Monday, December 30, 2019

The World Of Internet And Social Media - 2396 Words

Despites their advantages can the Internet and social network be misused to exert political violence? Does and or should it make a different in what political system this is taking place? Introduction There has been a new world created out of technology and that world is now affecting and dictating the functionality of our entire world. This new world is called the world of Internet and social media. The world of Internet and social media has now created a new form of citizen who are called users, and these users uses the Internet and social media to do manage their day-to-day activities. It not just the only day-to-day activities that the Internet and social media are getting involved with, they have also redefined the way we do things including how we react to world events, travel, send messages or information, source for information, where to sell and buy products, how and when to make payment for product purchased, and in fact, in order for patient to get an adequate treatment in the hospital or for student to be taught well in schools by teachers or lecturers these days, an internet is required as well as social media to get feedbacks from the patients and student respectivel y (Dawson, 2015: 15-47). It expedient to note that social networking can only be available on a compatible Internet devices as internet appear to be the only medium through which social network activities can be performed. Also, there is one unique feature that emerges from social media i.e.Show MoreRelatedSocial Media And Its Effects On The World Today Without The Internet1318 Words   |  6 PagesYou have to admit – it’s hard to imagine the world today without the Internet. However, it seems it’s hard just for some us. A recent study from the B2B research firm Clutch, revealed that more than 46% of small businesses in the United States still don’t have a website for their company. Numerous reasons were listed for not having an online presence, for instance, around 12% of small business representatives said that they use social media networks in place of static site. But the most popular reasonRead MoreInternet Is A Tool That Connects People All Around The World Through Social M edia976 Words   |  4 PagesInternet is a tool that connects people all around the world through social media. Clinicians working with adolescents have started to realize how important it was to start to understand the impact of electronic media, the internet, technology, all sort of things on the young people. It is very difficult to understand the old people that there has been a radical change in relationship even between young people because of these new tools. In the past children were really a time of emotional, secrecyRead MoreSocial Media And The Internet1564 Words   |  7 Pagesassociated with social media and the Internet. Many years ago, before phones and computers were invented, simply going outside to play was a great way to spend time with friends and be entertained. Technology has evolved greatly since these days. Teens can communicate, post pictures, and search anything on the Internet nowadays. Although social media is a very big hit in this century, the real qu estion is, is it safe? What does the use of social media and the Internet lead teens to do? Social media and theRead MoreThe Bill Of Rights And Freedom Of Freedom1470 Words   |  6 Pagesside, Side A is some believe that social media should censor what we show to everybody because everybody may be shocked by it. Another side, Side B is some people believe that social media shouldn’t censor what we post because people should accept how in the world it isn’t all nice and fun it can be mean, dangerous and hurtful, but we learn from that and it is much better than knowing and not being scared of what is being posted. Some people believe social media should censor because they believeRead MoreThe Bill Of Rights And Freedom Of Freedom1470 Words   |  6 Pagesside, Side A is some believe that social media should censor what we show to everybody because everybody may be shocked by it. Another side, Side B is some people believe that social media shouldn’t censor what we post because people should accept how in the world it isn’t all nice and fun it can be mean, dangerous and hurtful, but we learn from that and it is much better than knowing and not being scared of what is being posted. Some people believe social media should censor because they believeRead MoreThe Effects Of Social Media On Society1328 Words   |  6 PagesSocial Media â€Å"Those that interact via social media on a daily basis are five times likelier to use tobacco, three times likelier to use alcohol, and twice as likely to use marijuana† (Stein). â€Å"It is important that parents evaluate the sites on which their child wishes to participate to be sure that the site is appropriate for that child’s age† (O keeffe, Clarke-Pearson). Parents and guardians of teens worry about what they do on the internet, while at the same time, the parents aren’t doing theirRead MoreThe Internet And New Media1504 Words   |  7 Pagespossibilities of human interconnection have transformed the internet, as Bill Gates well says, into the meeting place of world population. The outer shell of the internet and all of its services encouraged over time the materialization of many computer programs, with features that help create numerous digital extensions of the man, giving birth to the online generation. This generation is one that does not conceive life without internet or gadgets, such as mobile phones or iPods and that is moreRead MoreThe Effects of the Internet and the Global Media Market Essay1462 Words   |  6 PagesThe creation of the internet dawned a new way of life for the world in which we live. The internet defies time and space and helps make communication easier and extremely fast, it also helps with networking and connecting people from all over the world making the global implications of the internet absolutely fascinating. Because of this new wave of technology people across the globe are able to communicate and do business with one another on a completely different level. This essay will seek toRead MoreSocial Medi Evolution Or A St ep Back1697 Words   |  7 PagesSocial Media: Evolution or A Step Back In a century where we are living in the future, it can be easy to leave things in the past. Techniques of communication have been altered and now technology presents ways to talk to people around the world. People have access to unlimited resources and everyday society is advancing; or is it? Face-to-face communication is the foundation of our societies and what has brought people together since the beginning of time. Something that has been so crucial in theRead MoreA Persuasive Thesis Statement On Youth And The Internet Essay1276 Words   |  6 PagesWilliam Kandare Ms. Gallos English 3 May 18, 2015 A Persuasive Thesis Statement on Youth and the Internet Dangers of the Internet, Fact or Fiction? Today’s youth are tomorrow’s leaders. They are our future. So what kind of leaders are we creating? What affects the way our children grow up today? Popular opinion today says that excessive use of the internet is damaging to the youth of the world in many ways. One of the most significant beliefs is that kids today don’t exercise enough because

Sunday, December 22, 2019

Self Esteem And Self Efficacy - 993 Words

The main issue is how to make good and accurate decisions. Numerous decisions were made each day and how could we ensure that we make the right decision and what could affect our decision. This is being discussed in the article and it concludes that factors like self-confidence and self-efficacy will have an effect on making accurate decisions. The theoretical perspective used are self-confidence, self-efficacy and calibration. Firstly, the relationship between self-efficacy and self-confidence. Self-efficacy, which is the belief in own ability, is closely related to self-confidence, which is the sense of competence. There’s a proven connection between self efficacy and self-confidence and the performance of various cognitive tasks. Secondly, the relationship between self-efficacy and calibration. There’s empirical evidence to support that there’s a positive relationship between self-efficacy and self-awareness. In addition, studies have shown that self-efficacy has a positive effect on calibration, which results in positive effects in academic achievement, writing and sports. Individuals with high self-efficacy tends to be well calibrated as self-efficacy helps to improve calibration between self-confidence and accuracy. If an individual has high self-efficacy, this empowers him with a greater sense of confidence which enables him to gauge his ability better to make good decisions. Quality of Data and Assumptions Made Primary Data Firstly, SESRS test was orginally usedShow MoreRelatedTheories Of Self Efficacy And Self Esteem Essay1981 Words   |  8 Pageshas defined self-efficacy as one s belief in one s ability to succeed in specific situations or accomplish a task. One s sense of self-efficacy can play a major role in how one approaches goals, tasks, and challenges (Bandura, Albert 1995). Self-Efficacy and Self-esteem are a lot alike in regards to an individual’s belief in their ability to succeed at a task. Self-esteem plays a big role in determining how an individual performs in the classroom. Individuals with high self-esteem do better inRead MoreSelf Efficacy, Self Esteem, And Social Wellness Essay1028 Words   |  5 Pagesproblems. Unhealthy minds and healthy minds will tell you how unclear thoughts affects someone. This brings down the self-efficacy, self-esteem, and self-confidence. There are three steps to prevent suicide, which might decrease the risk of suicide from happening. This might give you a clear idea to help prevent a friend, family member, or anyone from committing suicide. Self-Efficacy Many of us had been though a couple of rough times and some pretty amazing ones as well. Difficult times for mostRead MoreThe Effects Of Self Efficacy On Self Confidence And Self Esteem1570 Words   |  7 Pages Self-efficacy is one reason that people may not start a fitness program or even begin to exercise on their own. If someone is unsure of how to perform a certain exercise or feeling as if they will not be able to stay with a program it can be a deterrent from even beginning. Feeling ridiculed for performing an exercise incorrectly can have an effect on self-confidence and self-esteem. Their perceived notion of how others will view them is very real to them but may be misplaced fear. It becomesRead MoreAffective Factors : Self Efficacy, Self Esteem, And Self Confidence811 Words   |  4 PagesAffective factors: self-efficacy, self-esteem, and self-confidence. Bandura (1994) proposed that individual’s perceived self-efficacy plays a central role in anxiety arousal when encountering potentially threatening situations. According to Bandura, self-efficacy is â€Å"people’s beliefs about their capabilities to produce designated levels of performance that exercise influence over events that affect their lives† (1994, p. 71). In other words, individuals’ perceptions regarding their efficacy are likelyRead MoreHow For Participation Can Impact Issues Of Self Esteem, Self Efficacy And Foreshadow Childrens Outcomes1839 Words   |  8 Pagesfor participation can impact issues of self-esteem, self-efficacy and foreshadow children’s outcomes. There are many different aspects of self, such as self-concept, self-esteem, and self-efficacy that may be hard for an individual to differentiate. According to the textbook, Life-Span Human Development, 7th edition, by Carol Sigelman, on page 348, self-concept is â€Å"your perceptions, positive or negative, of your unique attributes and traits as a person.† Self-concept generally focuses on who one isRead MorePersonal Reflection Paper1149 Words   |  5 PagesReflection paper Self and the concept of self is an interesting topic to many including, psychologist sociologist, philosophers and countless others trying to define the idea of self and what it means to each individual. Every individual has a different idea and thought about self and how self makes up their entire being. Self is made of the human’s own biology his or her cognitive process and perception of one self compared to others. This paper is going to look at the concept of self and how thisRead MoreThe Importance Of Self And Self Esteem861 Words   |  4 Pagesespecially those at a young age to begin to develop self-doubt when receiving so much new information. A positive self-belief system can play a major role in the perception of the child. It is very important to establish a sense of self-esteem and self-efficacy at a young age, because it becomes increasingly easier to branch out of one’s comforts zone to acquire the information needed to develop their knowledge and skil l-sets. Self-Esteem Self-Esteem is the accumulation of â€Å"beliefs about his or herRead MoreSelf Efficacy And Their Performance On Tasks1223 Words   |  5 Pages Self-efficacy is concerned with a person’s subjective judgment of how well they are able to use their own abilities and because of this, self-efficacy is found to be a good predictor of one’s performance (Schunk, 1984, Ouweneel, et al., 2013). This study examined how positive or negative feedback can effect one’s self-efficacy and their performance on tasks. Participants received either positive, negative, or no feedback in-between two spatial reasoning tasks. Their performance was measured alongRead MoreSelf- Esteem Essays1137 Words   |  5 PagesScenario Self Esteem There are many similarities and differences to self-concept, self-esteem, and self-efficacy. Self-concept is the mental image or perception that one has of oneself. Self-esteem is the experience of feeling competent to cope with the basic challenges in life and of being worthy of happiness. Then self-efficacy is confidence in your ability to carry out a specific task in contrast to generalized self-confidence. The only person that can feel self-conceptRead MoreConstruct Development and Scale Creation Essay1465 Words   |  6 PagesCreation Choose a construct you would like to measure. I picked self-confidence. According to Brown (2004) self confidence is defined as ones ability to rely on themselves, to assert oneself socially, regarding what one thinks and possessing the skills to work independently, based on ones learning from personal experience and the ability to make use of prior knowledge. Self confidence measures include self efficacy, self esteem, knowledge and ability to work out problem situations and make informed

Saturday, December 14, 2019

Women in Reservation Free Essays

On Women’s Day (March 8), India witnessed the high voltage drama over much talked Women’ Reservation Bill in the Parliament. The Women’s Reservation Bill is the most essential bill to empower women in Indian politics. According to the bill, women will enjoy 33 per cent of the reservations in the Lower House of the Parliament and Assemblies. We will write a custom essay sample on Women in Reservation or any similar topic only for you Order Now Rajya Sabha, the Upper House of the Parliament has passed the Women’s Reservation Bill on 9 March 2010, this day in India can be termed as one of the historic days in Indian politics. Major political parties were in favor of the bill. The debate in the Upper House was interesting amidst the chaos and drama of the opposing Member of Parliaments. Stand of Political Parties: Thanks to Sonia Gandhi the Chairperson of Congress Party for the introduction of the bill on the eve of Women’s Day. And the support from the Bharatiya Janata Party (BJP) was accolade by the supporter of the bill. The stand of the BJP over the bill is clear and the former Prime Minister of India, Atal Bihari Vajpayee was in favor of the bill. The other parties were in against of the Bill and the supporters of UPA government have threatened to withdraw their support. While talking to NDTV the soon after the bill was passed in Parliament, the Congress Chairperson, Sonia Gandhi was more confident about the bill. She also urged the need of the bill in India politics. Why the Women’s Reservation Bill? The need of the hour is women empowerment. The fact can’t be denied that still after 50 years of getting independence and self governance of Indian democracy, there is need to protect the interest of women in India. The bill will give 33 per cent of compulsory presence of women representing various parties in the Upper House of the Parliament and Assemblies. There is fear of losing elections if the women candidates are allowed to contest from various constituencies, may the right think†¦ [continues] How to cite Women in Reservation, Essay examples

Friday, December 6, 2019

Essential Guide To Data Science Application - MyAssignmenthelp.com

Question: Discuss about the Essential Guide To Data Science Application. Answer: Introduction The Industrial Internet project, an information centric solution, is proposed by General Electric to converge its machines, data and the internet in one connection to provide real-time analysis (MIT Sloan Management Review., 2018). The General Electric is a multinational company with varied companies having different types of sectors and operations. The company has four themes for which they want to provide connectivity to all applications to access them at a single time. The project is to be developed to provide not only as a remote system but effective and secure at all conditions. The report focuses on providing integration by General Electric to manage its information system and data in Industrial Internet project. The report also focuses on explanations based on EAI RA templates and cloud options and suitability. The outline of the report is explanation based on architecture overview and component relationship diagram of EAI RA templates, information management and integration strategies, and cloud infrastructure strategy, application and service integration strategies and recommendations. Discussion The company has proposed Industrial Internet for mainly industries such as oil and gas, power generation and healthcare departments where system failures and unplanned downtime are frequent. These conditions can result in high-risk situations and sometimes life-threatening situations. The Industrial Internet has powerful operations which can detect failures and critical situations and result in saving the company from losing information (Digital and Things, 2018). The company created its own software that is Predix to address the needs of company in terms of digital innovation. The project is explained through EAI RA templates that are architecture overview diagram and component relationship diagram. The other aspects are also discussed and they are strategies for integration of multiple data sources used for different purposes by different teams, suitability of various cloud infrastructure and integration of services and applications. EAI RA Templates Architecture Overview Diagram Component Relationship Diagram Information Management and Integration The present scenario of companies adopting data analytics are for decision-making purposes for their own company in real-time environment. The company needs to extract insights from data in operational areas such as sales department, finance department, marketing department, procurement department and other departments. These departments need to have its own targets for success and analysis of data developed and integrated in each department (Shmueli et al., 2015). The data in each department needs to be separated from other departments to ensure security, privacy and data breaches. This needs to be started by looking at each team individually with respect to success that defines each department. The example includes volume of leads created by marketing department team to be passed on to sales department team for overall target of the company. The next example is that sales department team looks conversely to what marketing department team looks for success and that is they look at v olume of appointments created and converted to new businesses. The information technology department team looks to support greater use of data analytics and turns the business process more successful in getting the right us of data in the company. The data sources are such as networking data sources including web analytics, marketing automation data and CRM data. The data sources are media, cloud, web, IoT, databases in company (Talia, 2013). The media is the most popular source of data analytics in the company. This source is found in every company and it includes Google, Facebook, Twitter, YouTube and Instagram. This media helps to get an insight of consumer preferences and changing trends nowadays. The next is cloud storage which is adopted by most of the companies nowadays. Cloud storage includes structured and unstructured data which is generated. Cloud storage provides public and private clouds which are sourced to make and efficient and economical data sources in the company. The next is web data source. The public web generates data sources in the company. The public web is used to provide free and quick information and diverse usability to the company. The public web data provides company to enjoy the leverage of data without having to develop their own infrastructure (Baesens, 2014). The next one is IoT. IoT is internet of things which is a valuable source of data analytics in the company and it is machine generated content. This is usually generated from the sensors in the company that are connected to electronic device in internet of things. Databases data sources are the major source in the company as database is required in every aspect and segments in company. The databases pave the way for low investment and information technology costs. Database sources are structured as these are arranged formally and can be extracted without any hassle. There are five components in data strategy and they are identification, storage, provision, integration and governing. The identification is done by constructing and sharing data across the company whether structured or unstructured content. The storage is important to retrieve data in future for various purposes in the company (Jaseena and David, 2014). The two types of data that are stored are internal, for example customer details, and external, for example third party data. The data is stored in separate locations from where the data can be easily accessed by the company in future without creating any copy and any misuse. The provision is that all data must be packaged and prepared for efficient sharing among the companys workforce for standard business process. The integration of data is costly in company as it involves not only data extraction transformation or loading process but also moving and combining data across the system (Davenport and Dych, 2013). The governing is to e stablish, manage and communicate information policies and procedures for effective usage of data across the company. The data integration is challenging for information technology department in companies due to high cost. The data integration function works as each application creates its own integration logic and the data contained in each application differ across each application in the company (Gal, 2015). The data sources such as client data, pricing data, sales data and client contacts data are perceived and valued by different applications such as sales department and campaign management department. Application and Data Storage Infrastructure Design The cloud storage is the most necessary asset for every company. The different service models of cloud storage are IaaS, PaaS and SaaS (Rittinghouse and Ransome, 2016). The different deployment models are private cloud, public cloud, community cloud and hybrid cloud. The private cloud is the one where the services and infrastructure are maintained and efficiently managed by the company or third party person. The public cloud is the one where the services stored off-site and it is accessed over the internet by the company. The community cloud is the one which exists where various organizations share access to a particular private cloud having similar security functions and considerations. The hybrid cloud is the one where company takes advantage of both private and public cloud services for its operations (Herbst, Kounev and Reussner, 2013). The service model IaaS is Infrastructure as a Service is buying or renting companys computer system power and disk space frm external providers f or business use. SaaS is Software as a Service and it is the most common among the other models in businesses as it is accessed using a browser on the internet (Mishra et al., 2013). PaaS is Platform as a Service is described as a crossover of both SaaS and IaaS service models. The suitability of cloud storage models are based on services and operations. SaaS is the most familiar and accessible service for customers in real world. SaaS is basically used to reduce the cost of company by removing technical staff to manage install, manage and update software and also cost of licensing software is reduced. This is used on subscription based model. PaaS is provides platform for software to be developed and deployed for company. PaaS provides an environment where clients can deal with server software as well as server hardware efficiently (Wang et al., 2017). This provides scalability for the company on business side. PaaS expands its services when demand grows for resources in company. IaaS is used for company where they need to have complete control over their high performing applications when there is scaling up or down is based on traffic networks. The cloud adoptions in General Electric were due to six reasons (The cloud advantage, 2015). They are speed in implementation and innovation, end-to-end security, low costs, ability to scale, ubiquitous and global visibility and failure of isolation with micro services. The speed provided by cloud storage is efficient and rapid. The security provided by cloud storage is rapid as they patch the vulnerable with latest updates frequently with reduced variations. The lower cost of cloud storage is due to reduction in large scale of big data platform. The ability to scale of cloud storage is advanced and pave ways for customers and businesses to specify the right amount that is needed for their usage by scaling up and down based upon requirement changes. The ubiquitous and global visibility of cloud storage is to provide operation beyond the geographical boundaries for global business optimizations and operations. The failure isolation with micro services of cloud storage provides reusabi lity of software. The company developed its own cloud software that is Predix (GE Digital, 2018). The cloud infrastructure strategies for the company are given in the following discussion. The first one is that cloud computing needs to be more developed and advanced to be adopted by the company as it has trust issues regarding security and legacy systems. The second one is to deliver greater business agility, scalability and support by the information technology department that will be a high priority in coming future. The third one is to tackle with the challenges related to recruiting, training, and retaining of cloud architects, developers, engineers, support staff and service professionals within the company. The fourth one is to measure the contributions of expenses by the cloud storage and managing the cost to maintain the overall financial outcome of the company (Hwang, Dongarra and Fox, 2013). The fifth one is creation of cloud decision framework to keep a track on technology evaluations and c ompany investments aligned with business strategies developed for business growth. The sixth one is mitigating risk and liability for future business operations as they can be cause several risks to company and they should be looked upon. Application and Service Integration The integration strategy for application and services are discussed in the following paragraph. There are two types of application integration and they are automating business process by connecting two or more applications and creating composite application in the company (Bussler, 2013). The first one is solely dependent within an organization where it is sometimes referred to as enterprise application integration and when done between two organizations then referred to as business-to-business integration. The second one is to provide a common front end to a group that has applications existed in the company and easier ad effective to use for the company. Business process automation provides benefits that include four significant points. They are faster process, cheaper process, accurate process and visible process. These are the benefits provided within the organizations. The business process automation across the organization also provides benefits for business process to span fas ter, cheaper and more accurate in terms of business-to-business integration. The other application integration is composite application. The benefits it provides are that employees can do their jobs more efficiently and effectively and it also provides cross-application functions. The strategies for service integration are addressing systematic and effective procedural barriers for collaboration of business processes (Charter and Tischner, 2017). The next one is to integrate services a collaborative group of service providers are needed. This is used to meet the needs of particular client individually. The next is a clear establishment phase where every member of the company agrees on the scope and structure of the business arrangements for future operations. The next is an agreement about the groups that are targeted to assess the business program and the process to assess the program. This is done to integrate the services for business purposes through target groups (Hoffmann, 201 7). The last one is a case plan structure model to be used for guiding assessment and the structure of the case plan. This is the final strategy which results in the case plan model for integrating services in the company. Conclusion The above discussions conclude that the project of the company is valuable and effective in terms of security, cost, speed and real-time monitoring and analytics. The report focuses on the various aspects of project adoption and implementation using the templates given in the discussions. The strategies for data collection from different sources and for different purposes are discussed. The cloud options are also evaluated for different purposes and their suitability for these different purposes. Cloud infrastructure strategy focuses on how cloud strategy is necessary for business purposes and how it can be adopted effectively for future use. The integration of services and applications suggest that applications and services need to be managed and maintained properly. Therefore, it can be deduced that the strategies evaluated and described in the above discussions need to be taken into account for integrating and managing the companys information system. Adding to this, evaluation of what data to be fed into the project is also to be taken into account. Recommendations To begin with the project the company should begin to inventory and share best security practices by establishing common security across the organization. To reorient the overall business strategy of the company to leverage the full potential of latest advancement in the project. To re-examine and update the companys data protection and liability policies timely by policy-makers in the company. To have active participation from stakeholders in the areas related to security, interoperability and management of system risks in the company. References Baesens, B., 2014.Analytics in a big data world: The essential guide to data science and its applications. John Wiley Sons. Bussler, C., 2013.B2B integration: Concepts and architecture. Springer Science Business Media. Charter, M. and Tischner, U. eds., 2017.Sustainable solutions: developing products and services for the future. Routledge. Davenport, T.H. and Dych, J., 2013. Big data in big companies.International Institute for Analytics,3. Digital, G. and Things, E., 2018.Everything You Need to Know About the Industrial Internet of Things. [online] GE Digital. Available at: https://www.ge.com/digital/blog/everything-you-need-know-about-industrial-internet-things [Accessed 1 Jan. 2018]. Gal, A., 2015, August. Big data integration. InKeynote speech at international conference on open and big data (OBD 2015). GE Digital., 2018.GE Announces Predix Cloud - The Worlds First Cloud Service Built for Industrial Data and Analytics. [online] Available at: https://www.ge.com/digital/press-releases/ge-announces-predix-cloud-worlds-first-cloud-service-built-industrial-data-analytics [Accessed 1 Jan. 2018]. Herbst, N.R., Kounev, S. and Reussner, R.H., 2013, June. Elasticity in Cloud Computing: What It Is, and What It Is Not. InICAC(Vol. 13, pp. 23-27). Hoffmann, E., 2017.User integration in sustainable product development: Organisational learning through boundary-spanning processes. Routledge. Hwang, K., Dongarra, J. and Fox, G.C., 2013.Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann. Jaseena, K.U. and David, J.M., 2014. Issues, challenges, and solutions: big data mining.NeTCoM, CSIT, GRAPH-HOC, SPTM2014, pp.131-140. Mishra, A., Mathur, R., Jain, S. and Rathore, J.S., 2013. Cloud computing security.International Journal on Recent and Innovation Trends in Computing and Communication,1(1), pp.36-39. MIT Sloan Management Review., 2018.GEs Big Bet on Data and Analytics. [online] Available at: https://sloanreview.mit.edu/case-study/ge-big-bet-on-data-and-analytics/ [Accessed 1 Jan. 2018]. Rittinghouse, J.W. and Ransome, J.F., 2016.Cloud computing: implementation, management, and security. CRC press Shmueli, G., Bruce, P.C., Patel, N.R., Yahav, I. and Lichtendahl Jr, K.C., 2017.Data Mining for Business Analytics: Concepts, Techniques, and Applications in R. John Wiley Sons. Talia, D., 2013. Clouds for scalable big data analytics.Computer,46(5), pp.98-101. The cloud advantage., 2015. [ebook] General Electric. Available at: https://www.ge.com/fr/sites/www.ge.com.fr/files/The-Cloud-Advantage-whitepaper.pdf [Accessed 1 Jan. 2018]. Wang, L., Ranjan, R., Chen, J. and Benatallah, B. eds., 2017.Cloud computing: methodology, systems, and applications. CRC Press.