Featured Post

The films Rush Hour and Rush Hour 2 Essay Example | Topics and Well Written Essays - 2500 words

The movies Rush Hour and Rush Hour 2 - Essay Example Busy time †The Scene When Carter and Lee Meet just because The principal sce...

Tuesday, December 24, 2019

The Greatest Literary Emblem of the Middle Ages Essay

In order to study the troubadours, it is of high importance to understand the context in which they flourished and developed, which was the Medieval Era. The Middle Ages is the period of European history that goes from the collapse of the Roman civilization to the beginning of the Renaissance, and it extends from about 500 to 1500 ca. (â€Å"Middle Ages†). This period is called the â€Å"Dark Ages† since it is regarded by the Renaissance scholars as a long interval of superstition, ignorance, barbarism, and social oppression due to the fact that the Medieval era was a fight to establish a new society independent from the Roman standards and philosophy. However, it is now acknowledged that it was a dynamic period, in which Europe built a new†¦show more content†¦Moreover, troubadours were medieval poet-musicians from southern France that flourished approximately from the late eleventh century to the early thirteenth century according to Jelena O. Krstovic, auth or of the Classical and Medieval Literature Criticism (â€Å"Troubadours†). Additionally, according to Saul Maloff, former literature professor of the University of Michigan and recipient of the George Polk Memorial Award for Literary Criticism of Long Island University (1967), troubadours were medieval knights and poets who dedicated their life to the unconditional service and caring of a lady, who most of the times represented an unattainable love. In addition, troubadours were believed to be stubborn and sometimes even errant knights who were always on a quest (â€Å"Troubadour of Free Enterprise†). The first important aspects of the troubadours are their unique poetry and lyrics. From the beginning, the main principle of the troubadours was the quest for auto representation through their readings and creations, where they represent different characters such as poets, lovers, knights, bourgeois, and others, according to Valerie Fasseur, MedievalShow MoreRelatedVicto rian Novel9605 Words   |  39 PagesThe idea of â€Å"manners† does sum up the social climate of middle-class England in the nineteenth century. However, if there is one transcending aspect to Victorian England life and society, that aspect is change. Nearly every institution of society was affected by rapid and unforeseeable changes.  As some writers greeted them with fear and others embraced the progress, this essay will guide a reader through an important era in English literary history and introduce with the voices that influenced itsRead MoreEssay on Western Movies Since 19602820 Words   |  12 Pagesgreat theme all through the 1960s. Five films from the 1961–63 period are of particular note. The first was a highly literary Western, The Misfits (1961), written for the screen by Arthur Miller from a short story by the same title. Typical of things to come, The Misfits played off the integrity of the old-time cowboy against the confusion, hysteria, and corrup tion of the industrial age. The wild mustang ponies, now greatly reduced in number and used for the manufacture of dog food, poignantly symbolizedRead MoreEighteenth Century English Literature5838 Words   |  24 Pagesking was dethroned and beheaded and England was proclaimed a republic. Though very soon monarchy was restored, the position of the bourgeoisie had changed. The 18th century saw Great Britain rapidly growing into a capitalist country. It was an age of intensive industrial development. New mills and manufactures appeared one after another. Small towns grew into large cities. The industrial revolution began: new machinery was invented that turned Britain into the first capitalist power of the worldRead MoreHistory of Theatre Lesson Notes Essay5401 Words   |  22 Pagesthe 5th century as evidence is inconclusive. Limited amount of machinery available for special effects-crane, ekkyklema and machine, stage properties-altars in middle, not much furniture except couches. Auditorium and skene separate architectural units. Explain the relationship between Greek cultural life and the theatre during the Golden age: Dramatic festivals-greeks honored their gods through one or more annual festivals, four annual ones in honor of Dionysus during winter months, City Dionysus-commemoratedRead MoreR.K.Narayan and Swami and Friends7399 Words   |  30 PagesDrill for whole week and gets into the shoes of TATE. Alas! The doc fools him and Swami iscaned for being absent !!! Swami runs away from there and disappears from Malgudi. He runs v far that he is completely lost. At night he finds himself in middle of a forest and wonders where he has landed! Soon a villager finds him sleeping there and takes him to the District Forest Officer. In this confusion and daze, Swami unfortunately misses the historic match and MCC loses to YMU. Swami feels ashamedRead MoreMy Phone Thesis16066 Words   |  65 Pagespublic or trade circles, in particular as regards the geographical origin of the goods or services concerned or their nature or characteristics; †¢ be identical with, or an imitation of or contain as an element, an armorial bearing, flag or other emblem, a name or abbreviation or initials of the name of, or official sign or hallmark adopted by, any State, intergovernmental organisation or organisation created by an international convention, unless authorised by the competent authority of that StateRead MoreLangston Hughes Research Paper25309 Words   |  102 Pageskidnap her and sell her as a slave. Her first husband, Lewis Leary, was killed in 1859 at Harpers Ferry, West Virginia, during John Browns raid on the federal arsenal. Throughout Mary Langstons life, she treasured Lewiss bullet-riddled shawl, an emblem of his martyrdom. She often covered young Langston with it as he slept on her daybed. Mary Langstons first husband, Lewis Leary, had participated in John Browns raid against the U.S. arsenal at Harpers Ferry. (Library of Congress) In 1869Read MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesits volume and in its temporal concentration. Less than 3 million Europeans went to the New World during more than three centuries of colonial rule (1492 to the 1820s), while more than 55 million did so during the eight decades that spanned the middle of the nineteenth century and the Great Depression of 1930.2 More immigrants entered the United States in a single year (1.3 million in 1907) than had done so in the 170 years between the English settlement of Jamestown in 1607 and the country’sRead MoreA Picatrix Miscellany52019 Words   |  209 Pagesconstellations of a different kind, favorable to the manufacture of talismans. Some of the talismans are described, but no indication is given of how to make them effective, a subject which later occupies a large part of the book (pp.2434). Inserted in the middle of the discussion is an account of the different effects of the various aspects (p.29). There follow remarks on the dependence of the talismans on the heavenly bodies and the importance of the magician’s concentration of his energy towards his purposeRead MoreRastafarian79520 Words   |  319 Pagesqualities and exceptional powers (qualities and powers not accessible to ordinary persons), which predestine them to lead others.30 This is charismatic authority, and it is characteristic of leaders who do not attain their positions on the bases of age-old traditions or by procedures rationally arrived at and legally instituted, but on the basis of their claims to special powers, inspiration, or revelations. In periods of relative stability, the transfer of power from one individual to another takes

Monday, December 16, 2019

How is a feeling of suspense created in the station scene, from the film ‘The Untouchables’ Free Essays

string(124) " of Ness making it more real for them as if they were there, therefore raising the suspense as they feel part of the scene\." In this essay I will analyze the railway scene in the film ‘The Untouchables’. I will mainly concentrate on the creation of suspense; I will be looking at the three things that directors use to create different types of atmosphere. These three things are camera angles and movement, the use of sound and lighting and to what extent they contribute. We will write a custom essay sample on How is a feeling of suspense created in the station scene, from the film ‘The Untouchables’ or any similar topic only for you Order Now This scene is supposed to be a tense ending to the violence, the final shoot out to try and get Al Capone put in prison. The audience would probably be quite confused and wondering who is who and why each thing is happening. This confusion adds to the tension. The scene (and film) is set in Chicago during the 1930’s. In the 1930’s America was under prohibition, prohibition meant that it was illegal to sell, make or transport alcohol. Although this rule was made there was still a lot of money to be made with alcohol through bootlegging. Bootlegging was illegally selling alcohol, almost everyone knew about bootlegging and where to buy alcohol. Obviously the alcohol was sold at a higher price then it would be usually, much much higher, this meant that the consumer still had to spend a lot of money for it, which detracted from the original point of prohibition which was to stop people spending money on alcohol as the countries economy was collapsing as shares were worth nothing. In Chicago during this time, not unlike other cities around America there were many rival gangs, which ran Chicago, the most important gang leader was Al Capone. He was the richest man for miles and reportedly earned i170,000,000 a year! Which in those days especially was astronomical. He is the gangster that Elliot Ness a federal agent, George Stone a trainee policeman, James Malone a veteran policeman, and Oscar Wallace an accountant, are out to stop. By the time of this scene, only Ness And Stone are left living and have vowed to catch Al Capone. But they cannot prove anything about him that would send him to jail although he is a known gangster, there is nothing concrete until they found out that he hadn’t been paying his income taxes and his bookkeeper could prove it. His bookkeeper was about to be taken away by train maybe incase he was bribed or threatened and put Capone in trouble. Ness And Stone’s last chance to catch Capone is to get the bookkeeper, alive. First I am going to go through the main narrative points of the scene: Ness and Stone enter the station; Ness takes his place on the upper floor, where he can see the entrance at eye level, and the stairs and some of the platform below him. Stone goes round the corner to cover a place where Ness instructs him. A lot of people enter the station; there are a few suspicious looking people that could be a gangster who is part of Al Capone’s gang or the bookkeeper himself. Ness keeps an eye on all of them. A woman is coming up from the platform but is struggling with her cases and the pram. She cant get them up the stairs easily, Ness keeps looking between her and the possible suspects, eventually he leaves his vantage point and goes down the stairs to help the woman. All the suspects by now have been cleared off suspicion by (for example) going off with their wives or not staying on the platform. Ness pulls the pram up the stairs, the woman thanks him continuously, while he pulls the pram up Ness looks out for gangsters. Ness has had his eye on some people who may be gangsters, as he reaches the top of the stairs he looks behind him and sees a man he recognizes, the man has a broken nose that is strapped up. Ness pulls a shotgun out of his jacket and shoots the man – killing him. The pram gets knocked by Ness and starts to roll down the stairs. Other men who are standing on the stairs reach into their jackets and pull out guns, Ness shoots another in the shoulder, and kills another, one gangster shoots up at him from the bottom of stairs and takes cover behind a pillar. The pram continues to fall down the stairs; the man who got shot in the shoulder shoots wildly and hits the pram. Two Sailors run up the stairs form the platform and get shot as they run in front of the pram. Stone comes running across the bottom of the stairs, throws Ness a new gun as Ness’s had run out of bullets, kills the man behind the pillar slides across the floor, stops the pram falling and aims his gun at the last remaining gangster (the one who got shot in the shoulder) who is holding his gun against the bookkeeper’s head. Ness demands that the gangster lets the bookkeeper go and no one gets hurt. The gangster who is very agitated shouts that him and the bookkeeper are leaving and if anyone moves he will shoot the bookkeeper and then they have nothing against Capone. The bookkeeper nervously says he will tell them all they want to know. There is more arguing until Ness signals to Stone and Stone shoots the gangster in the head, the gangster slumps to the floor and the bookkeeper scared witless remains unharmed. I am now going to talk about the use of different camera angles and camera movement and how they are used and why. The most commonly used camera angle was a high angle shot. The majority of these would have been Ness’s view from the overhang looking down on the stairs and the platform. This angle would have been by the director, Brian De Palma used to draw the audience into the position of Ness making it more real for them as if they were there, therefore raising the suspense as they feel part of the scene. You read "How is a feeling of suspense created in the station scene, from the film ‘The Untouchables’" in category "Papers" However a lot of low angle shots are also used, many of these are looking up at Ness, this may the audience think there is someone possibly a gangster looking up at Ness from below this would also raise suspense. The angle would also have been used to show Ness’s facial expressions and where he is looking. Occasionally there were close ups of Ness to really show his facial expressions and bring the audience as close as possible to him and how he is feeling, this would add the suspense as again they feel attached to the scene like they are there. These camera angles from Ness’s perspective and looking at him happen while he is standing on the overhang when he moves down the stairs to help the baby and then gets involved in the shootout, there are different camera angles focusing on him although there are more close ups after he leaves the overhang. While Ness helps the woman with the pram most of the camera angles are low ones looking up at him as he climbs the stairs and some down at him and past him to show what he is doing and what is going on below him on the platform. The high angle shots that look down at him and past him are most effective at creating suspense because they show Ness’s nervousness and at any moment a gangster could appear below him while he is unaware. While the shootout is happening there are various Close up shots. This is to show the expressions of the combatants and how they are being affected by the shootout. This is very tense as there is a lot of anxiousness and fear on the faces of everyone as they are fighting for their lives. This is particularly the case when there is a close up of the woman diving to save her baby from falling down the stairs as you can see all of her face close up and you can se the fear written on it even though there is no sound at that point. There are also a lot of long shots and two shots to display the action and what is going on at eye level so it is straight in front of you, this makes you as the audience feel very involved in the action as your eye level is with the action you are not looking down on or up at it, as it is in front of your face, and as the action is very dangerous it adds greatly to the suspense in the scene. At the start of the scene the clock was repeatedly shown, this repetitive image added to the suspense greatly as it showed clearly that time is running out for Ness as months of work depend on the next few moments. As the clock is repeatedly shown this fact is driven into us, raising suspense as we wait to see if Ness will get his man in time. Next I will look at lighting and what areas are lit and why. The scene is set quite late at night at 10 O Clock, so the lighting would be artificial from the lights in the station which the director would have strategically shone them in different areas for different reasons, which I will talk about now. Very light areas of the scene were the stairs and the entryway, this is because the majority of the action happened there and it was the focus of where Ness was looking at. The platform area is also quite well lit, as it is another area Ness was constantly looking for gangsters in. Dark areas of the scene were Stone was as not much happened there and he was meant to be hidden from sight. The prams was very well lit during the scene as it is meant to signify innocence and the pram protecting the baby, giving it safety, and in the dark things are generally more uneasy and unsafe especially for young children so the light is to signify it is protected. Sometimes the camera swung/panned around the scene for example in the shootout, this gave us as the audience a chance to survey what is going on from and move as if we are moving in the scene to look what is going on, like if we cant quite see something we would move to see it, the camera moving us gives us that feeling. As we feel like we are there yet again this creates more suspense for us as an audience. Next I am going to talk about sound, and how dialogue. Sound effects, ambient sound and non-digetic sounds are used and why they are used. First I will explain what each sound is: Dialogue – Words spoken on screen by characters. Dialogue is used to develop characters, the plot and display natural communication. Sound effects – Non-verbal sounds from an action. Sound effects are used to reinforce an action and too add realism. For example if someone closed a door and you couldn’t hear it close, it would sound fake, and ruin the effect. Ambient sounds – realistic background sound, which may not be on screen. Ambient sounds are also used to reinforce realism for example if the scene is in a field and no wind is heard, or birds calling it would seem fake, similar to sound effects but the effect may not be on screen, e. g. a bird calling, the bird may not be on screen. Non-digetic sounds – Not part of the scene. Non digetic sounds are things like music or voice overs, they are used to create or reinforce a mood or can intensify a situation, for example eerie music could be used in a haunted house, getting eerier as things get tenser. This reinforces the atmosphere being created off screen. All the different four sound types are used in the scene. The most commonly used sound was non-digetic. Almost throughout the scene there was music playing. It changed as the scene changed, for example at the end of the scene just after the final gangster was killed there were piano and violins playing together, they played in such a way that a mysterious feeling was given. Then when we realized the gangster was dead and the bookkeeper survived the tense music ended with a long note, which eased the tension. This is a prime example of music (non digetic sound) enforcing the atmosphere that is created on stage. Another widely used ambient sound was the tannoy announcer; altogether he spoke 4 times in the space of a few minutes. He was announcing that the train would be leaving in a few minutes, all board and last call, this also drummed into us as the audience that time was running out therefore creating suspense – similarly to the clock. Sound effects were not used to much important in my view they were just used to reinforce actions like the footsteps on the stairs. However when the pram was going up the steps it made a very loud crashing sound, louder then it would naturally, this created suspense. Ambient sounds similarly to sound effects only were occasionally used to reinforce the fact the scene is in a train station, with the odd sound adding to the realism, like the train steaming out of the train off camera occasionally, this added to the suspense as it made the scene more realistic and made us as the audience feel as if we were there. There wasn’t much dialogue in the scene; most of it was just basic the only important dialogue was at the very end between ness, the gangster and the bookkeeper when they were arguing over the fate of the bookkeeper. This was very important as the gangster and Ness were trying to play mind games with each other through words. Words are the clearest form of communication and in this instance, you could obviously see through the expression in the voices that Ness was in control and the gangster was wavering and unsure what to do, and in the end was killed. This added to the suspense as the camera angles were close to them and the speech was loud as if we as the audience were there and witnessing it. In conclusion I would say that the factor that contributed most to the suspense was the sound as it was the clearest factor of all, and is the most blatant. For example if there is music playing that is of a tense nature it is obvious something tense is going on and it adds to the tension. When the pram like music was playing it added to the realism, as there was a pram there. It also gave the audience a false sense of security, as it is nice happy carefree music in a sinister important ten minutes in Chicago. It also it spookily scary, as when the pram is stopped from crashing by stone the music starts up and there are lots of dead bodies and blood everywhere and a fierce confrontation between Ness and the gangster is about to start and the music starts to play. Camera angles added to the tension and suspense more then the lighting, though it was more subtle then the sound as only when you reflect on the scene in depth like I have done you realize it has done anything, during the scene you don’t even realize what the camera angles are doing. There is only a certain amount of suspense that you can create with a camera angle as just because you are looking at something in a certain way it doesn’t mean something will happen. Lighting was the least important factor as the entire scene had to be quite lit as it is a well it area in a train station, and just because something is in shadow doesn’t mean it is hidden and secretive. Again it is a more subtle use of suspense and one that I think doesn’t add to the suspense much if at all. Generally I would say that suspense was created very well using lighting, sound and camera angles. It could perhaps been improved by a greater use of lighting to display shadows and hidden areas, though it would have been hard to do so in a station. How to cite How is a feeling of suspense created in the station scene, from the film ‘The Untouchables’, Papers

Sunday, December 8, 2019

Challenges In Cyber Security For Business Managing Security

Question: Discuss about theChallenges In Cyber Security For Businessfor Managing Security. Answer: Establishes Research Territory The territory that has been chosen for the research is Australia. This is mainly because the digital age has been recognized as central to the Australias national security and economic prosperity. Starting from terrorism to the organized crime to espionage, the malicious cyber activity has been observed to be a growing and ever changing threat to national security in Australia (Mailguard, 2017). Moreover, with the passage of time the organizations in Australia experiencing cyber crime are continuously rising. This is evident from the report published by PWC that puts forward the fact that the total number of cyber security incidents has risen to 42.8 million in the year 2014 i.e. there has been increase by 48% since the year 2013 (PwC, 2015). Moreover, it has also been estimated by PWC that there are around 71% of incidents of cyber crime in Australia that goes undetected where large organizations have been observed to be reporting for increased detection of cyber crime incidents. As per the report published by PWC in the year 2015, it can be said that the number of detected cyber security incidents that have taken place in Australia has been the highest in comparison to the cyber security incidents across the globe in the last 12 months (PwC, 2015). Where there has been an increase of 38.5% increase in the cyber incidents globally, there has been an increase of 109% in the cyber crimeincidents in Australia.So, these figures motivated the researcher in conduct the research in context to challenges in cyber security for businesses in Australia. Establishes Significance of Territory Cyber crime in the recent times has emerged as a major issue for the business organizations in Australia. Moreover, even though the total cost of the cyber crime incidents on the business organizations in Australia is difficult to estimate, the annual cost average across the benchmark organizations was observed to be roughly around $A4.9 billion every year (ABC News, 2015). Business disruption is considered as the most expensive consequence of the cyber crime incidents and it is also followed by the loss of information and loss of revenue. Thus, the rise in the cyber crimeincidents across Australian business organizations has emerged as a major area of concern for both the private sector organizations and Australian government. Moreover, it has been observed that the Australian industry is being persistently targeted by a wide range of malicious cyber activities that risks not only the profitability of the business organizations but also risks their reputation and competitiveness. The spectrum of the malicious cyber activities tend to range from online vandalism and cybercrime to the theft of commercially sensitive intellectual property and negotiation strategies (ASCC, 2016). Thus, it can be said that with increasing and continuing theft of the intellectual property from the business organizations in Australia tends to pose challenges to the future competitiveness of the economy of Australia. So, in particular it can be said that the cyber espionage tends to impede the competitive advantage of Australia in profitable and exclusive areas of the research and development that includes the intellectual property that is generated within the Australian universities, private and public research firms and the gove rnment sectors that proves to be beneficial and advantageous for the foreign competitors (AIIA, 2015). On the other hand it has also been observed that the ability and the willingness on the part of the private sector organizations in Australia for recognizing the extent of the threat of the cyber crimeand thereby implementing the strategies to mitigate the risks tend to vary across and within the sectors(defence, 2015). Thus, taking into consideration the above aspects in context to the increasing cyber crime incidents, selection of Australia for the research would provide scope to the researcher to collect the facts and issues that are faced by the business organizations in Australia due to these cyber crime incidents. Establishes Research Niche In context to the research conducted on the Australian territory regarding the cyber incidents, the research has been narrowed down to Australian Universities. This is because; Australian Universities tend to rely heavilyupon Information systemsfor theiroperations and business that includeteaching, their administration, research and learning (the Guardian, 2015). The Universities are characterized with a combination of financial and personal details together with confidential data like the medical records of the students and commercially desirable research that makes these universities obvious targets for the cyber attacks(Hemphillet al.,2012). The virtual assailants tend to range from information thieves to identity thieves to the disgruntled students and theuniversity IT system is once hacked; it can lead to vulnerability of financial losses.It may damage reputationof the universities. Moreover,it has been observed that even though the vice chancellors of the universities are very much aware of the value of the intellectual property they hold, they do not take the issue of cyber security seriously always and this is the major concern where the incidents of cyber crimehas been increasing at a rapid pace. The relevance of the research can be considered to be of significant value to the university sector since fewer researches have been conducted in this area about how the cyber crime incidents tend to make a significant impact on the business operations of the universities. Much of the studies conducted in context to the challenges of cyber security have been conducted in context to the business organizations that include sectors like energy sector, defence sector and others and the university sector has remained an untouched area of research. So, the attempt towards conducting the research in context to the challenges in cyber security in the university sector would prove to be beneficial in gaining an enhanced understanding of the knowledge on security managementsystems in Australian Universities. This would also prove to be beneficial in moving aheadtowardsplacing security at a level where the Australian Universities would be analysed and made aware of the security as an increasing ly prominent theme in their business. The research studies focusing mainly upon the information security management in Australian universities have been observed to have gained little academic focus despite the increasing reliance of the sector on information and effectiveness of the information protection through the security practices. So, this motivated the researcher to undertake the study. Motivates Next Part of Literature Review The studies conducted by May Lane, (2006) put forward the fact that the increasing importance of information in the modern societies aim at defining the feature of the present day world. Thus, on the basis of the prominence of information in the present day society, it can be said individuals live in a new information society i.e. a society where information tends to dominate the needs of the social organizations. Moreover,it has been proposed by Whitman Mattord, (2011) that social order in the contemporary society is dependent upon the accurate and predictable information structures and boundaries in cyber space demandan integral relationship between the structure of the organization and their information foundations. Thus, it is observed that there exist a connection between the increased reliance on the electronic systems and the associated information and so this necessitates enhanced information security management for the protection of the information systems against increasin g threats and risks in form of cyber crime. On the basis of the above aspects, it can be said that universities at present are highly dependent upon the information for providing support to its core activities and business operations. It can be said that there is dependency of the activities which are associated with using, creating and sharing information for the basic core activities of the universities that include teaching, learning and research functions.Thus, it becomes important for the universities to secure their information and in this context; the universities like the other organizations have adopted information systems and technologies to sustain their competitiveness within the industry. It has been pointed out by Dhillon Torkzadeh, (2006) that effective operational control and strategic direction in the present day business environment are directly linked to the effective management of the information of high quality. So, the Universities like the other business organizations in the information age have observe d the importance of acknowledging the information security for protecting their business as well as their research information. This acknowledgement on the part of the Universities can be considered to be underpinned by the recognition of the strategic information resource and as a valuable asset. So, since the information is treated as a valuable asset, it requires appropriate protection and this can be achieved by adopting appropriate and effective information security control mechanisms for ensuring the availability, confidentiality and integrity of information. Again, even though the concept of adopting and appropriate and effective information security control mechanism is easy to state, the practical implementation ofthe activities that are associated with the security of the information processes in the Universities is not easy and straightforward(Wood, 2006). So, with increased awareness among the management about the necessity of information security, it can be said that it is important for the universities to appoint Information Security Officers, Coordinators or Program Managers. Moreover,it has been observed that even though there has been high recognition for the need for information security, the funding level is not proportionate to meet the acknowledged need for security. So responsibility of information security should be the responsibility of the entire organization as a whole that leads to the emergence of number of difficulties. The difficulties include lack of commitment on the part of the senior management, lack of authori tative source of guidance and understanding problems and thus lack of knowing exactly the extent of security that is required (Luker And Petersen, 2008). Again, it might also happen that the risk analysis might not be sufficient enough for uncovering all the required necessary information and demonstrating the security compliance with the external as well as internal auditors can also prove to be difficult without any adequate and proper representation of the information security. Thus, emphasizing upon the challenges faced by the universities, it can be said that the challenges tend to extend well beyond the technical diversity. The need for high effective information security tend to coexist as well as the balance with the more traditional university cultural values that include the academic freedom and efficient work practice merge with the modern goals of the Universities. Kotulic and Clark, (2006) has observed to have been advocating these type of challenges by identifying the need to not only attend to the complexities of the different components of the IT systems but also successfully integrating the components within the strategies of the business organizations. The essential goals of the information security therefore extend towards enabling the functions of business in the Universities. If the universities are characterized with effective information security systems than it proves to be beneficial in ensuring proper high quality information infrastructure service and technologies that not only supports but also complements the organizational goals.The increase in the demand of information security demands from its practitioners to integrate enhanced understanding the issues ofbusiness, make an effective use of the interpersonal skills and adapt a solid understanding of the role of the information technology in the process of enhancing the information security as stated by Lane and May, (2006). Effective management of information security demands the universities to adopt an approach that is mostly best suited to the organization and also it demands enhanced understanding of security of information fits on the basis of the culture and the structure of the organization. So, this is the aspect that differentiates the need for information security among the business or ganizations and among the universities. As per the studies conducted by May, (2007), it can be said that information security has been progressively viewed upon as an important business functions that requires effective management from the perspective of the business. Moreover, technology in itself is a major control that is applied by the business organizations for mitigating the security risks posed towards the valuable information and so the most important aspect that can lead to business success is the effective management of the security and incorporating the process as a business function. Lane And May, (2006) in this context proposed the fact that the application of technology is considered to be most effective when it is applied in perfect alignment with the business goals and so it can be said that for effective security, there needs to be effective management. Thus, it can be said that the need for effective information security management is based upon an effective combination of factors like the fact that there has been an increased dependency of the universities upon the electronic information and increasing events and incidents that pose threat and risk to the information that is considered as a value asset at present among the business organizations and especially the universities. Moreover, the need is also stimulated by the need to mitigate the risks posed towards information security. Further Justifies the Need to Investigate the Impact of Social Influence on Memory As per the studies conducted by Abraham Chengalur-Smith, (2010), it has been observed that cyber criminals strive towards taking full advantage of the secrecy, anonymity and interconnectedness that is facilitated by the internet and attacking the foundations of the modern information society. Cyber crimes involve cyber bullying, computer viruses, botnets, cyber stalking, cyber terrorism, denial of service attacks, hacktivism, malware, identity theft and spam. The increased incidents of cyber crime have kept the law enforcement officials struggling to maintain pace with the cyber criminals who cost billions annual to the global economy. Various attempts have been made by the police for making an effective use of the same tools that are used by the cyber criminals to perpetrate the crimes for preventing the crimes and bringing the guilty parties to the justice. Moreover, the dichotomy of the social reliance on information is very much evident from the fact that there are some components of the society that inadvertently fail in stabilising of deliberately increase the efforts of destabilising the information on which the society is dependentWall, (2007). These incidents can occur through malicious actions that are taken by the hackers and cyber criminals and system user errors. So, these results in the compromise of the factors likeavailability, confidentiality and integrity of the information. So, it can be said that the in order to maintain continuity in the present day organizations, it is important on the part of the business organizations to preserve the information that is treated as a valuable asset and this can be achieved through adopting the process of implementing effective information security management systems. References ABC News. (2015).Cyber attacks on Australian businesses rose 20pc last year. [online] Available at: https://www.abc.net.au/news/2015-04-23/cyber-attacks-on-australian-businesses-rise-20-per-cent/6415026 [Accessed 26 Apr. 2017]. Abraham, S., Chengalur-Smith, I. (2010). An overview of social engineering malware: Trends, tactics, and implications.Technology in Society,32(3), 183-196. AIIA. (2015).Review of Australian Government Cyber Security Strategy: AIIA Response. [online] Available at: https://www.aiia.com.au/documents/policy-submissions/policies-and-submissions/2015/150417_AA_Cyber_Security_Submission_Final.pdf [Accessed 26 Apr. 2017]. ASCC.(2016).Australian Cyber Security Centre. [online] Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2016.pdf [Accessed 26 Apr. 2017]. defence. (2015).Cyber Security: Time for an integrated whole-of-nation approach in Australia. [online] Available at: https://www.defence.gov.au/ADC/Publications/IndoPac/150327%20Brookes%20IPS%20paper%20-%20cyber%20(PDF%20final).pdf [Accessed 26 Apr. 2017]. Dhillon, G., Torkzadeh, G. (2006).Value?focused assessment of information system security in organizations.Information Systems Journal,16(3), 293-314. Hemphill, S. A., Kotevski, A., Tollit, M., Smith, R., Herrenkohl, T. I., Toumbourou, J. W., Catalano, R. F. (2012).Longitudinal predictors of cyber and traditional bullying perpetration in Australian secondary school students.Journal of Adolescent Health,51(1), 59-65. Kotulic, A. and Clark, J., (2006), Why There Arent More Information Security Research Studies, Information and Management, No. 41, pp. 597-607 Lane T. And May L., (2006) Information Security Management in Australian Universities, 5th Asia Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), pp. 36.7.1-36.7.17 Luker, M. And Petersen, R., (2008), Computer Network Security in Higher Education, San Francisco, Jossey-Bass. Mailguard. (2017).Study: Only 1% of Aus companies very confident about cyber resilience. [online] Available at: https://www.mailguard.com.au/blog/study-only-1-of-aus-companies-very-confident [Accessed 26 Apr. 2017]. May, C., (2007), Dynamic Corporate Culture Lies at the Heart of Effective Security Strategy, Computer Fraud and Security, Issues 5, pp. 10-13 May, L., Lane, T. (2006).A model for improving e-security in Australian universities.JTAER,1(2), 90-96. ponemon. (2012).The Impact of Cybercrime on Business. [online] Available at: https://www.ponemon.org/local/upload/file/Impact_of_Cybercrime_on_Business_FINAL.pdf [Accessed 26 Apr. 2017]. PwC. (2015).Australia Tops Asian Region for Cyber Security Risks: Report. [online] Available at: https://www.pwc.com.au/press-room/2015/cyber-security-risks-oct15.html [Accessed 26 Apr. 2017]. the Guardian. (2015).Universities need to plug into threat of cyber-attacks. [online] Available at: https://www.theguardian.com/education/2015/mar/31/universities-cyber-attacks-research-criminals [Accessed 26 Apr. 2017]. Wall, D. (2007).Cybercrime: The transformation of crime in the information age(Vol. 4). Polity. Whitman, M. E., Mattord, H. J. (2011).Principles of information security.Cengage Learning. Wood, C. (2006) An Unappreciated Reason Why Information Security Policies Fail.Computer Fraud and Security.Vol: 200, Issue: 10, pp. 13-14.