Monday, December 30, 2019

The Moral Rationalist An Analysis Of Self Control

PLATO THE MORAL RATIONALIST: AN ANALYSIS OF SELF-CONTROL IN THE REPUBLIC Plato in his Republic thoughtfully examines how an individual’s soul can attain self-control, as well as implications it carries with it —such as its correspondence with the structure of the city, unity in having ‘stronger’ rule, and social reputations — all reasons that become riddled with fallacies as Plato comes to contradict himself such as in the liability of error and social perceptions being just. Plato, through his mouthpiece Socrates, remarks on the â€Å"ridiculous† nature of self-control (430e-431a) and is only subdued in his application of the term in the context of the soul and its ability to create amity. The various components of the soul, according to Plato’s Socrates in Book IV, consists of ‘Reason’, ‘Spirit’, and ‘Appetite’ (436a). These divisions of the soul are used to correspond to three distinctive classes in Kallipolis —‘rulers’, ‘guardians’, and ‘craftsmen’ —all which Plato’s text argues equates to specific fractions of the soul. By associating parts of the soul with classes Plato consciously sets up the discussion for which part of the soul is naturally suited to rule. Reverting back to Book I to Thrasymachus’ earlier argument, the definition of justice as â€Å"nothing other than the advantage of the stronger† (338c), the ‘stronger’ in the Kallipolis is undoubtedly claimed to be the rulers. In its association with the ‘rational’ component of the soul, with the rulers being theShow MoreRelatedLeadership Analysis : The Everest Simulation Essay1906 Words   |  8 Pagesteams in high-pressure situations. 2.2 Management Research Evidence Mitchell, et al (1970) provide a critical analysis of the contingency model, and suggests alternative ways in which to assess situational favourability. Mitchell, et al (1970) begin by reviewing the underlying concepts of the contingency model. They confirm the suggestion that effective leadership relies on the style and control that a leader exerts over a situation, as well confirming the three dimensions Fielder uses to evaluate aRead More Dada Surrealism Essay1237 Words   |  5 Pageswork. They also felt that,? everything obscure in the mind, buried deep, unrevealed?, (Fiero 41) as one French playwright revealed. Each artist of the Dada era had a new way of expressing Freud?s ideas. They also felt that art was a powerful means of self-revelation, and that the images came from ones subconscious mind had a truth of its own. As Marcel Duchamp mocked the Mona Lisa by drawing a Padilla 3 mustache on her, stated that the painting was a lewd message set by the conventional way of think ingRead MoreThe Legal System And Ethics2299 Words   |  10 Pagesthrough time are the principles of Empiricism and Rationalism. Empiricism, or the concept of Empiricism, refers to sense perception or the belief that things are probability based instead of having a certain set of results or predicted outcomes. Rationalist on the other hand have a firm belief in the certainty of human knowledge. Under these two traditions enlightened thinkers such as Locke, Rousseau, Montesquieu and Hobbes, under two philosophical theories of their time, under the philosophical theoriesRead MoreEthics Is The Study Of Right And Wrong Things Are Done By Thomas Nagel Essay2079 Words   |  9 Pageswrong and can be thought of as almost identical to moral law. The word Ethics comes from the Latin word mos and the Greek word ethos, meaning ‘the way things are done’. Thomas Nagel, a professor of philosophy and Fiorello LaGuardia Professor of Law at New York University is a well-known writer o f Ethics who provides an insightful perspective to ethical reasoning. Nagel believes there are objective moral truths; he claims one can perform a moral act that is defensible from an external point of viewRead MoreEssay on Should Polluters Pay For Polluting? 1998 Words   |  8 PagesThesis: If polluters are harming the environment, the pollution is a moral danger to the ecosystem and should be resolved. If polluters can pay economic compensation for their disruption of the environment, this will not necessarily resolve the problems of the environment. Three authors in this essay offer different perspectives on the issue of making polluters pay, their explicit views of this subject are not observably mentioned in their work, just different positions for and against the ideaRead MoreDreams And Their Implications Of Dreams Essay2024 Words   |  9 PagesThere are numerous certainties that are obscure about dreams and their implications. For a considerable length of time, rationali sts and researchers have attempted to comprehend the significance of dreams. They have all been entranced by the way that the substance of dreams may have implications identifying with one s life. Are dreams only considerations in individuals brains, or are dreams in truth representations of various territories in individuals lives? Dreams speak to a wide range ofRead More5- Islamic Civilization (fall; a force; world peace).6212 Words   |  25 Pagesmacro-economic imbalances. It is far behind major industrial, and even some developing countries, in almost all fields of life, including the economic, political, educational, technological and military. The author also proceeds to point out the moral failure of Muslim majority countries with deep-rooted inequalities of income and wealth, conflict and disunity. The masses live in poverty alongside small elites who live in luxury. The author considers that an explanatory model is needed for theRead MoreEssay on Romanticism4035 Words   |  17 Pagesmany different forms of the movement, is a concern with the divided self. As the empirical Rationalism of the eighteenth century was partially subverted by the subjective metaphysical reflection in the nineteenth artists tended to examine wider issues from an introspective starting point. The idea of the divided self became a motif from Blakes Albion to Byrons Manfred to Keats musings on the disassociated nature of the Poetic Self. Some writers personified this division in distinct physical manifestationsRead MoreThe Evil of Politics and the Ethics of Evil10364 Words   |  42 Pagesposterity. The historyof political thought is the history of the moral evaluation of political power. Even when mankind seems to be preoccupiedwith the science of mans political nature and considers ethics either as an empirical science or not at all, the moral issues raise their voices and demand an answer. The answers, like the questions, are mumbled, ambiguous, and distorted when the scientific prejudicesdo not allow the moral problems to be seen in their true light and the answersto be givenRead MoreHuman Resource Essay example3782 Words   |  16 Pagesthe centrality of the human subject, of the Self, as the essential determination (locus) of the modern sense of work, production, and consumption (Costea, Crump, Amiridis – reading for seminar 1). Put much more simply, the context of which HRM is part is the Century of the Self – the century of the ‘Me, Me, Me’ generations always in search of Maslowian self-actualisation. The underlying mechanism of HRM lies in what Tipton called the ‘ethics of self-work’ (discussed by Heelas), or what we term

Sunday, December 22, 2019

Why Does The Author State That There Is No Better Time...

PSYCH 412 – Article Reflection 1 Dr. Love 1 September 2016 Part I: 1. Why does the author state that there is no better time than right now to significantly review how we’re raising teenagers? Provide and explain three reasons. The author of the article states that there is no better time than now to review how we are raising teenagers for many reasons. First and foremost there have been many strides taken recently to understand how the adolescent brain develops, strengthening ones understanding, and in turn, shedding light on errors made in the way adolescents are being raised in relation to their neuro-development. This means that because scientists have learned substantial information about the brain recently, it is important to reevaluate how parents are raising teenagers now more than ever. Second, according to the article it is a good time to review how we are raising teenagers because children are becoming adolescents earlier based on their physical maturation increasing faster each year, therefore it is important to examine why this is occurring. Finally, the author states that there is no better time to review how we are raising teenagers because of the recent discovery that the brain is malleable during adolescence due to neuroplasticity, meaning that the brain is able to be transformed during this time period solely based on the environment in which these individuals are exposed to, as per the article (Steinberg, 2014). 2. Why does the author feel it is bothShow MoreRelatedThe Death Of The Author1194 Words   |  5 Pagesâ€Å"The Death of the Author,† he explores that reading is done through a lens of the authors life. According the Dictionary.com, to read is to â€Å"comprehend the meaning of (written or printed matter) by mentally interpreting the characters or symbols of which it is composed.† Barthes argues that the reader spends to much time allowing the author’s identity to get in the way of comprehending the meaning of the ‘written or printed matter.’ He then goes on to say that reading is way more than just a means toRead MoreWhy Should Not Be A Degree? Essay1204 Words   |  5 Pagescollege degree no longer guarantees success, many people are now questioning the value of a post-secondary education. With all the risks involved with getting a degree, it has become very important to evaluate your reasons for going to school. Statistics show that obtaining a degree raises the chances of becoming wealthy, but for most graduates that has become relative to their major. For some, obtaining a college degree could result in a better quality job. While for others, it could end in studentRead More Comparing William Bennetts Leave Marriage Alone and Andrew Sullivans Let Gays Marry1537 Words   |  7 Pagesthe argument between two authors: William J. Bennett and Andrew Sullivan. The two authors come from different countries and have different opinion about same sex marriage. Sullivan agrees with the gay marriage because of human right, on the other hand, Bennett contradicts his idea because he believes that marriage should be between a man and a woman. Even though their theories are totally different, their opinions are very well established. In Bennett’s essay, he does not want to support gay-marriageRead MoreHomeschooling : The Common Myths About Homeschooling894 Words   |  4 Pagesregulations that may apply in their state or country. Today, homeschooling is a broadly acknowledge educational alternative to traditional public or private schools, yet some people are not aware of what homeschools are like or the effects it may have on students. In his article, â€Å"Revisiting the Common Myths about Homeschooling,† Michael Romanowski, a professor of education in the Middle East, writes about four common myths about homeschooling and explains why the they are not true. On the contraryRead MoreReconciling Edna s Suicide And The Criticism Surrounding861 Words   |  4 Pagesthe reason she acts the way she does. Bird says â€Å"Edna is still a child emotionally and continually looks for a motherly influence.† Bird makes a point that throughout the story Edna regresses back to a child all the way to the womb, or water. She is saying that this is a form of insanity and that is why she died. Bird also makes a point that Edna knows exactly what she is doing. Bird says â€Å"Edna now makes decisions (such as moving out of the house) based on what is right for her, choices that will drasticallyRead MoreSex Ed By Anna Quindelen Essay840 Words   |  4 PagesIn her essay â€Å"Sex Ed†, Anna Quindelen, a New York Times Columnist, journalist, and novelist, describes why teens should be taught sexual education by family members and loved ones rather than by teachers (Quindelen 183). In the essay, the author states that girls know the anatomy of a female’s reproductive system, and can tell the beginning and end of the ovarian cycles but can still end up pregnant. Knowledge isn’t always the right way to getting a point across. Desensitizing teens to importantRead MoreThe Border Fence Essay1339 Words   |  6 Pagesï » ¿Brian Wagner Eng-1102-115 Essay #1- The Border Fence 9/16/13 In the essay â€Å"The Fence of Lies† the author Mario Vargas Llosa’s thesis is that the border fence between Mexico and the United States is a bad idea and a waste of taxpayer’s money. Some of the main points he uses to strengthen his argument are that it is purely a political ploy to get officials re-elected, that the fence is far too costly and the construction will never happen, and the money should be spent elsewhere. In additionRead MoreChild Abuse And Protection By Tommy Mackay Liz Malcolm Psychological Journal909 Words   |  4 Pagesever looked at a child in the eyes and sensed something, just something, was not right? Have you ever been that child that has something to share but you do not know who to talk to or what to say? This goes on all the time with children of today’s day and age. I call it the new parent age. The new parent believes that it is ok to punish the child in very demining ways. This is what is known as child abuse to the sta te. In Tommy MacKay Liz Malcolm psychological journal entitled â€Å"Guest Editorial:Read MoreThe Expansion Of The Oil Sands1459 Words   |  6 Pagesleader in the oil sands industry. Over the past few years there has been controversy in Canada over oil production. Some say we should continue to expand the production of oil and others say we should try to reduce our production. The first article â€Å"Why Canada needs to develop the oil sands† by Konrad Yakabuski argues that Canada should continue to expand the oil sands. Contradictory to the first article, the second article â€Å"Stop oilsands expansion, Canadian and U.S. researchers say† argues that CanadaRead MoreIn The Political World There Are Two Major Standpoints,1329 Words   |  6 PagesIn the political world there are two major standpoints, either right or left. Either side has its own views about everything from job creation to how rich or poor Americans are at the current time. The right tends to ar gue that the American people are gaining momentum when it comes to climbing the rungs of the ladder to more wealth while the left sees the opposite view and the American people are slipping further down hill becoming poorer and poorer. Two men from opposite sides of the isle stand

Saturday, December 14, 2019

Anatomy and Physiology of the Breast Free Essays

Anatomy Physiology Information Flowchart/Display The Incredible Human Body Flip Charts 03. 03. 001 Your body is one of the most amazing machines you’ll find anywhere! Find out what’s inside of you, and learn about how your different organs work. We will write a custom essay sample on Anatomy and Physiology of the Breast or any similar topic only for you Order Now Look at the clear plastic overlay charts to see how the different body structures fit together. And when think you’ve learned everything, try out the Mix ; Match Human Body Sticker Quiz! The is flowchart includes: 12 body charts, 5 guesthouse layer posters and 18 reusable peel-off stickers. Copyright 2008, Hastings ; Rather Health Promotion Resources Centre Page 1 Anatomy ; Physiology Game The Body Game 03. 04. 001 Jane Bunting and Jane Coney All children are fascinated by the human body and how it works. The Body Game is a fun way for children to find out about different parts of the human body and discover what these parts of the body can do. Designed for children aged 3 to 6. Page 2 Anatomy ; Physiology Model/Teaching Aid Cross Section Heart Model 03. 07. 020 Female Reproductive Display 03. 07. 017 This soft foamed model separates to create a cross-section view of the heart for hands-on classroom demonstrations. https://donemyessay.com/anatomy-and-physiology/ The areas of the heart are labeled on the inside. Model measures CACM in diameter. Ages 7+ The Female Reproductive Display effectively shows the parts of the female each part has and process of fertilization. Complete with 7 removable parts, 8 labels, teachers’ notes and work sheet. Size 42 x CACM. Eye In Orbit 03. 07. 010 Flexible Spine 03. 07. 012 This model shows the eye with optic nerve in its position in the bone orbit (floor and medical wall). The eyeball is dismissible into both halves of the sclera with cornea and eye muscles, both halves of choroids with iris and retina, lens and vitreous humor. Times fulfills, with 7 parts. Dimensions: 18 x 26 x LLC. Flexible Spine with Pelvis: showing indications of spinal cord, nerve roots, vertebral arteries and prolapsed disc. Complete with stand. Giant Three-part Ear 03. 07. 01 1 Female Pelvis 03. 07. 002 A detailed representation of the female pelvis (median section) with sexual organs is given in this two-part, life- size mode l. Its internal sexual organs, urinary bladder, and rectum are removable. Dwarfing ordinary ear models, this unbreakable polymer reproduction depicts the human organ of hearing and balance scaled to 5 times life size. Thirty-six hand- numbered features are identified in the accompanying key. Overall dimensions of Giantess: 16 x 11 x 7 inches (41 x 26 x CACM) Page 3 with a stand, and has movable arms and legs. Head Neck: Median Section 03. 07. 004 Organ Tunic This model (median section of head neck) is life-size and shows important This highly tactile resource, includes 11 velour-on D organs and it is embroidered with a pelvis, spine and D ribcage. The intestine may be unraveled to show its length. Includes a set of 11 detailed labels and a reference sheet. Size 700 XML Heart: Model 03. 07. 006 This heart model is enlarged to about twice natural size and can be separated into four parts, mounted on a base. Pelvic Model 03. 07. 014 Male Reproductive Display 03. 07. 021 A convenient, portable model providing a dimensional visual aid, can be used to demonstrate the insertion and location of a diaphragm or intra-uterine device to patients. Lunches an information Brochure Pupils need to understand the process of reproduction; using this interactive display the main components of the reproductive organs are clearly demonstrated. Includes 9 removable parts, 9 labels, teachers’ notes and worksheets. Size 42 x CACM. Section Of Skin 03. 07. 005 Relief model of the skin showing two hair follicles (fully exposed and in section) and two sweat-glands. On a base and approximately 70 times enlarged. Mini-skeleton 03. 07. 008 Approximately 26†³ high, this mint-skeleton is a first-class model of a human skeleton. Suitable for teaching basic anatomy, it comes Copyright 2008, Hastings Rather Health Promotion Resources Centre Page 4 Unhealthy Organ Pack 03. 07. 009 The Anatomical Chart Series This Anatomical Chart Series features 48 titles in full color. Charts sorted into 3 sections:- Systems of the Body, Structures/Organs and Disease/Disorders. Pop open the hidden easel, flip charts for individual viewing. Ideal for studying human anatomy, patient consultation or quick reference. Using differing textures, colors lumps these organs show the harmful effects of smoking and alcohol. The pack includes 8 organs, 7 labels, 10 blank labels and detailed teacher’s notes. This pack of organs is highly effective when used in conjunction with the organ tunic [03. 07. 003]. The Human Body: Bag Of Bones 03. 07. 015 This realistic embroidered skeleton has a full set of bones which velour to the aground. The background can be folded into a carry case for storage. Includes 20 fabric bones, 2 sets of labels and reference sheet. Size: 50 x 140 CM (unfolded) Torso 03. 07. 001 This mint-torso shows anatomical details and consists of seven removable parts. ? Right and left lung? Heart? Liver? Stomach? Small and large undomesticated on a stand. Page 5 Anatomy Physiology CD-Room body, and learn about everlastingly part where it is found, what it does, and how it works. My Amazing Human Body 03. 09. 003 My Amazing Human Body CD-Room is packed with interactive games, hilarious animation, and stunning D graphics. Not only will it give children a unique insight into the workings of the human body, it will also stimulate them to investigate for themselves. They will love taking the body apart, extracting teeth, taking x-rays and measuring organs. Promotes active learning and makes â€Å"finding-out† fun. Simple navigation makes this CD-Room ideal for school or at home. The Ultimate d Skeleton The Ultimate D Skeleton CD-Room enables you to explore the entire human skeleton in D. Not only can you identify and learn the function of every bone in your body, oh can also play film sequences that allow you to look at bones from unusual angles. The index is specially designed to give the user access to information on any part of the human skeleton and the exciting quiz feature tests what you have learnt. The Ultimate Human Body 03. 09. 001 This CD-ROOM takes the most fascinating Journey of all – an exploratory trip into the secret world of the human body it-self! You can look beneath your skin, take a guided tour of the structure, systems, and organs of your Copyright 2008, Hastings Rather Health Promotion Resources Centre Page 6 Anatomy Physiology Video Bones Movement 03. 1 1. 001 accompanies the series. Aimed at 9-11 year olds. Heart Circulation This video incorporates live-action, animation and x-rays illustrating how bones are held together by ligaments, how different kinds of Joints function, and how bones are cushioned from shock. The process of the body’s healing of a broken bone and the positive effect of gravity on bone strength are also demonstrated. 03. 11. 002 Food Growth 03. 1 1. 003 This video explains that for the human body to remain alive and active, its cells have o be supplied with nutrients and oxygen and waste products must be carried away. This process is accomplished by your blood and heart, which keep blood traveling through two complete circuits. This video explains how we grow and the importance of food to the human body. Explaining in detail how the digestive system works. The Human Body 03. 1 1. 004 Health E: Series 1 03. 11 . 005 woman called Blood. How to cite Anatomy and Physiology of the Breast, Papers

Friday, December 6, 2019

International Of Electronics Engineering †Myassignmenthelp.Com

Question: Discuss About The International Of Electronics Engineering? Answer: Introducation The report will discuss in detail about the concept of cloud computing and various issues surrounding it. The concept of cloud computing has completely changed the way IT is managed as well as consumed in the organizations. It promises improved level of cost effectiveness, elevated level of innovation, quicker time to market the product and the capacity to be able to scale applications based on demand. The concept got popular in 2008 and further continued making a major impact through various models and the advantages seemed to be substantia (Chen Zhao, 2012). But with the emergence of cloud computing and development which was rapid in conceptual terms and, as well, there were number of legal, service quality, economic, security and privacy based challenges in the market needed to address. Summary of two peers research paper on cloud computing The important security and privacy issues in cloud computing are discussed in detail below: Network and data: there are number of phases in security network as well as data security discussed in detail below: - Data confidentiality: the concept of data confidentiality is a prominent issue which is required to be considered especially when highly confidential data is outsourced to the cloud. It can be accomplished via encrypting the data but there are number of critical issues in the process because of distribution as well as management of keys (Sen, 2013). Data integrity: the process of integrity is based on verifying the data and it further ensures the overall quality of data. In this model, integrity of data storage is a crucial and significant need since it proves in consistency, validity and regularity. With cloud based service needs and rise in it, the CSP requires to scale up the overall storage systems and this further may lead to high possibility of loss in data, corruption of data, failure of disk and many more. Data availability: the services are developed for the users and must be made available to them whenever required. At the same time, there are number of situation that are present in which data availability is not properly guaranteed. For instance, in unavoidable case like natural disasters, it is important to gain knowledge about the way data is used, verified as well as recovered by the owner of the data (Sen, 2013). Governance, compliances and legal issues: the physical place of the server based farm and cloud based infrastructure must be confidential by nature since the physical security of the infrastructure is also very crucial. The concept of CSP should have a process to save the customer data if there is any kind of suspected threat. In addition, this should be shared with the customers on request. Moreover, the purifying of the stored data in the cloud is a critical challenge which is needed to be discussed (Sen, 2013). The users of cloud must be assured that data will always be safe even when the cloud based service providers will collapse or gained by another organization. The cloud based users should also understand on how they can get the data back. Communication interface and virtual security: the users of cloud have an integral part to play in making sure that cloud services are secure. This is primarily because of the nature of connections as well as devices utilised by the users of cloud to connect to the cloud and has its own set of implications in security (Sen, 2013). Security and Security and Privacy Issues in Cloud Computing The report addressed the various security and privacy based issues in cloud computing. There are number of issues in security for cloud computing since it passes many level of technologies consisting network, operating system, databases, resource based scheduling, balancing of loads, concurrency control and management of memory. Thus, security issues for many such systems as well as technologies can be applied to cloud computing as well. For instance, the network that can interconnect with the system in cloud must be safe. In addition, the virtualization based paradigm in cloud computing further leads to many security issues. For instance, cases like mapping the current virtual machinery for the physical level machines must be carried out in safe manner (Awodele et al, 2017). The process of data security consists of encryption the data along with making sure that right policies are applied for data sharing. Moreover, resource allocation and management of memory related to algorithms must be secured as well. In the end, the process data mining methods must also be applied for the detection of malware in the system based on the approach which is adopted normally in IDSs also called intrusion detection system. There are six principal areas in cloud computing issues where tools and software are needed for substantial level of security attention. These six areas are securing data at rest, securing it at transit, authentication procedure, robust separation based on data belong to different consumers, regulatory issues and incident based response (Awodele et al, 2017). Issues not addressed in the discussion There is no are in ICT which is not touched by Cloud computing. Two important issues in security as well as privacy issue are: Losing control over data Dependency on the provider of cloud computing The above-mentioned issues can result in number of legal as well as security based concerns associated with infrastructure, management of identity, access based control, management of risk, regulatory based legal compliance, logging and auditing, control in integrity along with cloud computing concepts based on risks (Jansen, 2011). Following is the overall impact of above-mentioned issues: - There are number of consumers that are aware of the danger of helping the data control out of the hand as well as storing data with an external cloud based computing provider. Data must be compromised by the system provider or other organization in competition where customers with similar cloud computing provider will help. The transparency is also lacking for the number of customers on how, why, when and where the current data processing can happen (Takabi et al, 2010). This is in complete opposite of the data protection needs that customers must know about the happening with the data. There are number of cloud computing providers that can work on data mining tools to evaluate user based data. This is a very sensitive activity and since the users are normally storing as well as processing data which is sensitive by nature while usage of cloud based services. This is specifically right for various social media application that motivate the user to share a lot of their personal lives (Walia, 2017). Mobile device, specifically with the restricted storages as well as computing capacities are the main drivers for holding services as provided by the cloud computing despite the usage of software on single computers. In fact, the data that can be transferred from one mobile machine to another, are usually transferred through the cloud and when cloud based application on mobile device are integral part. Therefore, users usually put everything at risks without noticing the changes since they automatically assume that the data can be transferred (Abbas et al, 2017). Cloud computing is presented in a form of service, it must be accessed in remote areas. The overall connection that exist between the provider of cloud computing and customers is not always rightly saved. There are number of security risks that also threatens the transfers that consist of eavesdropping or spoofing of DNS and many other kinds of attacks. The overall shift in cloud computing ensures the usage of traditional management of risk approaches that are hard sometimes. Even though can control the data transfer to the cloud providers, along with risk management and compliance with issues can split between the cloud based provider (Tatwani Tyagi, 2015) Important lesson from the discussion It is important to consider following points in case of cloud computing issues: - Risk management and legal based issues should be defined rightly in the contract between the provider and the customers. There must be transparency about the process and storing of the data. This way, the overall trust between the provider and consumer will be gain some strength (Saha et al, 2014). The service provider must complaint in regulatory and legislative cell, when the consumers require to follow and consumers must have the power to complaint with respective system. The issues as well as the risks associated with it can impact data protection guidelines in Europe and must be considered rightly when cloud computing platforms are rightly located on servers. The line of communication that exist between the provider as well as the consumer must be rightly saved to make sure the process of confidentiality, authentication, integrity and moreover to reduce the risk of denial of service based attacks. An open platform with clear instructions related to measurements that ensure the security of interaction line that is obligatory by nature for any provider and must be based on open as well as transparent standards with technologies (Subashini Kavitha, 2011). The concept of cloud computing provider must also be obliged to make sure that there is data confidentiality. There are number of important deletion of data that must be inculcated into potential regulation of various cloud computing services and it must not depend on too much. The reason that there is no full proof guarantee with complete deletion of data must be considered when data is collected as well as stored. Reference Abbas, H., Maennel, O., Assar, S. (2017). Security and privacy issues in cloud computing. Awodele, O., Adebayo, A. O., Tayo, O. O. (2017). Security and Privacy Issues in Cloud Computing.Communications,7, 14-17. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Jansen, W. A. (2011, January). Cloud hooks: Security and privacy issues in cloud computing. InSystem Sciences (HICSS), 2011 44th Hawaii International Conference on(pp. 1-10). IEEE. Saha, T., Sen, P., Datta, A. (2014). Security and Privacy Issues In Cloud Computing.Communication, Cloud and Big Data: Proceedings of CCB 2014. Sen, J. (2013). Security and privacy issues in cloud computing.Architectures and Protocols for Secure Information Technology Infrastructures, 1-45. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments.IEEE Security Privacy,8(6), 24-31. Tatwani, L. N., Tyagi, K. R. (2015). Security and Privacy issues in Cloud Computing.International Research Journal of Computer and Electronics Engineering (IRJCEE, USA), ISSN. Walia, S (2017). Security and Privacy issues in Cloud Computing.