Sunday, December 29, 2019

Several personality charecteristics organizations could influence - Free Essay Example

Sample details Pages: 5 Words: 1457 Downloads: 4 Date added: 2017/06/26 Category Management Essay Type Narrative essay Did you like this example? INTRODUCTION Personality is the view into the human character. The humans interact can be explained through personality. Personality is what gives life into the human race. Don’t waste time! Our writers will create an original "Several personality charecteristics organizations could influence" essay for you Create order So many theories exist to explain personality types and why people act a certain way. Understanding the types of personalities and understanding ones own type can help in interpretation of emotions and social communications. According to Nelson Quick (2006), personality can be defined as a relatively stable set of characteristic that influence an individuals behavior. Personality could be determined by heredity and environment such family, cultural, and educational influence. There are several personality characteristic in organizations could influence the behavior in the organizations. The characteristics are locus of control, self-efficacy, self-esteem, self-monitoring and positive/negative effects. Thus, all the characteristic influence the performance at work, the managers need to have a working knowledge of them. There are also several personality theories which had influenced the study of personality in organizations. The theories are trait theory, psychodynamic theory, humanistic theory and the integrative approach. Based on the theories, there are several method had been invented to assess and measure personality. These include projective tests, behavioral measures, and self-report questionnaires. The several methods are using Meyers-Briggs Type Indicators, Big Five Personality Traits and so on. MEYER-BRIGGS PERSONALITY TYPE INDICATOR One approach to apply personality theory in organizations is the Jungian approach and its measurement tool, the Meyer-Briggs Type IndicatorÂÂ ® (MBTIÂÂ ®) instrument. The Myers-Briggs Type IndicatorÂÂ ® is a self-report instrument that helps to identify an individuals strengths and personality preferences. The mother and daughter team of Katharine Cook Briggs and Isabel Briggs Myers developed the MBTIÂÂ ® instrument to put Jungs type theory into practical use. The MBTI is used extensively in organizations as a basis for understanding individual differences. It has been used in career counseling, team building, conflict management and understanding management styles. The MBTI and psychological type enables a non-critical language to talk about some serious issues, both within an organisation and while helping people. People who complete the MBTI are given a four letter code as their results which indicate their personality preferences as one of 16 Types. Th e different type preferences lead to different ways of living and working, taking in information and making decisions. They describe different, effective approaches to working and learning styles and methods, managing, leading, coaching and teaching as well as general communication, teamwork, relationships, and environment. The MBTI is based on a comprehensive and rational theory of personality, applications can be found in almost anything which involves people such communication, leadership, team building, planning, marketing, personal development, career planning, teaching and learning and so on. The main advantage in using the MBTI is its breadth of application. It is in almost any situation and its support by a comprehensive theory of personality. There is no competition to the MBTI in workplace use as there is no comparable theory of personality associated with other methods. PERSONALITY PREFERENCE There are four dichotomies in MBTI with two possible choices for each scale. The combination of these preferences makes up an individuals type. Extraversion (E) and Introversion (I) Extraversion and Introversion preference represents where you get your energy whether people gained their personal energy from the outer or the inner world of thoughts, ideas and concepts. The Extraverted type is energized by interaction with other people. The Introverted is energized by time alone. This preference also differentiating people who direct their energy primarily outward toward other people and events from people who direct their energy primarily inward toward their inner environment, thoughts, and experiences The manager who is prefer Extraversion tend to enjoy being with large groups of people and prefer to act rather than reflect and they also tend to predominate in marketing and entrepreneurial spheres, while the manager who is prefer Introverts predominate in professions such as medicine and law, also politics and tend to enjoy quieter activities and to reflect before acting. Sensing (S) and Intuition (N) Sensing and Intuition preference represents perception or how we prefer to gather information. In essence reflects what we pay attention to. The Sensing type of manager pays attention to information gathered through the five senses and to what actually exists. They also could be practical and down to earth, relying on either past experience or what they see in the moment. They also want a specific answer to question and can become frustrated with vague instruction. They enjoy using established skills more than learning new ones. Normally, this type of manager will remain with a same management skill. The Intuitive type of manager will pay attention to a sixth sense and to what could be rather than to what actually exists. They are also visionaries or idealists, more interested in the future, or some timeless principle. These types of manager like to solve new problems and are impatient with routine details. They like to learn new skills more than using them. They tend to thin k about a few things at once. Thinking (T) and Feeling (F) Thinking and feeling preference represents the way we prefer to make decision. The manager with a thinking type will make decision with a logical and objective fashion. They also tend to analyze decisions and try to be impersonal. While managing, they tend to show less emotion and become uncomfortable with people who do. They like to be firm minded and like to putting things into a logical frame work. While the feeling type of manager will makes decisions in a personal and value oriented. Their decisions will be based on how the outcome will affect the people involved. In management, they tend to be more comfortable with emotion in the workplace. They enjoy pleasing people and frequent praise and encouragement. Judging (J) and Perceiving (P) Judging and perceiving represents ones orientation to the outer world and how a person prefers to run their life. It differentiates people who prefer plans and achieving conclusion quickly from those who prefer flexibility. Judging type manager prefer to lead a planned, organized decision making. They like to get things accomplished and do the submission on the date line. They always want to be scheduled and ordered. Perceiving manager may not make a decision until the last possible moment and more spontaneous approach to life and work and resisting closure until its time. They prefer more flexibility and want to keep options open. They tend to collect new information rather than draw into a conclusion. They may start too many projects but not finish them on time. 16 TYPES OF PREFERENCES People who complete the MBTI are given a four letter code as their results which indicate their personality preferences as one of 16 Types. The preferences combine to form 16 distinct types. The dominant mental function is the most distinctive marker of a persons personality type. There are no good and types and each type had its own strength and weaknesses. The combination will indicate type of person personality. Meyers-Briggs had divided the combination into two categories which are primary n secondary personality type. The four primary personality types are based on dominant with thinking, feeling, intuitive and sensing. While from the four primary types they are subdivided based into energy orientation and attitude which are extraversion and introversion. A table below show all the combination of the preferences based on the primary and secondary. Introverted Types Sensing Types Intuitive Types Extraverted types Sensing Types Intuitive types ISTJ ISF J INFJ INTJ ESTP ESFP ENFP ENTP ISTP ISFP INFP INTP ESTJ ESFJ ENFJ ENTJ CONCLUSION Personality assessment is requires to assess the personality for a person. It is important for a person to know their own personality to ensure they got a suitable position for them in organization. In organization, project manager or manager should have a good personality to make sure the entire project run smoothly and finish on time. They all should have a good personality to communicate with client and people that work under him/her. Otherwise, all the work will not be finish on time or not follow all the specification. As a conclusion, every person should know their own personality. It is to make sure they will get a suitable position in an organization. They also will do the work happily and can communicate to each other smoothly. It also to avoid miscommunication and stress among the workers. If you are chosen as a manager, you should act as a manager. Based on the MBTI type indicator, you should have a combination of 16 types of personality to be a good manager. The enti re project must meet the time, cost and scope of the project to ensure the project run smoothly. Thus, the project manager should have a good personality to be a good manager for the project.

Friday, December 20, 2019

Stop The Legal Ownership Of Guns - 893 Words

Americans are faced with the huge problem of violence in the streets, these streets have become a place where old people are beaten for their social security checks, where little women are attacked, where teen aged thugs shoot it out for some turf to sell their illegal drugs, and finally where small children are everyday caught in the way of bullets during drive by shootings. We try to ignore the criminals in our society and how they hurt it, but we should not; we should take actions to stop the illegal acts of these horrible people. Many people try to stand up for our country, but the hard work of some misguided individuals that are trying to stop the legal ownership of guns doesn’t really help fix the problem at all. It takes the guns from the innocent citizens, who simply want means of self defense. Take a look at the history of our country and the huge role guns have played in it. According to the second amendment gun ownership is perfectly legal and guaranteed as a ri ght. There were and still are good reasons for this, luckily they are still practiced today. Back in the old times guns were used for hunting and, on the occasion self defense. But when the colonists of this country had enough of British rule, they picked up there own personal guns and went to war and the British saw first hand how powerful the group of average American gun owners were. Our forefathers knew that if the general population was armed, it would be key in the winning of the war, and itShow MoreRelatedStop The Legal Ownership Of Guns1000 Words   |  4 Pagesto stop the legal ownership of guns, but what most don’t understand is that creating this law does not stop people from owning and using guns. People still buy and use drugs and they are illegal. What makes others think that a law will hold people back? Look at the history of America and the role guns have placed in it. Gun ownership is perfectly legal and guaranteed as a right according to the second amendment. There were and still are good reasons that these are practiced today. Since guns wereRead MoreThe Issue Of Gun Control1542 Words   |  7 PagesGun control refers to the regulation of the manufacture, selling, owning or use of guns or firearms. That has been a very controversial debate, with one side saying that there should be no gun control at all because it leads to crime and accidents, while on the other hand, other people claim that one should be allowed to own a gun if they can afford, for their safety. There have been various incidents of accidents, and others have even led to death. However, the debate remains the same. TheRead MoreGun Control Is Necessary, And Delay Means More Death And Horror1305 Words   |  6 Pages â€Å"Yes, people pull the trigger - but guns are the instrument of death. Gun control is necessary, and delay means more death and horror.† This was written by the former New York Governor, Eliot Spitzer, just after the 2012 shooting in Oak Creek Wisconsin. Because I agree with Spitzer, I would like to affirm the resolution which states Resolved: In the United States, private ownership of handguns ought to be banned. For simplicity in the debate today, I would like to offer the following definitions:Read MoreThe Issue Of Gun Control Essay1622 Words   |  7 PagesGun Control Does Not Equate to Less Gun Violence Civilian gun ownership has been debated, banned, allowed, and limited for as long as firearms have been used as a weapon against another human. Many arguments have been proposed over time about why civilians should, or should not be afforded the right to bear arms. What seems to be the most common modern opposition is that there is truly no need for civilians to own a gun, in this day and age. Many who oppose guns simply think less guns, less gun violenceRead MoreThe National Crime Victimization Survey1355 Words   |  6 Pagesman pointed a gun at the boy, the boy shot the man. Who knows what could have happened if this boy didn’t have a gun. Him and all three of his young siblings could have been shot and killed. Guns save lives, and in a nation that already has more than 200 million guns, gun control does little other than make the work of rapists, robbers, murderers and psychos easier. When faced with gun control laws, the law abiding citizen has no choice other than to di sarm or become an outlaw, but people with badRead MoreGuns And Their Effect On Gun Control962 Words   |  4 PagesGuns and the ability to use them have been under attack in the United States and many other places throughout the World. There are groups of people that believe that as long as we have the right to bear arms that many unprotected people will lose their lives due to gun violence. There are many trends that come with gun violence and where these mass shooting occur, but a main one is that when a place legally prohibits carrying a weapon then that is where the most gun violence happens. Where guns areRead MoreThe Issue Of Gun Ownership1502 Words   |  7 Pagessecurity of a free State, the right of the people to keep and bear Arms, shall not be infringed†, protects the private ownership of them. The Supreme Court has consistently ruled against gun bans or regulations as violating the 2nd amendment. In the landmark ruling Heller vs. District of Columbia in 2008, t he Supreme Court ruled that a thirty-two year ban on the private ownership of handguns in the District of Columbia was unconstitutional. The Supreme Court decided that the Second Amendment impliesRead MorePersuasive Essay On Gun Control1636 Words   |  7 PagesOn an average day, 93 Americans are killed with a gun (Everytown). Beginning with the National Firearms act of 1934, gun control has been a controversial topic in American society and politics. Gun control is a set of laws aimed to limit the production, distribution, possession and modifications of fire arms utilized by civilians. Presently, the United States outlaws the selling, and ownership, of fully automatic weapons but allows the distribution of semi-automatic weapons. Purchasing extended magazinesRead MoreShould The Right And Bear Arms Be Controlled? Essay1572 Words   |  7 PagesAmericans love of guns was established from the Second Amendment of the Constitution, they are granted an inalienable right, which is the right to keep and bear arms. Many believe that gun represents the heart of the nation’s foundation and identity, a symbol of freedom. However, there are ongoing controversial gun issues. Should the right to bear arms be controlled? What is the extent it should go? Is gun control not infringing the right to bear arms? Few public policy debates are products of misinformationRead MoreEssay about The Pros and Cons of Gun Control1657 Words   |  7 PagesThis essay will discuss the pros and cons of gun control. Some U.S. States have already adopted some of these gun control laws. I will be talking about the 2nd amendment, public safety, home safety, and do gun control laws really control guns. I hope after you have read this you will be more educated, and can pick your side of the gun control debate. So keep reading and find out more about the gun control laws that the federal and some state governments want to enforce on U.S. Citizens. Firearms

Thursday, December 12, 2019

Secure and Constant Cost Public Cloud Storage †MyAssignmenthelp

Question: Discuss about the Secure and Constant Cost Public Cloud Storage. Answer: Introduction The cloud is referred to accessing of computer, software applications and information technology (IT) through an online network which is accessed through data centres using an internet connection or wide area networking (WAN). Cloud storage is referred to a cloud computing model which assists in storing data on remote servers that can be accessed by the internet. The cloud storage is maintained, managed and operated by a cloud storage provider from storage servers that are built on virtualisation techniques (Wu et al., 2010). The popularity of cloud storage is growing continuously as more and more corporations use it to store their business data. With the popularity of smartphones and high-speed internet, the popularity of cloud storage has increased among people as well. People use cloud storage to store their personal files such as photos, videos, music, documents and others. Cloud storage provides a number of advantages to businesses and people such as easy access to data, lack of physical documents, data can be accessed through worldwide networks and others. Along with merits, the number of risks relating to cloud storage are growing as well such as the risk of cyber-attacks, dependability on the internet, the risk of data loss, and others (Harnik, Pinkas and Shulman-Peleg, 2010). While choosing a cloud storage model in a business or for personal use, organisations and people are required to analyse its advantages and disadvantages to ensure that it is a suitable option for them. This report will focus on analysing the cloud storage technology and its popularity amount modern organisations and people. This report will discuss advantages and disadvantages of cloud storage technology by evaluating different business examples. Further, recommendations will be given in the report that can be implemented by organisations and people for addressing different issues relating to cloud storage technology. Cloud Storage Technology Cloud storage model is referred to an online data storage system in which organisations and people can store their data in online networks that can be accessed through the internet. The services of cloud storage are provided by cloud service providers who invest in creating large data centres in which organisations and people can store their data. The cloud storage technology is a way of storing data on the internet rather than using on-premises arrays (Chunhua, 2010). Generally, organisations purchased cloud storage as service and delivered on demand in order to get just-in-time capacity for storing data. Cloud storage vendors provide its services by building and operating infrastructure that manages capacity, durability, and security in order to ensure that data is accessible to application and businesses around the world. Applications use and access cloud storage directly through an API or traditional storage protocols. Many cloud storage service providers offer complementary serv ices which are designed to help in collecting, analysing and managing data at massive scale. Cloud storage eliminates the requirements for managing, buying and handling personal cloud storage infrastructure for the company. It assists in increasing agility and providing global-scale services that can be delivered anytime anywhere. Popular cloud storage service providing companies include Google Drive, One Drive, Mass, Amazon drive, Box, Dropbox and others. These services can be accessed by people as well for storing their personal data. The cloud storage technology has gained massive popularity in technology industry than compared to its similar technologies such as Client-server computing model, Fog computing, Peer-to-peer model, and Grid Computing (Liu and Dong, 2012). The cloud storage technology has a substantial advantage over these technologies because it uses minimal resources and requires minimal supervision. In cloud storage, data can be accessed by anyone around the world which makes it a suitable for modern multinational companies. Type of Cloud Storage Along with the increase in cloud-based solutions, the nature of cloud storage services becomes more complex as well. There are three major types of cloud storage services which include public, private and hybrid cloud storage services. Private Cloud: The private cloud services are tailored in order to accommodate and handle data requests from large organisations as well as small home-based companies. There are two types of private cloud: on-premise and externally hosted cloud storage. On-Premise cloud infrastructure is found in the same building whereas externally hosted cloud storage is not situated in the same building. In both these models, the company itself creates, manages and handles the cloud storage facilities (Morris, 2018). Public Cloud: In this model, organisations are not required to concern about maintaining of the data servers. Companies use services of third-party cloud service providers who create and maintain a cloud storage facility (Goyal, 2014). Hybrid Cloud: In this model, features of both public and private cloud are included and it provides greater customisation options than others. Advantages of Cloud Storage The main advantage of using cloud storage is that it allows companies and individuals to cut back on operating costs than compared to external hard drives or in-house hosting solutions. With cloud storage service, corporations can have total ownership over cost because there is no hardware to purchase. Organisations can add or remove the storage capacity on demand based on a quick change in performance and retention characteristics (Kondo et al., 2009). The companies also required to pay only for storage which they actually use. Additionally, the data which is less frequent can be accessed by the firm and it automatically moved by the cloud service provider to lower cost services according to driving economies of scale and auditable rules. Furthermore, based on recent online polls, the average cost for using cloud storage services costs around 3 cents for one gigabyte of storage space (Baiju, 2014). Users can also see additional costs saving because they did not have to invest in int ernal power for storing information remotely. In cloud storage technology, stored files can be accessed from anywhere by a company or individuals by using an internet connection. People and organisations can access all their files, photos, videos, music, and folders in the cloud from anywhere in the world by using necessary credentials and internet access (Holmes, 2017). It is highly recommended for businesses that they keep an emergency backup plan ready in case an emergency occurs. One of the biggest advantages of cloud storage technology is that it enables companies to have a backup solution in case anything goes wrong. Organisations can use cloud storage services as a backup plan which provides them a second copy of importance business files. These files can be accessed through an internet connection, and they are stored at a remote location. In case anything happens to the files in a computer, those files can be accessed through the cloud and retrieve any time which assists in recovering damages to lost data (Wang et al., 2010). Cloud storage services provide the facility of syncing which means if a person makes any changes to one or more files, the cloud will automatically synchronise such changes to the files across all affiliated devices (Li et al., 2013). Generally, most cloud storage providers add extra layers of security protocols in their data servers to increase their security. They also use encryption to avoid any unauthorised accessed to the data. High level of security ensures that confidential files and folders of a company did not end up in wrong peoples hand or bring lost (Bigger, 2018). In cloud storage services, when development teams are ready for execution, the cloud storage infrastructure never creates any issues or slows them down. It allows IT to deliver the exact amount of storage needed to developers, right when it is required. This facility enables IT to focus on solving complex problems rather than focus on managing storage systems (Amazon, 2018). Disadvantages of Cloud Storage While using cloud storage services, organisations face concerns regarding security and privacy of valuable and significant information since it is stored remotely. Use of cloud storage requires companies to give sensitive business information to a third party cloud service provider; it increases the risks faced by the corporation. The third party can leak such data, or lack of security measures can result in causing a breach of such data. A carelessness of employees or leak of the password can result in compromising confidential business data (Wang et al., 2013). One of the biggest disadvantages of cloud computing is that no cloud provider can claim immunity to service outages or downtime. Cloud storage services relied on an internet connection to work which means that an individuals access to his/her files is fully dependent on the internet connection which means that he/she cannot access files due to lack of internet connection or slow internet speed (Martini and Choo, 2013). Additionally, just like hardware, the cloud storage platforms can fail as well due to multiple reasons which block the access of a user to his/her files. The downtime of servers can result in stopping the work which can result in causing financial damage to an organisation. The use of cloud storage makes a companys data vulnerable to cyber-attacks. Cloud storage services enable companies to access their data from anywhere which means cybercriminals can breach companys data via hacking and use it to gain unfair advantages. Similarly, private data of people can also lose in case their cloud storage gets hacked. For example, Apples cloud storage service iCloud was hacked by cyber criminals in 2014 which resulted in leaking more than 500 private photos of celebrities which were posted all over the internet (McCormick, 2014). It shows that use of cloud storage poses security and privacy risks for organisations and individuals. With the growing demand for cloud storage, the price of services might increase and tend to add up in the future. The companies also require paying lifetime costs in order to access their data. For businesses, lease payments might look appealing, however, in the long run, they result in increasing overall costs of the firm (Yuan and Yu, 2013). Limited Control and Vendor Lock-in To varying degree, organisations and people have limited control over the functions and executions of cloud storage infrastructure. The use of cloud storage requires companies to comply with different policies and legal requirements which impose limits on their operations. The users might also face the issue of inflexibility because they are requiring complying with the terms of the cloud service provider. Users find it difficult to change their cloud service provider because they might make the process of transferring the data difficult. Many vendors deliberately attempt to lock-in their users with the assistance of proprietary software or hardware (Abu-Libdeh, Princehouse and Weatherspoon, 2010). It makes the process of changing the cloud storage vendor substantially difficult and expensive for users. Recommendations Following recommendation can assist organisations can addressing the issues relating to cloud storage and increase its effectiveness. Companies should clearly identify their data and processing operations which are suitable for cloud storage in order to reduce overall costs. For example, corporations can avoid using cloud storage for personal, sensitive or confidential data to reduce the risk of cyber-attack. Before selecting a vendor, companies should analyse their own requirements for technical and legal security. They should carry out a risk analysis to ensure that cloud storage provider is taking appropriate security measures. Users should carefully select between public, private and hybrid cloud storage option based on their requirements. Corporations should ensure that cloud storage vendors offer appropriate services with effective security measure, and they did not implement complex regulations to lock-in the users. Conclusion In conclusion, cloud storage model allow organisations and individuals to store data on remote servers which can be accessed through the internet. There are different types of cloud storage which include public, private and hybrid cloud. The advantages of using cloud storage include reducing costs, global accessibility, automatic synchronisation between platforms, increased security, disaster recovery, and reduction in time of deployment. Along with benefits, there are a number of limitations of using cloud storage as well such as increased vulnerability to cyber-attacks, security and privacy issues, vendor lock-in, limited control, downtime, and lifetime costs. Different recommendations are provided in the report which assists organisations in addressing issues relating to cloud storage such as careful selection of a vendor, risk assessment, right cloud type selection and others. Effective use of cloud storage can increase efficiency in a company and sustain its future growth. References Abu-Libdeh, H., Princehouse, L. and Weatherspoon, H. (2010) RACS: a case for cloud storage diversity. InProceedings of the 1st ACM symposium on Cloud computing(pp. 229-240). ACM. Amazon. (2018) Cloud Storage. [Online] Amazon. Available at: https://aws.amazon.com/what-is-cloud-storage/ [Accessed on 27th March 2018]. Baiju, N.T. (2014) 5 advantages and disadvantages of Cloud Storage. [Online] Big Data Made Simple. Available at: https://bigdata-madesimple.com/5-advantages-and-disadvantages-of-cloud-storage/ [Accessed on 27th March 2018]. Bigger, J. (2018) 5 Advantages Cloud Storage brings to businesses. [Online] Marco. Available at: https://blog.marconet.com/blog/5-advantages-of-cloud-storage-for-businesses [Accessed on 27th March 2018]. Chunhua, Z.K. (2010) Cloud Storage Technology and Its Application [J].ZTE Communications,4, p.013. Goyal, S. (2014) Public vs private vs hybrid vs community-cloud computing: A critical review.International Journal of Computer Network and Information Security,6(3), p.20. Harnik, D., Pinkas, B. and Shulman-Peleg, A. (2010) Side channels in cloud services: Deduplication in cloud storage.IEEE Security Privacy,8(6), pp.40-47. Holmes, A. (2017) Advantages of Using Cloud Storage. [Online] Iron Mountain. Available at: https://bsf.co.za/advantages-of-using-cloud-storage/ [Accessed on 27th March 2018]. Kondo, D., Javadi, B., Malecot, P., Cappello, F. and Anderson, D.P. (2009) Cost-benefit analysis of cloud computing versus desktop grids. InParallel Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on(pp. 1-12). IEEE. Li, Z., Wilson, C., Jiang, Z., Liu, Y., Zhao, B.Y., Jin, C., Zhang, Z.L. and Dai, Y. (2013) Efficient batched synchronization in dropbox-like cloud storage services. InACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing(pp. 307-327). Springer, Berlin, Heidelberg. Liu, K. and Dong, L.J. (2012) Research on cloud data storage technology and its architecture implementation.Procedia Engineering,29, pp.133-137. Martini, B. and Choo, K.K.R. (2013) Cloud storage forensics: ownCloud as a case study.Digital Investigation,10(4), pp.287-299. McCormick, R. (2014) Hack leaks hundreds of nude celebrity photos. [Online] The Verge. Available at: https://www.theverge.com/2014/9/1/6092089/nude-celebrity-hack [Accessed on 27th March 2018]. Morris, S. (2018) Cloud Types: Private, Public and Hybrid. [Online] Asigra. Available at: https://www.asigra.com/blog/cloud-types-private-public-and-hybrid [Accessed on 27th March 2018]. Wang, C., Chow, S.S., Wang, Q., Ren, K. and Lou, W. (2013) Privacy-preserving public auditing for secure cloud storage.IEEE transactions on computers,62(2), pp.362-375. Wang, C., Wang, Q., Ren, K. and Lou, W. (2010) Privacy-preserving public auditing for data storage security in cloud computing. InInfocom, 2010 proceedings ieee(pp. 1-9). Ieee. Wu, J., Ping, L., Ge, X., Wang, Y. and Fu, J. (2010) Cloud storage as the infrastructure of cloud computing. InIntelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on(pp. 380-383). IEEE. Yuan, J. and Yu, S. (2013) Secure and constant cost public cloud storage auditing with deduplication. InCommunications and Network Security (CNS), 2013 IEEE Conference on(pp. 145-153). IEEE.