The development of nursing science is traced back to Florence Nightingale, whose initial study â€Å"Notes of Nursing† (1859) represents the first nursing theory (George, 2011). Nightingale supported her nursing experiences with statistical data. Nightingale’s analysis of the positive impact of a clean environment on decreasing morbidity and mortality among the soldiers during the Crimean War became the model for changing the nursing practice from an art to a combination of art and science (Burns, Grove, 2007). Nightingale established nursing program at St. Thomas Hospital in London that correlate nursing theory and practice. This school became a model for nursing education. The medicine continued to provide nursing guidelines and influenced nursing practice. The nurses remained relegated to the status of obedience servant to the authoritarian doctors. The nurses were obligated to obey the physician’s orders faithfully, â€Å"never be guilty of making suggestions to the doctor,† since â€Å"she [nurse] is there to carry out his [physician] orders† (Walker Holmes, 2008, p. 111). The lack of preparation and education among the nurses was obvious. Universities began establishing nursing programs throughout the United States. The University of Texas (1894), the Columbia University (1899), the University of Minnesota (1908), and others opened schools of nursing (Anderson, 1981). In 1923, Teachers College at Columbia University offered the first educational nursing program at doctorial level. The first master’s degree in nursing was established in 1929 at Yale University (Burns Grove, 2007). During the 1940s, the nursing literature continued to emphasize the practical skills of the nursing. Most of the existing manuals viewed nursing as â€Å"the hand† and medicine as â€Å"the head as its primary signifier† (Walker, Holmes, 2008, 114). In 1950s, the first nursing theorists were graduates from the Columbia University’s Teachers College educational programs. Their theories were based on practical nursing. The focus of these theories was the patients’ needs. Peplau (1952/1988) presented interpersonal relations in nursing theory (George, 2011). In 1959, Hall presented care, core, and cure theory, where caring and nurturing for a patient were interconnected with patient’s ability to make decisions of â€Å"therapeutic use of self† (George, 2011, p. 183). Many of the nursing leaders in this era recognized that nursing science and theory development were needed to change the status of nursing from a career to a profession (Walker Avant, 2011). The theories developed during the 1960s focused on the relationships between the nurse and the patient. The theorists from Yale School, such as Henderson and Orlando, proposed their theories. Henderson in 1960, defined nursing as â€Å"assisting† and â€Å"help† for the individuals, focusing on the individual plan of care (George, 2011, p. 89). Orlando’s 1961 theory, The Dynamic Nurse-Patient Relationship: Function, Process, and Principles described nursing as an interactive process between the nurse and the individual patient within the immediate situation. Orlando shifted the focus of nursing from assisting the physician to assisting the patient, and promoted the independence of nursing (George, 2011). In 1965, the American Nursing Association recommended two levels of nursing education, the baccalaureate and the associate, to distinguish the education for a professional nursing from that of the technical nursing profession. During the same time frame, the amount of nursing research was increasing. Nurses became involved in the development of frameworks for nursing practice guidelines (Burns Grove, 2007). During the 1970s, many nursing theories were revised. Rogers, King, Orem, Neuman, and Watson symbolized this era of nursing theorists. Their theories provided the foundation for the nursing profession, integrating arts, science, and philosophy into nursing. They focused on human behavior and emphasized the complexity of nursing. The theorists presented the individual as the whole system of the physiological, psychosocial, developmental, cultural, and spiritual elements (George, 2011; Burns Grove, 2007). The development of the nursing during 1980s was characterized by increased nursing research. Many theories were revised and new theories were proposed. The theories of Erickson, Benner, Leininger, Orem, Roy, King, Watson, Levine, and others represent this era (Burns Grove, 2007). The 1990s was characterized by an increasing number of middle range theories that provided guidelines for evidence-based nursing practice. During this time the nursing theories took an international approach with publications and conferences (George, 2011). Throughout the decades, the development of nursing science was influenced by other disciplines, such as religion, philosophy, psychology, anthropology, and social sciences. Religion blamed diseases as a punishment for sins. Philosophy knowledge base of truth, mind, language, and values, widely affected nursing development. Conceptual models in nursing are the examples of the influence of philosophy on the nursing. For example, Roger’s model explained the nature of the human beings (Burns Grove, 2007). Watson’s theory reflects philosophical beliefs of caring. Nursing ethics took its origins from the philosophy. Psychology as the study of mind and behavior was used by the nursing theorists. For example, Roy and Roberts (1981) created the theory of adaptation model by deriving it from the psychophysics theory of Helson (1964) (Walker Avant, 2011). Florence Nightingale ushered in a new era in nursing. Prior to her, there was no science behind the methods of caring. Nurses were associated with alcoholism, prostitution, and the waste of society. The mid-19th century saw the beginning of nursing schools. Florence Nightingale was credited with writing the first nursing theory, but since the 1950s nursing theories have proliferated. Nursing science and knowledge has flourished ushering in a new era in nursing, changing the status of nursing from a career to a profession. References Anderson, N. E. (1981). The Historical Development of American Nursing Education. Journal of Nursing Education, 20(1), 18 – 36. Burns, N. Grove, S. K. (2007). Understanding nursing research: Building an evidence-based practice (4th ed. ). St. Louis, Missouri: Saunders. George, J. B. (2011). Nursing theories: The base for professional nursing practice (6th ed. ). Boston, MA: Pearson Education, Inc. Walker, K. Holmes, C. A. (2008). The ‘order of things’: Tracing a history of the present through a re-reading of the past in nursing education. Contemporary Nurse, 30, 106 – 118. Walker, L. O. Avant, K. C. (2011). Strategies for theory construction in nursing (5th ed. ). Upper Saddle River, New Jersey: Pearson/Prentice Hall. How to cite Historical Development of Nursing Timeline, Papers

Thursday, December 5, 2019

Reliever Compounds In Multiple Bio fluids â€Myassignmenthelp.Com

Question: Discuss About The Reliever Compounds In Multiple Bio Fluids? Answer: Introduction Data and information are important for any business and it represent confidential details regarding the company. In Australia, the communication and energy sector are leads in having the most compromised systems; while, in terms of DDoS activity, the communication sectors and financial sectors are the highest (Australian Cyber Security Centre 2017). However, all the sectors in Australia are suffered from network security attacks and mining and resource sectors suffered from highest number of spam and malicious e-mails (Australian Cyber Security Centre., 2017). Image 1: Sectors with compromised systems in Australia (Source: Australian Cyber Security Centre, 2017) Moreover, the network security also illustrates the problem of cybercrime and procurement fraud that is also growing tremendously in Australia according to the PwCs 2016 Global Economic Crime Survey (Perlman et al., 2016). Image 2: Global Economic Crime Survey 2016 (Source: Global Economic Crime Survey 2016 2017) Kahate (2013) moreover stated that data security in network should be accomplished as there is always a threat from hackers to hack all the crucial details of the company and utilize the same for unethical purpose. Thus, every organization needs to develop network data security in order to prevent industry sabotage and espionage of the important data. In this business report, the concept of information/network security will be illustrated along with three recent demands of network security applications adopted by organizations. In addition to that, the pros and cons of these applications and a proposal for implementing these applications for the next five years will also be presented. Lastly, discussion on whether to adapt customizing off-the-shelf applications or developing products in-house for security maintenance services will also be given. Concept of information or network security In this era of technology almost every work is accomplished through computers, machines and technological innovations. Tankard (2012) also depicts that computers are also used for the purpose of information security and trust in systems apart from completing the work fast and accurately. The terms information security can be describes through three concepts- confidentiality, integrity and availability (Kahate, 2013). Image 3: Information Security (Source: Global Economic Crime Survey 2016 2017) Manshaei et al. (2013) describes that the attainment of control for accessing the information from one system is known as confidentiality. Moreover, the assurance of transformation of information and programs in authorized manner is termed as integrity; whereas, assurance that only authorized members have the accessibility of information and resources is known as availability (Schneider 2012). Many organizations also develop security policy for the purpose of protection responsibilities, information values and organizational commitment (Tankard, 2012). In recent times, the security comes with the solutions of cloud as there are huge data for each single entity (organization). Yu et al. (2012) highlighted that cloud technology not only allows storing significant number of data but it also provide the chance to manipulate the data easily without redundancy. Cloud Access Security Brokers is the recent technology that provides Service (SaaS) apps to offer visibility and control options (Gonzalez et al. 2012). Endpoint detection and response (EDR) solutions is also a new technology that allows detection of security breaches and respond quickly so that accurate solutions can be incorporated (Mell, 2012). EDR is also combined with Indicators of Compromise (IOC) which also used to identify the network breaches at the initial stage. Another technology that is based on detection and response paradigm is Intelligence-driven security operations centers (ISOCs) that use the context-aware components to offer an adaptive architecture (Yu et al., 2012). In addition to that, the Remote Browser is used for to protect the e-mails from malicious messages and attacks. Three information/network security applications currently in the market and their uses The three network security applications that can be used by an organization are- authentication application (Kerberos), Web Security Standards (SSL/TLS) and e-mail and IP security (Kahate, 2013). Authentication Application (Kerberos) The authentication application Kerberos, the database of the clients are protected through private keys and the users register their preferred secret keys with Kerberos. Schrittwieser et al. (2012) sated that this concept is closely related to the data encryption and the Kerberos shared a session key and then forwards it to the clients and servers for message encryption. The success of this application is Kerberos Version 5 (Stallings Brown, 2012). In this case, client requests for a ticket granting service from the application, which then transferred the ticket to the clients and encrypted the ticket by following clients secret key. The issued ticket is then used by the server in order to evaluate whether or not it is the same client to whom the ticket is issued. Perlman et al. (2016) highlight that the ticket is used as many times till it expires. The client presents the ticket to the server with clients name, timestamp and encrypted session key that are also referred as authentic ator. Web Security Standards (SSL/TLS)- Citrix NetScaler Solution Fahl et al. (2012) depicts that there are some risks and treats based on locations and type of attacks. The risk may arise in server or client network that is then known as system security and the risk may arise in terms of network traffic that is referred as web security. Additionally, there are two types of attacks- passive attacks and active attacks. (Hodges et al., 2012) describes that passive attacks illustrates the accessing the traffic between server and browser. This attacks also denotes the accessing the crucial data and information on a website. In addition to that, the active attacks also referred to the situation where one person impersonating another user, alters information on a website and altering message in traffic. In order to overcome this adversity the application that is used is Netscape that originates the Secure Socket Layer (SSL). Raza et al. (2014) highlighted that the SSL also evaluates the concept of connections and sessions. Perlman et al. (2016) stated th at SSL only offer data encryption between SSL and TLS enabled mail servers. Image: Message transfer by using Web Security Standards (Source: Perlman et al. (2016) A connection offers suitable types of services; whereas, the session is considered as association between the server and a client. This application offer secure communication over the internet and the major functions of this application are- client authentication, data encryption and data integrity checks. Wire Shark Wireshark is an application that is use to capture, filter and inspect packets. This application is also known as Ethereal. This application also protects the IP address of a website from malicious attacks and is compatible with all kind of operating system like Linux, macOS, BSD, Solaris, Microsoft Windows and Unix-like operating systems. The major functionality that this application performs are collecting data from live network connection or from a captured already-captured packet and also from different networks like IEEE 802.11, PPP, and loopback. This allows them to detect any discrepancies in the initial stages. The IP address and data display can be protected through display filters that detect intruder through their misconducts and safeguard companys website and business. Authentication Application (Kerberos) The prime advantage of this application is that it considered crucial details like clients name, timestamp and encrypted session key. This application also provides faster authentication as it uses a unique ticketing system and only the matched tickets will allow permits by the resource servers. The disadvantage is that the ticket can be used more than once till expiry. This allow hackers to access all the details if they jack the ticket before it expires. Web Security Standards (SSL/TLS)- Citrix NetScaler Solution The prime benefit is that all the organizations members can communicate securely with their own browsers. Another advantage that can be get from this kind of application is deep inspection of the technology and SSL-encrypted traffic through bi-directional parsing and analysis. Citrix NetScaler Solution provides protection for infrastructure and users and XML protection that allows the organization to detecting and blocking common application threats. owever, the disadvantage that is related to this approach is that if a member sends a message from unsecured (non-SSL) email systems, the message will no longer be a secured site and will not be protected by SSL. WireShark The prime advantage of Wireshark is that it provides security protocols to IP and DHCP for leading companies like AppleTalk and BitTorrent. Another advantage is that since this application is developed under an open source model it is easy to include new support tools along with their each updates. The disadvantage is that small organization or new online industry does not incorporate such advance security system due to lack of budget and thus, these applications are not suitable for such organization. Proposal how these applications can expand organization in the next five years The applications that have been mentioned will help in expanding of the business of the organization. The small companies should always focus on the information technology infrastructure. When the organization is generating revenue slowly they should have spent some amount of money on the infrastructure of the organization so that the information technology department can support the operation of the organization (Nguyen, Newby Macaulay, 2015). The relationship between information technology and operations is very important, as it constitutes the business model. When the business of an organization grows information technology infrastructure will have to be increased to make changes in the operations of the organization. Therefore, the organization will require sophisticated software requirements, which is more robust (Bollou, F. 2014). This will support the increase in the number of user applications in the system so the new sophisticated network system that will help in protecting the data and the user applications. In the coming years, the number of employees in the organization will increase and so will the business clients. These network tools will provide security to the organizational data and will help in managing multiple networks at a single time. During the expansion of the business, the transition of the business will be facilitated by the expansion of the network security applications. The amount of data that has been stored in the database of the organization will be huge so the organization will have to make that no data is lost during the transition of the data. This can be maintained by including the above-mentioned network tools which are necessary for keeping the various types of data in the organization safe and secure. This network security software is used by most of the multinational companies in the market and the organization while providing solution to their clients. Therefore, by using these software, the organization will be able to create a secure network for the clients which will help in improving their reputation in the market. When the organization is able to fulfill the needs, and wants of the organization then it will create opportunities to expand their business (Zhang Warner, 2017). The companies in the market will acknowledge the company as a viable option for providing them with solutions. Thus, by including the network security tools, the organization is able to enhance the quality of service they provide to the clients which will definitely be a positive step towards the expansion of business and acquisition of more clients. Whether the organization should focus on customizing off-the-shelf applications or develop products in-house to provide the ongoing security maintenance services to client organizations he needs of the various business organization vary depending upon their magnitude. The application required for the larger organization will be different from that of the small-scale organizations. Similarly, the application will depend on the industry and the operational process of the organization. The application sued for the manufacturing industry will be completely different from that of the retail industry. The companies in the market will making the applications on the basis of the business model of their respective organizations. The organization in todays world are trying to improve their business process using integration which may provide them with competitive advantage in the market (Jolly et al., 2015). The clients will have to identify the right software required for their organization so it is the duty of the vendor to provide the organization with a proper guidance which will help them to understand their requirements. This will help to identify the type of software w hich will be feasible for the operations in the organization. The off the shelf software have lower cost at an upfront level and contains a lot of features most of which is not required by the organization. This software includes support and can contain maintenance contracts. The upgrades of this software are available for free or at a lower cost than the other products (Morrow, 2016). Moreover, when it is used as software as a service the installation cost is even more low as it does not contain any hardware. The products that are made at an inhouse level will consist of the minimum requirements of the clients and other requirements can be added to the software according to the needs of the clients. This software is tailor made which consist of the exact need of the consumer and changes can be made in this system very easily. However, the initial cost of the setting up this software is high and all the extra requirements will be billable and will increase the overall cost of setting up the software. The in-house product is custom made and will consist of the additional cost as it is specific to the organization only (Sekowski Gibbons, 2016). However, the immediate needs and the long-term goals of the organization are two important aspect which has to be taken in to account as balancing both the aspect will be crucial for the clients. However, the organization will have to look in to the needs of the client to identify which type will be better for the client. There are some organization who may require a lot of features so in that scenario it is advisable to use the off the shelf products as the cost will be low and the delivery can be made at a faster rate. However, as most of the clients are of smaller magnitude and consist of small and medium scale industry then it will be best if they provide the organization with in house products. Thus, it can be concluded that in house product will be the best option for the organization as it will help them to provide a better quality of service (Kruger, Abu-Mahfouz Hancke, 201 5). Conclusion In this business report, it is concluded that the information security can be described through three concepts- confidentiality, integrity and availability. This security is necessary so that an organization can securely transmit their details and message with their employees. However, in recent times, hackers and IT intruders hacks all the authentications and access to the companys useful information. Such technologies for network security in recent times are Cloud Access Security Brokers, Endpoint detection and response (EDR), Indicators of Compromise (IOC) and Intelligence-driven security operations centers (ISOCs). However, in this buiness report the three application that is taken into consideration are- Authentication Application (Kerberos), Web Security Standards (SSL/TLS)- Citrix NetScaler Solution and Wire Shark. In addition to that, it is also concluded that all these application uses unique tools not only for securing the website from hackers but these application also determines discrepancies in the initial stages. Moreover, all the small business organizations or entities need IT process to support their business approaches. Thus, implementing these tools will helps all the organizations especially the inline business as all their business processes will be accomplished through online services and websites. This will provide the enterprises the opportunity to grow. Recommendation Thus, it is recommended that the organization should make use of the network security software to expand the business of the organization. The organization will have to provide in house software as a means of solution to their clients which will help them in providing better service than before. Reference List Australian Cyber Security Centre. (2017). Australian Cyber Security Centre. [online] Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2016. [Accessed 19 Sep. 2017]. Bollou, F. (2014). ICT infrastructure expansion in sub-Saharan Africa: An analysis of six West African countries from 1995 to 2002. InAdvances in Research Methods for Information Systems Research(pp. 151-164). Springer US. Fahl, S., Harbach, M., Muders, T., Baumgrtner, L., Freisleben, B., Smith, M. (2012, October). Why Eve and Mallory love Android: An analysis of Android SSL (in) security. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 50-61). ACM. Global Economic Crime Survey 2016. (2017). Global Economic Crime Survey 2016. [online] Available at: https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html [Accessed 19 Sep. 2017]. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Nslund, M., Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 11. Hodges, J., Jackson, C., Barth, A. (2012). Http strict transport security (hsts) (No. RFC 6797). Jolly, R., Ahmed, K. B. R., Zwickl, C., Watson, I., Gombar, V. (2015). An evaluation of in-house and off-the-shelf in silico models: implications on guidance for mutagenicity assessment.Regulatory Toxicology and Pharmacology,71(3), 388-397. Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education. Kruger, C. P., Abu-Mahfouz, A. M., Hancke, G. P. (2015, March). Rapid prototyping of a wireless sensor network gateway for the internet of things using off-the-shelf components. InIndustrial Technology (ICIT), 2015 IEEE International Conference on(pp. 1926-1931). IEEE. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. Mell, P. (2012). What's special about cloud security?. IT Professional, 14(4), 6-8. Morrow, K. J. (2016). Upstream Tools Hasten Product Development. Nguyen, T. H., Newby, M., Macaulay, M. J. (2015). Information technology adoption in small business: Confirmation of a proposed framework.Journal of Small Business Management,53(1), 207-227. Perlman, R., Kaufman, C., Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India. Perlman, R., Kaufman, C., Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India. Raza, S., Duquennoy, S., Hglund, J., Roedig, U., Voigt, T. (2014). Secure communication for the Internet of Thingsa comparison of link?layer security and IPsec for 6LoWPAN. Security and Communication Networks, 7(12), 2654-2668. Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14-20. Schrittwieser, S., Frhwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., Weippl, E. R. (2012, February). Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. In NDSS. Sekowski, J., Gibbons, J. (2016).Evaluation of US Commercial-Off-the-Shelf Hand-Held Assays to Detect Opiate Pain Reliever Compounds in Multiple Biofluids. ECBC Aberdeen Proving Ground United States. Stallings, W., Brown, L. (2012). Computer security. Principles and practice (2 nd ed). Edinburgh Gate: Pearson education limited. Tankard, C. (2012). Big data security. Network security, 2012(7), 5-8. Yu, H., Powell, N., Stembridge, D., Yuan, X. (2012, March). Cloud computing and security challenges. In Proceedings of the 50th Annual Southeast Regional Conference (pp. 298-302). ACM. Zhang, X., Warner, M. E. (2017). Business retention and expansion and business clustersA comprehensive approach to community development.Community Development,48(2),