Saturday, December 28, 2019

Character Analysis in The Glass Menangerie Essays

People live their lives often with a false sense of reality. We do this to ourselves most often though what we are taught is right and what’s normal while we are growing up, or just simply lying to ourselves to make scene of our discontent or to fulfill an obligation to a loved one. â€Å"Some people walk through a hallway with covered mirrors– the hallway is lined with mirrors but there are blankets covering each of them. They go through life believing in an image of themselves that isnt real, and an image of themselves standing in the world and relative to the world, that isnt real. {C. JoyBell}. This quote I found during the coarse of my research can almost sum up my thoughts of the charters in the story. In the story the Glass Menagerie†¦show more content†¦Ã¢â‚¬Å"in crossing that space between life and letters, two characters, Mr. Winfield and Tom, have been reassembled in such a way as to keep from view a constituent trait o their personality†(Debu sscher 58) These fights only get worse and worse with the sister Laura often caught in the middle. But one of Toms secrets that he confides to Jim is that he plans to take a play from hid dads play book and leave his mother and sister behind â€Å"Stifled by his family, Tom drinks. Then, following the example set by his father, he plans to join the merchant navy. He wants to see adventure and gain experience, so that he can write†(Topham). Next we have the mother Amanda â€Å"we meet the mother, Amanda, who still seems caught up in her life as a former Southern belle†(Brown), she wants nothing more than any other parent and that is for her children to grow up better then she did. Her younger days seemed to be filled with rays of sunshine and hope about her future life â€Å"lost in her memories or perhaps even fictional memories of a better youth†(Corbett 1) , she recalls story time after time about how many â€Å"gentleman callers† she had when she was younger all of whom had wealth and excitement that she could have had at the drop of a hat. Instead she choose the father of her children who we only know from memory and a picture on the wall â€Å"the picture hangs on the back wall of the family room; it is initially pointed out by Tom the Narrator†(145) that left the

Friday, December 20, 2019

Leadership And Governance Essay - 2671 Words

Leadership And Governance Introduction Like love, death, money, politics, and war, the subject of leadership is one that is continuously under discussion. Yet, despite all the attention given to leadership and its recognized importance, leadership still remains pretty much of an unexplained and confusing concept. There are innumerable theories that explain various facets of the leadership phenomena but unfortunately there is no comprehensive and general theory of leadership, which can make our overall task of understanding leadership easy and simple. One of the best ways in which we can enhance our understanding of leadership is to see how various students of the subject have defined†¦show more content†¦However a closer examination of the following definitions of leadership will reveal that there is a growing awareness that in leadership influence or persuasion which leads to willing or motivated goal achievement behavior is the key concept. Leadership researchers have defined leadership in the following different ways:  · The creative and directive force of morale (Munson 1981).  · The process by which an agent induces a subordinate to behave in a desired manner (Bennis 1959).  · The presence of a particular influence relationship between two or more persons (Hollander Julian 1969).  · Directing and coordinating the work of group members (Fielder 1967).  · An interpersonal relation in which others comply because they want to, not because they have to (Hogan et al. 1994).  · Transforming followers, creating visions of the goals that may be attained, and articulating for the followers the ways to attain those goals (Tichy Devanna 1986). Regardless of the definitions used, leadership must have a worthwhile purpose. Without a specific goal, leadership can degrade into an exercise in self-enrichment rather than mission accomplishment. For example, you should not aspire to be an executive vice president for the large salary. Rather, you should aspire for high office in order to accomplish specific goals for the improvement of theShow MoreRelatedLeadership and Governance3973 Words   |  16 PagesReflective Journal: Leadership and Governance Introduction Reflective practice is a highly significant way to develop the skills of students (Pavlovich, Collins, Jones, 2007). Because it has value and can help students to focus on the issues they see in governance and leadership, it is a practice that should be undertaken by all students working toward a better understanding of management. In order to properly work within the confines of reflective practice, most students write a number ofRead MoreLeadership and Governance Essay2547 Words   |  11 PagesThe leader’s role in effective governance of organisations Assignment 1 Report by : Jorge Andres Cuellar Student Id : S0224193 Subject : LEADERSHIP GOVERNANCE Course Code : MGMT20152 Tutor: Grace Phan-Athiroj Central Queensland University Sydney January 2012 Since last decade there are major interest in executive directors’ role to achieve a high status and be recognized into organisations, universities and other entities. Nowadays, words as leadership, quality, and management haveRead MoreLeadership And Clinical Governance Assessment1608 Words   |  7 PagesHNN320: Leadership and Clinical Governance Assessment Task 1 In the healthcare setting the registered nurse (RN) is required to assume a leadership position, the RN needs exhibit numerous leadership skills to effectively lead within a healthcare team. This paper will reflect upon and critically discuss the leadership role of the RN in ensuring quality and safe patient care, with ideas drawn from the Dr Lucy Cuddihy interviews (2015). Effective communication is an essential leadership skill thatRead MoreOrganizational Governance And Leadership ( Mgmt20131 )1925 Words   |  8 Pages Organizational governance and leadership (MGMT20131) Name of the student: Muda Bhargav Kumar Student ID: s0283016 â€Æ' The following paper is mostly focused on the self-assessment of my organizational governance and leadership ability in keeping with development of integrated budget and planning system. The entire assessment includes the reflective practice of the leadership skills, research skills, analysis ability as well as problem solving skills in the practical context. The assessment paperRead MoreInfluence of the Leadership and Governance of a Healthcare Organization710 Words   |  3 PagesHow does the leadership and governance of a health care organization influence the development and implementation of risk-management and quality-management policies? Risk Management A companys risk management strategy is largely governed by the degree to which company leadership emphasizes its importance. This denotes that organizational governance must prioritize risk-reduction as a leading operational imperative. Leadership should be directly involved in making difficult decisions that willRead MoreThe Impact of Organization Leadership on Organization Governance2650 Words   |  11 Pagesthrough involvement of good leadership. According to Uju (2013), leadership is the vision creation concerning a defined future state that seeks to entangle all organizational setting membership, with an influence that is necessary to the achievement of organization objectives. Leadership is defined as a process in which an individual influences others to attain an objective and guides the organization in a manner that makes it more coherent and cohesive. Corporate governance on the other hand refersRead MoreTypes Of Leadership Governance Of The Non Profit Organization1876 Words   |  8 Pages1. Please define three types of leadership governance of the non-profit organization There are three different types of leadership governance of the non-profit organization. Type 1 is fiduciary. The fiduciary type of governance strives to reduce organization waste, it’s goal is to be faithful to the mission, works towards using its resources most efficiency and effectively; to achieve this purpose, staff members are held accountable for their actions. It is this type that also questions if the organization’sRead MoreWhat Are Poor Governance And Corrupt Leadership Affect The Development Of The Countries1844 Words   |  8 Pagesmethods of maintain their position. Africa’s leadership is often times viewed as corrupted, autocratic and failing by the rest of the world due to the bad governance. How does this bad governance and unaccountable leadership affect the development of the countries in Africa and what impact does it have on the everyday individual trying to survive? 2 What is poor governance? Governance is the process of making and implementing decision. Poor governance is that of a government or State implementingRead MoreEffective Risk Management Signal Virtue Based Leadership997 Words   |  4 PagesJournal Article #3 The third journal article reviewed was Can Effective Risk management Signal Virtue-Based Leadership? The abstract discusses how it is believed the effectiveness of risk management is centered on leadership virtue and governance. In addition, the abstract discusses how risk management is a continuous process. There are numerous risks occurring every day that threaten the welfare of the world and government. The government faces these risks on a daily basis, whether it is socialRead MoreTransparency in Corporate Governance1507 Words   |  7 PagesRunning head: TRANSPARENCY IN CORPIRATE GOVERNANCE McBride Financial Services - Transparency in Corporate Governance University of Phoenix May 4, 2009 Transparency is imperative with respect to corporate governance due to the crucial nature of reporting financial information to maintaining investor and consumer confidence. The lack of devotion to corporate governance policies will send the message that the company is unbalanced and the leadership is not incorporating the highest level of integrity

Thursday, December 12, 2019

Corporate Governance Regulations

Question: In light of recent share market volatility and problems with disclosure of corporate debt by listed entities, do corporate governance framworks need to be revised and strengthend? Answer: Introduction In this report, its discussed about the corporate governance of Australia, the core principles of the corporate governance, and most important the corner stones of the corporate governance. For understanding this completely, first we need to understand the stock market volatility and disclosure of the corporate debt. To verify whether the corporate governance rules are appropriate for the current volatility of the stock market and the problems relate to the disclosure of the debts. Thus, for that, first it is important to understand the current corporate governance practices. The approach related to the corporate governance practices are also important. Corporate governance Corporate governance is actually a systematic process by which the corporate sector and the companies of corporate sector are directed and controlled. These processes help in generating the wealth and capacity of the company. Large corporations provide the employment opportunities to various people. The corporate governance process should ensure that the companies work in the legal way and proper manner according to the aspirations of the stakeholders and expectation of the society. Core Principles of Corporate governance The core principles of corporate governance are as follows: 1. Management of every company should have the freedom for executives to run their enterprise for growth but for effective accountability, the freedom of management should be framed in limitations so that the legal exercises should be managed properly. 2. The management of any company should be empowered from the corporate governance. It should also balance and check the activities related to the management of the companies. The main principle of the corporate governance is to create a balance between company and the stakeholder and help in managing a legal and strong relationship. This also ensures that the management of the company is not misusing its powers. Thus, the principles of the corporate governance include the creation of legal values between company and its stakeholders. Corner Stones of Corporate governance The cornerstones of the corporate governance are as follows: Trusteeship Large organisations have various purposes like social and economic. Any organization is a group of various people. Stakeholders, employees and other capital providers are the main group of people but the responsibility of the trusteeship generally lies on the board of directors of the company. Board of members have the responsibility to enhance the value of shareholders and protect them from any discrepancy. Transparency The companys activities and policies should be clear to all those who are related to the company. Therefore, the transparency includes disclosing of all the data and activities which is necessary without considering the companys strategic interest. The relationship of company and employee is actually an internal transparency of the company. Transparency helps in managing and enhancing the accountability. This also helps to strengthen the relationship between the company and other entities of the company. Empowerment and Accountability According to the empowerment, the management must be free to run their enterprise forward. Empowerment actually helps in using the actual potential of employees according to their interest and objective. Empowerment creates the opportunity of innovation and helps to enhance the creativity within the organization. This helps the organization to use their decision making power up to the required level according to the need of the organization. Accountability should be a property of the members of board of directors in an organization for the shareholders. When both the empowerment and accountability mix together then it will create various opportunities for the organization to grow even in this competitive market. Control Control is the core principle of corporate governance. According to the principle of control, the freedom of management should be framed in certain limitations for the purpose of checking and balancing various activities. The misuse of powers can be prevented by the control. This also helps in managing the response change, timely. It also ensures that the management of the business risk is performing effectively and pre- emptily. Ethical Corporate Citizenship According to the Ethical corporate citizenship, corporates have the responsibility to create and manage the ethical behaviour for the company. These ethical behaviour should be imposed on both internal and external relationships (Daily Rackoning, 2014). Stock Market Volatility Stock market volatility defines the fluctuation of the stock market. When in one day the stock market goes up and another day it goes down, this process of going up and down of the stock market is volatility. Stock market volatility depends on various factors. The corporate governance law also affects the volatility of the stock market. The various factors of corporate governance laws help in managing and controlling the volatility of stock. In terms of stock market volatility, the corporate governance laws manages the legal issues related to corporate sector. The management of the company is free to take decision but they need to consider the overall growth of the company rather than personal profit. The decision should also consider the legal issues related to the motive of the decision. Thus, the corporate governance law helps the organization in making a right decision for the growth of the company by not allowing the management to misuse their powers. Thus, it also affects the stock value of the companies (ISSAI, 2014). Thus, corporate governance laws affect the stock market volatility by preserving the legal rights for the stake holders of the organisation by preventing the misuse of the powers by the board of members in the company. Disclosure of corporate debt by listed entities It is very important to gain the knowledge of corporate debts by stakeholders of the organizations as these help the stakeholders to gain the overall knowledge about the organization. These also help in reducing the risk for the stakeholders by various means but it is also important to get a proper corporate debt report from the company. Without a proper and clear report, the stakeholders may not be able to identify the situation of the organization very well. Thus, there may be following problems in disclosure of the corporate debt. 1. The corporate debts disclosed by the company should be clear and should have all the details. 2. The details of the boards, experience of board, committees included in the decision making of various processes. Policies and the processes should be mentioned clearly and fully by the management of the organization. 3. The summary statement from the company should also be included into the debt report of the organization. This report should also include the statement from the company that they are following the corporate government laws specified by the ASX (ICAE, 2013). Current corporate governance Practices Current corporate governance practices are very much successful up to a satisfactory extent but there needs to be some changes in the corporate governance laws of Australia. The current corporate governance practices in Australia is divided into eight principles and recommendations. First principle for the corporate governance is to create a solid foundation for oversight and management; this means that the company should disclose the responsibility of the management and the leading board of the organization with their respective roles and responsibility within the organization. This law defines who is their decision making team and what are their roles and responsibility in the organization. The second principle for the corporate governance is that the structure of the board also affects the organizations growth in the market. This principle defines that the board of the companies should consist of enough members according to the size of the organization. This principle also defines that each part of the board should be committed to responsibility and duty towards the organization. The third principle of the corporate governance is that the organization should promote the responsible decision making and ethical values of the company. This principle actually describes that the organization should have their own ethical values for their stakeholders, employees and society which will help the organization in running in a proper and legal way. The organization should also promote these values and decisions within the organizations and among stakeholders. The fourth principle of corporate governance of Australia is for creating the safeguard integrity in the financial reporting. According to this principle of corporate governance, the structure of company should be verified independently and with safeguard integrity in financial report. This principle is mainly related to the financial report of the company. According to this principle, the board should establish a special committee for creating a financial report of the organization. The fifth principle of the corporate governance law is related to the balanced and timely disclosure of the reports. According to this principle of the corporate governance the organization should disclose their balanced report with all the required material on time. This will help the organization in gaining the faith and trust of the stakeholders. The companies should create the written policies and present those policies to the stakeholders. This time period of disclosing the policies should depend on the size of the organization. Some companies publish quarterly, some half yearly and some yearly. The sixth principle of corporate governance is really important as this principle is related to the laws related to share holder. This principle states that the rights of the shareholders should be reserved; an organization should respect the laws and rights of the shareholders. These should not only respect the rights of the shareholders but also create the awareness about it. These rights should also be mentioned in the report disclosed by the organization. The seventh principle of the corporate governance is related to the management and identification of the risk associated in various decision making. According to this principle, the company should establish a system of risk management and internal control within the organization which identifies the various types of risks associated for the current situation and finds the solution for that. These risk and solutions associated with these risks should be reported to the shareholders in the published report. The final principle of the corporate governance is related to the fair and responsible remuneration. According to this principle of the corporate governance, reasonable and sufficient remuneration should be levelled and composited by the companies. This clears the relationship and performance of the company with the shareholders (ASX, 2014). Thus, by analysing the above principles, it can be clearly said that the Australian corporate governance is clearly working efficiently in Australia. The laws and regulations are helping very much but these frameworks can be more effective by implementing and adding more limitations. The first point that can be added to Australian corporate governance is that the time of disclosing the debts should be fixed by the corporate governance. The laws related to the rights of the shareholders should be stricter as these laws may not work in some cases. Some more situations in defining the corporate governance should be considered. These will help in making the law more successful and managed. Approaches to corporate governance Corporate governance uses various approaches to balance the corporate activities. These approaches help in managing the various types of corporate organizations and help in managing the corporate activities related to these organizations. These approaches also help in developing the system to fulfil the objectives of the corporate governance like creating a legal bridge between the stakeholders of the company and the leading management of the organization. Thus, this topic helps in getting a raw image of these approaches for corporate governance. Regulatory Approaches The primary method of Australia that used to regulate information privacy is principle-based regulation. Principle means general rules that expresses the fundamental obligation. It focuses on process to outcomes. Process means action that firms must take and outcomes means the result that requires from firms to achieve. Secondly, a regulatory approach base of it is using prescriptive rules can provide regulation a greater clarity, that make regulated entity to determine rules, it must comply minimum standards of compliance. In turn, these can straightaway be accountable for the regulatory system away from the persons being regulated. Product innovation and hand-on technology can be dead hand, this rule-based regulations are contrary to assentation of clarity and certainty. Self-Regulatory Approaches The first approach that was adopted by the Australian corporate governance was the self - regulatory approach. Profit maximization and economic liberalism inspired the self regulation approach. This profit maximization and economic liberalism was emerged in the developed countries. These countries mainly belonged to the Europe. This approach was first developed in the 20th century. According to the self regulatory approach of Australian corporate governance, the governance guidelines, code of conducts, reports and governance guidelines creates the base for creating the environment of self - regulated market. A set of best recommendation of practices according to the structure of a company and behaviour of the company were set as guidelines and codes for the self regulatory approach. According to the self regulatory approach the market itself imposes the necessary sanctions related to the market. This approach of corporate governance looks as a perfect solution (Anreadakis, 2014). According the self regulatory approach, the market itself defines the necessary limitations and recommendations for the market and organizations. This approach also has various faults but it was a best modern approach in the 20th century. This was proved to be a most liberal version after completion of deregulation of regulation. Thus, the self regulatory approach helps the corporate governance in managing the better relationship of shareholders and management of the organisation. Conclusion The report is based on the various studies and research. The above report is basically on the Australian corporate governance. The Australian Corporate governance manages the relationship between the shareholders and the management of the companies. It basically follows the various principles for effectively managing the rights of shareholders and the management of the organization. The principles of the Australian corporate governance considers each and every factor and situation related to the legal laws and regulations related to the organizations and stakeholders of the organizations. The corporate governance helps to handle the stock market volatility and the problems related to disclosure of corporate debts. This is very essential to disclose the corporate debts for stakeholders. References ASX (2014). Corporate governance Principles and recommendations [online]. Available at:. ICAEW (2013). When is comply or explain the right approach [online]. Andreadakis, Stelios (2012). Research Notes: Regulatory or Non- Regulatory Corporate governance: A dilemma Between statute and codes of best Practice [online]. Daily Reckoning (2014). Measuring Stock Market Volatility [online]. Issai (2014). Guidance on definition and disclosure of public debt [online].

Wednesday, December 4, 2019

Cloud Computing System Of Webb’s Stores †MyAssignmenthelp.com

Question: Discuss about the Cloud Computing System Of Webbs Stores. Answer: Introduction One of the most popular and recognized retailer is Webbs stores. Based in Australia, this particular organization sells all sorts of food items. They also sell some of the important specialty stuffs (Almorsy, Grundy Mller, 2016). There are two major data centers of this organization. One is in Sydney and the other one is in Melbourne. These two data centers do the main task of sending and receiving data. However, this organization also has some of their data centers regionally. These regional data centers are present in Auckland, Bathurst, Wagga, Brisbane and Port Macquarie. In recent days, Webbs Stores have decided to shift their entire database to Infrastructure as a Service or IaaS instance in cloud. Previously, their database was in MS SQL Server 2012 R2. The organizational bodies of Webbs Stores have taken a decision of undertaking various tools and techniques of cloud computing in their business. Cloud computing is the safest procedure of transferring bulk amount of data withi n lowest time. This particular decision has raised many problems like data management and complexities of the operational and application software (Avram, 2014). Due to these problems, the data management has become a major problem for the company. The regional data center in Auckland has a traditional infrastructure and due to this reason, Webbs Stores have decided to close down the entire infrastructure. Instead of closing the data center, they could have easily upgraded the infrastructure. A workshop for Security and Risk is scheduled to organize for the probable security risks access and the probable controlling measures. The report outlines a brief description about Webbs Stores. The report explains about the advantages of migration of data to the cloud infrastructure. The possible risks are also given in the following report for Webbs Stores. The utilization of migration data for Webbs stores are also mentioned here. Proper mitigation plans are also given in the report with details. The recommendations are also provided for the risks. Data Migration Type of Cloud Security Deployed Webbs Stores should opt for authorization and authentication policy as their security policy of cloud (Arora, Parashar Transforming, 2013). This is the authenticated permission provided to an organization or individual to perform their tasks. Authentication usually verifies the identity of a user. The security policy is highly recommended for Webbs Stores as they are moving their database to IaaS instance from MS SQL Server R2. This particular database will help the organization in verifying the original and authenticated users. The best IaaS instances for any organization are the Azure and AWS (Fernando, Loke Rahayu, 2013). These infrastructures of cloud help in transfer of data securely. Advantages and Problems of Cloud Security Deployment The advantages that is gained after deploying the said policy are as follows: i) Cost Effective: This particular policy is absolutely cost effective and is affordable for all organizations. ii) Security: The second advantage of this security policy is that it is highly secured and there is less chance of losing data. iii) Scalability: This policy makes the entire system scalable. iv) Flexibility: The moment the authentication and authorization policy is deployed, the system becomes flexible (Hashem et al., 2013). The issues that can be faced by Webbs Stores after deployment of authentication and authorization policy are as follows: i) Encryption: Encryption is a must process for all messages and this makes the database slower. ii) Complexity: The implementation of this policy is extremely complicated sometimes. iii) Brute Force Attacks: This types of attacks are common for this policy where the hacker hacks the password of the system (Li et al., 2013). Probable Risks in the Migration of Data The Database There is always a high chance of risk in migration of data in a database. The risks that are common during migration in case of database are as follows: i) Loss of Data: The most common risk in case of data migration is the loss of data. Most of the time, while transferring the data t other database, it gets lost completely. ii) Corruption of Database: This is the second dangerous problem that occurs during migration of data (Xiao, Song Chen, 2013). The whole database gets corrupted and cannot be recovered. This is extremely dangerous from any organization as all information is lost. The IaaS Infrastructure The security risks or threats that are faced by the infrastructure of cloud are as follows: i) DoS Attacks: DoS or denial-of-service attacks are the most probable security risks for any information system. This is occured in the infrastructure of a company. When a particular user utilizes all of his resources present in the cloud, the all over quality of several services, which any other user, is using, gets degraded (Avram, 2014). The hackers wait for this moment and hacks all the information and resources for slowing down the service or simply denying the services. This is called a denial of service or DoS attacks. It often occurs over a series of computers or systems, whichis known as Distributed Denial of Service or DDoS attack. ii) Insider Threats: While the data is migrated to another database, the infrastructure of the cloud allows the admin to access both the database and data. These particular types of security threat are commonly called as the insider threats. The Communications The distinct communications that occur within the Webbs Stores and the IaaS infrastructure has the tendency to attract several security threats. They are as follows: i) Data Breaching: This is one of the most significant security threats that occur when data is migrated (Xiao, Song Chen, 2013). It occurs when Webbs Stores and IaaS will communicate with each other. ii) Incompatible Database: The database should be compatible for avoiding the security risks when Webbs Stores and IaaS will communicate with each other. Cloud of Backup and Removal of Records Risks with Backup of Data i) Backup: Time to time back ups of data are highly recommended for all organizations. However, there are certain vulnerable risks and threats, which take place during the back ups of data. These types of threats are as follows: Security: One of the most vulnerable threats while backing up of data is security. Information often gets lost and cannot be recovered anymore. Control Over Data: When the backup of data is done, it is completed by the provider of cloud (Whaiduzzaman et al., 2014). He has the control and complete access of the confidential data and can easily intercept it. ii) Storing of Data: Cloud storage stores all the data. There are several risks and threats that take place during data storing. The probable risks are as follows: Security: One of the most vulnerable threats while storing any type of data is security. Information often gets lost and cannot be recovered anymore. Lack of Standardization: The cloud vendor always fails to follow the normative series of rules for the support of the business. Webbs Stores should select their cloud vendors carefully and wisely (Tao et al., 2014). iii) Data Retrieval: There are several risks and threats that take place during data retrieval. They are as follows: Snooping: The hackers sneaks into the data while it is retrieved from the cloud. He can even intercept the data and this is absolutely vulnerable. Leakage of Data: Data is often leaked in the cloud while it is retrieved from the cloud. This has caused many infamous cases all over the world. Cloud Backup in DR Plans The strategy for all types of back up and recovery of data is known as cloud DR plan. This plan is mainly used for keeping and storing all the confidential records (Dinh et al., 2013). This is mainly done for security issues. Cloud backup does the most significant job. Webbs stores should select DR plans for their business as it will remove the complexities of the process of migration of data. The single transfer of data is not required in this case. Only the database or the storage is transferred. All the data will be transferred with that storage (Rittinghouse Ransome, 2016). The main advantage that will be obtained by Webbs stores is that there will be a copy of all the confidential data, which is sent by any public network to the offsite server. The main advantage of back up and restore strategy is the simplified backup technique of data. The entire database system will be modified with this simple strategy in Webbs Stores (Rahimi et al., 2014). The second important advantage of this technique is that even if there is chance of losing any data during the migration, this particular strategy will recover the lost data quickly and efficiently. Therefore, it can be claimed that this strategy would be helpful for the organization. Protection of Access and Recommendations IaaS Infrastructure Access of any confidential thing is not given to everyone. The Infrastructure as a Service instance cannot be allowed to access by everyone (Malawski et al., 2015). This access should be protected. The most important method is mentioned below: Physical Access in Cloud Infrastructure: Hacker or a person with wrong intentions often has physical access to the cloud infrastructure (Wei et al., 2014). There should be a strict restriction for accessing the infrastructure. MS SQL Server 2012 R2 Cloud Instance All types of accesses in the MS SQL Server 2012 R2 can be prevented by a significant approach. Access to Operating System: They should keep an eye on the operating system access (Botta et al., 2016). They should not allow any unauthorized users to access the operating system of the organization. Cloud Network Infrastructure Webbs Stores can prevent the overall access to the infrastructure of cloud network by two methods. They are as follows: i) External and Internal Threats: They should be careful from this type of threats (Hashizume et al., 2013). ii) Server Monitoring: They should regularly monitor the server to avoid multiple access . Cloud Backup and Restore Infrastructure The cloud backup and restore infrastructure can be protected by two methods. They are as follows: i) Encryption: This is the most basic and simple way of securing access to data and information in any system (Fernando, Loke Rahayu, 2013). Encryption is the process of encoding a confidential message or text into a cipher text in such a way that only the receiver would be able to access that message or text. It is extremely popular for any organization for securing their information. ii) Passwords: The easiest approach of securing any information, data and access is to keep passwords for that particular aspect. They secure the access and the hacker is unable to access it (Almorsy, Grundy Muller, 2016). Moreover, passwords should also be changed periodically. Conclusion Therefore, from the above discussion it can be concluded that one of the most popular and recognized retailer is Webbs stores. Based in Australia, this particular organization sells all sorts of food items. They also sell some of the important specialty stuffs. There are two major data centers of this organization. One is in Sydney and the other one is in Melbourne. These two data centers do the main task of sending and receiving data. However, this organization also has some of their data centers regionally. These regional data centers are present in Auckland, Bathurst, Wagga, Brisbane and Port Macquarie. In recent days, Webbs Stores have decided to shift their entire database to Infrastructure as a Service or IaaS instance in cloud. Previously, their database was in MS SQL Server 2012 R2. The organizational bodies of Webbs Stores have taken a decision of undertaking various tools and techniques of cloud computing in their business. Cloud computing is the safest procedure of transfe rring bulk amount of data within lowest time. This particular decision has raised many problems like data management and complexities of the operational and application software. Due to these problems, the data management has become a major problem for the company. The regional data center in Auckland has a traditional infrastructure and due to this reason, Webbs Stores have decided to close down the entire infrastructure. Instead of closing the data center, they could have easily upgraded the infrastructure. A workshop for Security and Risk is scheduled to organize for all the probable security risks, vulnerabilties access, and the probable controlling measures. The report also provides a perfect description of the Webbs Stores case study. Moreover, the report also describes the details of migrating all types of data from MS SQL Server to the cloud instance of IaaS. The type of cloud security deployed is also mentioned here. The above report also describes about the advantages and disadvantages of cloud security deployment. The risks and the ways to control them are also mentioned here. Suitable recommendations are provided in the report. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Xiao, Z., Song, W., Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), 1107-1117.