Monday, December 30, 2019

The Matter Of Foreign Aid - 1721 Words

The matter of foreign aid is complicated. Through our own policies, the policies of international organizations, and assorted agreements with numerous countries, our role in foreign aid has continued to change over the decades to meet the growing needs of the developing and developed worlds. While we try to aid the developing world to the extent of our capabilities, there are several elements to consider – some of which in the past have often been neglected. When providing aid to countries in need, we fund programs through both Official Development Assistance, hereafter referred to as ODA, and through the financial support of private donors. We rely heavily on partnerships with non-governmental organizations, NGOs, to execute many of our funded programs in other countries, as well as our own agencies such as the Peace Corps. This brief will further explain the general reasoning for and operations of foreign aid, as well as provide you with some past practices of foreign aid wh ich will serve as models of what to do, or in some instances, what not to do, in the future. Foreign aid has not been a formal element of our budget for too long; in fact it’s only been policy and budgeted for just over half a century. This is not to say prior to the 1940s there was no international aid-type involvement; it was just in other conventions and for other purposes. For example, there was humanitarian relief in some European countries, private investment in French and British colonies, andShow MoreRelatedAfghanistan Is A Developing Country1468 Words   |  6 Pagesacademies. They are International Monetary Funds, Asian Development Banks and World Banks. The topic effect of war and peace on the foreign aid and will include foreign aid provided to Afghanistan along with the uses of foreign aid by the administration of the country as well as foreign aid and poverty in Afghanistan. Foreign aid to Afghanistan Afghanistan is utilizing foreign aid since its independence because the country was extremely poor at that time (Blanchard, 2009). There were neither reserves norRead MoreForeign Aid Essay620 Words   |  3 PagesForeign Aid Foreign Aid, charity, development assistance†¦whatever you call it, it has become a global activity. The assistance is delivered by various means: government-to-government, pooled multilaterally or channeled Read MoreThe Effect of War and Peace on Foreign Aid Essay1520 Words   |  7 PagesThe Effect of War and Peace on Foreign Aid Dr. Toi Dennis Elaine Stewart SOC 300: Sociology of Developing Countries May 4, 2014 Introduction Afghanistan is a developing country; the country faced many difficulties soon after its independence. They faced difficulties in the development of their constitution and regulations. The selection of a leader was an issue and the first major task was to prepare a military for theRead MoreDeveloping Countries Supporting Afghanistan As A Developing Country1442 Words   |  6 Pagesacademies. They are International Monetary Funds, Asian Development Banks and World Banks. The topic effect of war and peace on the foreign aid and will include foreign aid provided to Afghanistan along with the uses of foreign aid by the administration of the country as well as foreign aid and poverty in Afghanistan. Foreign aid to Afghanistan Afghanistan is utilizing foreign aid since its independence because the country was extremely poor at that time. There were neither reserves nor military; thereRead MoreForeign Assistance For Foreign Aid1523 Words   |  7 PagesAlthough foreign aid has been going on for hundreds of years, it still remains a controversial topic. Many people have debated whether or not it actually either helps or harms nations. Foreign aid can help undeveloped states by providing education and health care. However, a drawback to foreign aid is that it can cause countries to become dependent and lead to corruption. Foreign aid is effective when countries don t try to use foreign aid for their own benefit and when coordination and accountabilityRead MoreAustralia Essay1193 Words   |  5 Pageskey national interest of Australia is the economy. Australia’s capital, jobs, standards of living, technological innovations and social advances rely substantially on exports and commodity values within S outheast Asia and the Pacific (Department of Foreign Affairs and Trade 2016a). The stability of South East Asia and the Oceania enables prevention against illegal activities and supports social cohesion for Australia nationally and internationally. It is also the basis for prosperity and is a resourcefulRead MoreAdvantages and Disadvantages Giving Aid1521 Words   |  7 Pagesto (Andrew Page, 2005) Foreign Aid or Official Development Assistance (ODA) is a transfer of resources on concessional terms which are undertaken by official agencies. Mostly, the countries that receive foreign aid are usually developing countries. Poverty is the main focus of giving the foreign aid. This situation always happened to many countries due to the conditions where the people live and from that it will show the quality of living is poor among the people. Foreign aid is given to poor countriesRead MoreThe U.s. National Debt1129 Words   |  5 Pageshas changed a lot since the 1830’s, the meth ods used during that period can no longer be the solution in 2015 because there are just too many factors that must be considered. The size and the population of the country have changed dramatically, foreign relationships are far more complicated and broader, and people’s expectations of the government are different. The three largest budget items include Medicare/Medicaid, Social Security, and defense (1). It is hard to reduce any of them without protestsRead MoreFederal Budget Deficit1343 Words   |  6 Pagesrun instead of the potential losses that immediately followed. Many skeptics challenge the reasoning for investing so much money into helping so many other countries when that money could instead help us improve internal affairs. After all, foreign aid spending has increased to $50 billion a year today, which could be put towards funding education to ensure that more kids go to college and possibly affecting the innovation of the future(Morris). Giving more than you receive is nice, but when itRead MoreA Brief Note On The Country Of Ghana1570 Words   |  7 Pageswith poor fiscal policies that have placed the government into deep debt and caused extensive depreciation of their currency. Other economic issues that Ghana faces due to large amounts of foreign aid are inflation and Dutch disease. Their Central Bank has been unable to efficiently regulate the flow for aid to the country, which results in uncontrolled inflation. Dutch disease has been an issue for them due to the market for oil that began expanding in 2010. Their poor infrastruc ture and the

Saturday, December 21, 2019

Friedman vs Freeman - 1925 Words

This paper will have a detailed discussion on the shareholder theory of Milton Friedman and the stakeholder theory of Edward Freeman. Friedman argued that â€Å"neo-classical economic theory suggests that the purpose of the organisations is to make profits in their accountability to themselves and their shareholders and that only by doing so can business contribute to wealth for itself and society at large†. On the other hand, the theory of stakeholder suggests that the managers of an organisation do not only have the duty towards the firm’s shareholders; rather towards the individuals and constituencies who contribute to the company’s wealth, capacity and activities. These individuals or constituencies can be the shareholders, employees,†¦show more content†¦Consequently, the model of stakeholder by Edward Freeman has broadly considered as the strongest theory regarding responsibilities of a company towards society where the company is located (Freeman 2008 pp. 162-165). Nevertheless, Friedman pointed out that the profits has taken the firms in to the hand of business intellectuals by which Friedman recommend that the financial system by which the organisation run its business is in the restricted responsibility protection which makes the organisations to privatise their profits (Friedman 1970 pp. 177-184). Friedman also suggested that according to him the shareholder theory in terms of socially responsible can only increase the profit. But on the other hand shareholder theory of Edward Freeman completely support the theory of shareholder towards its role to be socially responsible in the society and maximising the profits for the benefits of shareholders within the firms and society as well (Freeman 2008 pp. 162-165). According to Cosans (2009 pp. 391-399) with the taking of limited liability (restricted responsibility) Friedman must have taken the business in a way to be socially affiliated and well-established as well which also leads and supports the ethical and logical roots of CSR and for the re-establishment of the reliability toShow MoreRelatedFreeman vs. Friedman1866 Words   |  8 PagesFreeman vs. Friedman In their theories of how a business should operate, R. Edward Freeman and Milton Friedman hold virtually opposite beliefs as to what businesses’ responsibilities should be. In favor of the Stakeholder theory, Freeman believes that any person or organization that has a â€Å"stake† in the business should also play a role of participation in the business’s actions and decisions. In the other corner of the ring stands Milton Friedman, who holds the belief that said business is onlyRead MoreEssay on Friedman vs Freeman827 Words   |  4 Pagesâ€Å"Stakeholder† theory of management, two different views about the purpose and aims of a business. Milton Friedman’s shareholder theory of management says that the purpose of a business is to make money for the owner or the stockholders of the business. Friedman says that there is only one social responsibility for the business: to use its resources in order to increase its profits as long as the business stats within the rules that are assigned, as for example to compete in free competition and withoutRead MoreAssignment Sheet : An Assignment Cover Sheet1395 Words   |  6 Pagesanywhere around the world. It’s also known that a virtual setting is more favorable to an office setting. The virtual setting also benefits a company financially as they don’t have to spend money on physical locations and transportation. (Virtual Teams vs Traditional Teams., n.d.) There is also a sense of comfort for the employees as with a virtual setting. the employees are allowed to work from home and get away from the traditional office setting. The virtual setting is overall re warding as it setsRead MoreThe First Level Of The Pyramid1491 Words   |  6 PagesLimitations of the Pyramid Shareholders vs. Stakeholders Approach One of the key objectives of business has been to create profit for shareholders, but as CSR became more widespread it has been supported that companies have responsibility to stakeholders, which lead changes in many companies’ approach to conduct business. The two prevailing approaches are the shareholder and stakeholder approach, which are going to be examined below. Shareholder Approach In 1970 Friedman wrote the much-cited article inRead More Corporate Social Responsibility Essay2477 Words   |  10 Pagesinvestigate some of the classical theories of CSR and its contribution to profit maximisation. Finally, some specific arguments that state that the introduction of social responsibility is not a good idea and how it has failed to create the ?good society? (Friedman 1970: 122-126) will be discussed. Corporate social responsibility has undergone a definitional evolution over the past half century but has always and will always remain an essential part of business language. Definitions of CSR have became moreRead MoreCorporate Social Responsibility2536 Words   |  11 Pagesinvestigate some of the classical theories of CSR and its contribution to profit maximisation. Finally, some specific arguments that state that the introduction of social responsibility is not a good idea and how it has failed to create the ‘good society (Friedman 1970: 122-126) will be discussed. Corporate social responsibility has undergone a definitional evolution over the past half century but has always and will always remain an essential part of business language. Definitions of CSR have became moreRead MoreManagerial Stakeholder Theory - Essay2991 Words   |  12 Pagesresponsibilities of the companies (Crane amp; Ruebottom 2011). This is how the concept of solicited corporate social disclosure comes into existence. Due to this confusion around disclosure principles we have a big area of research. According to Freeman the definition of Stakeholder is â€Å"any group or individual who can affect or is affected by the achievement of the organization.† Shareholders also come under stakeholders group as they are the important part of the organization. Shareholders are alsoRead MoreCompeting Models Of Corporate Governance1398 Words   |  6 Pagesshareholder method offers stronger protection for investors and shareholder democracy. [Solommon,2007] http://www.todayscience.org/JBM/article/jbm.v1i1p52.pdf http://leg.u-bourgogne.fr/wp/1041202.pdf http://sloanreview.mit.edu/article/the-shareholders-vs-stakeholders-debate/ Corporate governance theories There are various types of corporate governance theories. For the purpose of this discussion several theories have been reviewed. Agency theory Corporate governance has reviewedRead MoreThe High Demand Of Internet2847 Words   |  12 Pagesby business which focus only on maximizing shareholder wealth. Friedman (1970) strongly argues about maximizing the financial return for shareholder. However stakeholder theory is theory that saying managers have a moral obligation to balance and consider the interests of all stakeholders, the individuals that the actions and results of an organization will being affected by or will give effect to are called as stakeholders (Freeman, 1984). Stakeholder theory actually showing that stakeholders areRead More2074 Final Notes Essay6510 Words   |  27 Pagesa person’s life is valuable only inasmuch as it is a source of happiness. / You are not important to a utilitarian, only the happiness you experience is significant. John Locke-Second Treatise of Human Government Locke on Friedman: Locke does not believe Friedman is correct when he states the market is self regulating. / Without government intervention, there will be too much inequality in the market. / We need the government to redistribute the wealth. Natural Rights: Property, life, liberty

Friday, December 13, 2019

Save the Earth Free Essays

Driving a car is the most air polluting act an average citizen commits. Air pollution is not a good idea for a variety of reasons, large and small. The right ideas for remediation of environmental degradations involve unselfish and compassionate behavior, a scarce commodity. We will write a custom essay sample on Save the Earth or any similar topic only for you Order Now The right ideas involve long-term planning, conservation and a deep commitment to preserving the natural world. Without a healthy natural environment, there will be few or no healthy humans. To understand air pollution you can consider a simple schematic that divides a big problem into components. 1. Local effects -e. g. poisoning humans breathing bad air. 2. Regional effects – fallout from airborne pathogens – infections, particles, chemicals. 3. Global effects – changing interactions between the atmosphere and sun, weather effects, effects on plants and oceans. Developments in the media made â€Å"green† the slogan for action to limit the adverse effects of air pollution. The media often suggested that this is a relatively new consensus that there is an environmental crisis. They excused people who have ignored the effect of greenhouse gases on climates over the past 40 years. Some know what is really going on out there, but most people do not know or know but deny the obvious for selfish reasons. Green refers to the color of chlorophyll in plants. Chlorophyll is the basis of photosynthesis that allows plants to turn the sun’s energy into life energy. Human action destroys plants and replaces healthy ecosystems with concrete and asphalt. Another slogan that emerged was â€Å"save planet earth. † Humans will not save the planet. The task for humans is to stop destroying the environments that sustain us. If we fail, the planet will do just fine without us. How to cite Save the Earth, Essay examples Save The Earth Free Essays With all the talk about going green, it seems much easier to let the cards fall where they may. What’s easier? Just throwing all the trash into one can, or sorting it into separate cans? As hard as it could be to clear the mess that this and past generations have left, it would be severely healthier than the alternative. Plutonium is a dangerous toxin that is released from nuclear power plants. We will write a custom essay sample on Save The Earth or any similar topic only for you Order Now â€Å"Plutonium, which has the half-life of only 0. 5 million years, but is so toxic that if distributed evenly ten pounds of it could kill every person on Earth.† (Saukko Par 1) The United States produces tons of these dangerous toxins each year. â€Å"Because the United States generates about 18 pounds of plutonium per year, it is the best substance for long term poisoning the Earth. † (Saukko Par 1) It would be best if one of the many alternatives were used verses nuclear power plants. â€Å"It would help if we would build more nuclear power plants because each one generates only 500 pounds of plutonium each year. † (Saukko Par 1) One of the most dangerous things to do to the Earth is injecting toxins, and in the United States it’s done frequently. â€Å"Deep well injection involves drilling a hole that is a few thousand feet deep and injecting toxic substances at extremely high pressure so they will penetrate deep into the Earth. † (Saukko Par 2) This is called fracking and is used to bring fossil fuels to the surface. â€Å"According to the Environmental Protection Agency (EPA) there are about 360 such deep injection wells in the United States. † (Saukko Par 2) Not only is there deep well injections, there are also shallow well injections which effect the surface and ground water. â€Å"We cannot forget the groundwater aquifers that are closer to the surface. These must also be contaminated. This is easily done by shallow well injection, which operates on the same principle as deep well injection, only closer to the surface. † (Saukko Par 2) This is just as bad for the environment, if not worse. â€Å"The groundwater that has been injected with toxins will spread contamination beneath the Earth. The EPA estimates that there are approximately 500,000 shallow injection wells in the United States. † (Saukko Par 2) Burying or dumping toxins is the most popular method in poisoning the Earth, and anyone can do it. â€Å"The toxins from landfills, dumps and lagoons slowly seep into the Earth, guaranteeing that contamination will last a long time. † (Saukko Par 3) Most citizens of the United States use a garbage disposal company, and most of them take the trash to the dump. Dumping is done with almost every Americans garbage, and dumps lead to water like lakes or rivers. â€Å"Because the EPA estimates there are only 50,000 of these dumps in the United States, they should be located in areas where they will leak to the surrounding ground and surface water.† (Saukko Par 3) Citizens whom are too lazy or cannot afford garbage service are likely to dump into a lake or a body of water. â€Å"Lakes are good for long-term storage of pollutants while they release some of their contamination to rivers. † (Saukko Par 5) If the world could care more about Mother Nature than the next get-rich-quick scheme, maybe the Earth would have a longer chance of survival. Alternatives could be used, but used but are not because people are concerned with money, and themselves. How to cite Save The Earth, Papers

Thursday, December 5, 2019

Network Intrusion Detection on Poractive Mechanism

Question: Discuss about the Network Intrusion Detection on Poractive Mechanism. Answer: Introduction: Before a detailed discussion about the issue of social engineering on the context of cyber security is done, it is very important to understand what social engineering connotes. It is a skill of manoeuvring individuals in such a manner that they end up compromising upon the private and secret information they possess. The kind of data that these hackers try to take out of the people is different and circumstantial. Generally these criminals are trying to ploy to get hold of passwords and bank account details or get an access to the system so as to inject malware and thus get a hold over ones system. Therefore criminals and attackers usually take recourse into social engineering methods as they find it easy to take advantage of the trust people entrust on a person. The biggest problem that can be understood is the blind trust that a person puts upon another thereby ending up disclosing such information which are highly confidential in nature ((Kumar et.al. 2015). Thus without knowing the background of a person thoroughly, if a person is being trusted then there are high chances of facing vulnerable consequences. There are various ways and means through which social engineering attacks in context to cyber security are being made. First and one of the easiest ways is by sending emails. If the attacker gets hold of an email password of a person, then he can get an access to the entire contact list as well and many a times a way to even hack the bank accounts as well. Thus once the hacker has a particular email id under his control then he may end up sending mails from that id to the people stored in the contact list containing such malicious software or illegitimate data such as asking for donation for a charitable trust(Conteh Schmick 2016). The attacker may send a link to the contact list people and they trusting the fact that it has come from their friend, may end up opening the same which would lead to giving access to the criminal to the other persons system as well. Second technique is known as phishing wherein the attacker usually sends mails, comments or such text messages that seem to have been sent via a lawful and trustworthy source. Such messages may contain information about any incident, or requesting for help or even making a person feel that he has won a lottery (Rader, Rahman, 2013). These two are the most common ways of attacking the peoples trust. There are various ways corroborated to deal with such social engineering cyber attacks. One of the most common is education and awareness. People should be educated and trained from time to time not to disclose their confidential data to anyone but only for themselves. Further data should not be shared via messenger or chats or phone calls to person they do not know or whose activities create suspicion in our minds. If any mail is being received from a person who is unknown, such mails should be immediately deleted or if it has come from a known source but seems to be unusual evsoftware. en then the same should not be clicked as it may be a malware attack. One should not click on links which mentions incorrect spellings or is not from the official website of the companies. Further to his one of the recent techniques adopted by various companies to deal with the issue of baiting is blocking of insertion of USB devices as baiting is known to be the digital equivalent of an online Trojan Horse wherein the criminals prompt illegal messages luring the users to plug in their USB devices and in turn hack the system (Perlman 2014). Lastly, the future of data hacking is so strong and detrimental that a twin authentication factoring is a must so as to make it very difficult for the attackers to become a part of the organizations IT system. Prior to understanding the meaning and schemes of symmetric and asymmetric encryption it is crucial to know the meaning of encryption. The said term is being used since ancient times for security purposes during war times. It basically is a procedure of encoding messages so as to fool the other parties. Thus in terms of information system it is rightly said to be a method of converting normal text data into such a form with the help of varying algorithms so that it is not understandable by any layman. Thus it is a methodology basically used for safeguarding confidential data from being stolen or mishandled (Rouse, 2013). There are two ways of encryption i..e symmetric and asymmetric. The former method of encryption is an easy and a faster one wherein a common key is used for both encryption as well as decryption of information. The said key can be any numeric value, alphanumeric or a word which is used to alter the text of the message being sent in a specific manner. But since the sender and receiver of message are aware of the key they can easily decode the message. However the biggest drawback of the said method encryption is the fact that the key has to be exchanged between the two parties in a secret manner so that the same is not leaked (Bisht Singh, 2015). However an asymmetric method of encryption offers two different keys for encoding and decoding messages. A public key is used for encoding the text message whereas a private key is used for decoding the same at the other end. Thus unlike the symmetric cryptography, the said method is slow due to heavy computational load. The most widely used symmetric keys are DES,3DES, AES and RC4 and asymmetric keys ar e Diffie-Hellman and RSA. Due to the same, the symmetric method is used for transmitting huge volumes of information whereas the asymmetric methodology is applied for interchanging confidential keys (Higashi, 2013). The main strong point for using asymmetric method of encryption is that it has the potential to sustain a safe channel above the unsafe mode such as the internet. The same happens by sharing only the public keys which used only for encryption and the private keys used for decryption is not exchanged thus ensuring greater amount of safety in comparison to the symmetric mode of cryptography. However both methods can be attacked by criminals. Brute-force attack is one of the most common method of attacking and braking through a symmetric encryption system wherein all the possible combinations are tried using a trial and error method. Therefore to ensure that such an attack is prevented successfully, the key size should be adequately long thus presently the AES algorithm of 256- bit key is found to be one of the most secured amongst all. When it comes to attacking a symmetric cryptosystem, the most successful way to intervene into a RSA system is through the method of factoring of RSAs p ublic module which is a huge number string. Presently, for implementing a RSA system, 2048 bit key is said to be the most secured and more highly confidential data such as national security information, a 4096 bit key is said to be the safest although very expensive (Triparthi, Agarwal, 2014). Thus on comparing the two systems it can be construed that although both the methods are safe yet have their own usability and hence depending on the usage, the choice of cryptography should be made else it would turn out to be very expensive. Importance of the security of the network cannot be under estimated as presently this is the most crucial requirement. Various techniques have been used for ensuring that the data is being kept in safe and secure manner. One of the most talked about method is the Network Intrusion Detection System (NIDS). Various algorithms and techniques have been found out and developed which can discover and fight against the various security threats. However, NIDS has been the most success amongst many. A NIDSs main goal is to sense the potential invasions into the system such as through any unlawful acts or via viruses thus signalling the required people about such a mishap (Zuech et.al. 2015). It keeps vigilance over the data packets being exchanged via a particular network thus keeping a track of the suspicious data being sent. A bigger NIDS can be installed on the links of the backbone network so as to keep a check on all exchanges happening and also it can be setup on the centralised or the mains server which would scan all the data, find out any malicious acts and thus ensure data reliability is maintained (Kumar, 2007). However, the current trends show some issues in the NIDS. One of the major limitations is the problem of raising alarms when not needed. Many a times it raises an alarm for such traffic which is not harmful to the system. However the NIDS can be reconfigured so as to deal with the said problem to some extent but not in totality. Further to this, in order to keep a record of the TCP/IP connection, the main network must ensure to keep a track of all single TCP/IP envelopes (Lohiya et.al. 2015). But there may be a situation when a particular TCP envelop gets reordered or mingled wherein the receiver end may have to reorder the entire packet with the help of a packet sequence number. In such a case attacks such as tear drop try to confuse the procedure of reassembling the stream by forming a cushion spread out with the help of malicious packets or envelops. Unfortunately the main packet does not look any different from an ordinary one so much the system fails to find out the said attack. The current issues related to NIDS has made it a compulsion for the increased interference of the human communication for effective operations. Although NIDS has the potential of connecting the various attacks on various machines in a particular network system but at the same time it lacks in determination of the main procedures which is happening on the main system (Sharma Kaur 2014). Thus the said report highlighted in a very brief and crisp manner what a NIDS is and the current issues. Yet it would be incorrect to say that NIDS has no future since it offers an array of methods to protect the system from various vulnerabilities. However the successful futures without much glitches lies in the fact that the said system of detection should be standardised. References: Kumar,S. (2007). Survey of Current Network Intrusion Detection Techniques. Retrieved from https://www.cse.wustl.edu/~jain/cse571-07/ftp/ids/ Lohiya,R. Varma,P. Patel,Y. (2015). Current Trends in Network Intrusion Detection Techniques. International Journal of Computer Sciences Communication Networks. 5(2). 72-78 Sharma,M. Kaur,T. (2014). A Study on Network Intrusion Detection Based on Poractive Mechanism. International Journal of Emerging Research in Management Technology. 3(1). 9-15 Zuech,R. Khoshgoftaar,T.M. Wald,R. (2015). Intrusion detection ad Big Heterogeneous Data: a Survey. Journal of Big Data. 2(3). Retrieved from https://journalofbigdata.springeropen.com/articles/10.1186/s40537-015-0013-4 Bisht,N. Singh,S. (2015). A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms. International Journal of Innovative Research in Science Engineering and Technology. 4(3). 1028-1031 Higashi,M. (2013). Symmetric vs Asymmetric Encryption Which Is Best?. Retrieved from https://www.ciphercloud.com/blog/cloud-information-protection-symmetric-vs-asymmetric-encryption/ Rouse,M. (2013). Encryption. Retrieved from https://searchsecurity.techtarget.com/definition/encryption Triparthi,R. Agarwal,S. (2014). Comparative Study of Symmetric and Asymmetric Cryptography Techniques. International Journal of Advance Foundation and Research in Computer. 1(6). 68-76 Conteh,N.Y. Schmick, P.J. (2016). Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research. 6(23). 31-38 Kumar,A., Chaudhary,M. Kumar, N. (2015). Social Engineering Threats And Awareness : A Survey. European Journal of Advances in Engineering and Technology. 2(11). 15-19 Perlman,M. (2014). 8 Tips to Prevent Social Engineering Attacks. Retrieved from https://lightcyber.com/8-tips-to-prevent-social-engineering-attacks/ Rader, M.A. Rahman, S.M. (2013). Exploring Historical And Emerging Phishing Techniques And Mitigating The Associated Security Risks. International Journal of Network Security Its Application. 5(4). 23-41