Tuesday, December 24, 2019

The Four Horsemen - 1414 Words

4 HorseMen Prologue On December 17th 1985 it began. Heaven erupted with a fury like no other. Its gates opened up and a horn blast rang out, with this a white horse appeared. The rider carried with him a crown and a bow. His goal was to spread a war of conquest across his given portion of the Earth. After a short amount of time yet another horn blast rang throughout the earth. A second horse, this one fiery red, appeared through the gate. The rider carried with him a sword held upright as if ready to go to war. He too set off to his given portion of the earth to spread a war among all those who inhabit that land. Shortly thereafter another horn blast cried out. This time a black horse appeared, the rider carried with him a scale. He too had a set goal, his was to spread a great famine like none the earth had seen across his portion of the land, killing all in it. He set off to his allotted section and began his work. Lastly, another horn blasted out. This time the horse was a dilapidated sickly green horse. The rider appeared in a black cloak with a large cowl so that his entire face was hidden. He carried with him a large scythe. He was to spread death to every being who crossed his path in his allotted section of the earth. The White horse held a domain upon the area known as North America. A great war between Canada and the United States broke out. All of South America turned into complete war with no form of government. Within a week the death tollShow MoreRelatedNow You See Me Movie Essay1379 Words   |  6 Pageslot of significant characters. The magicians, known as the Four Horsemen, are our big tricksters in this situation. The first is Daniel Atlas; he is a world renowned magician, who has few nervous qualities about him. He tends to be very similar to our antagonist according to Stephanie Merry who stated â€Å"They’re fun to watch with their sweet delivery of witticisms, but they’re also dismissive and self-righteous.† The next person in the Four Horseman is Merritt McKinney, the Mentalist. We are introducedRead MoreDirected by French film director, Louis Leterrior, Now You See Me tells a thrilling story of1100 Words   |  5 Pageshis father. He does so by continuing the magical legacy of his father and incorporated magic in the course of avenging his father. Dylan avenged his father in a way that was obvious; in front of a large crowd. In the first four scenes of the movie, there is a quick glimpse at four special people in the midst of their profession. Strategically hand-picked by Dylan himself, Henley, the escapist, jack, the slight hand illusionist, Atlas, the ring leader and an illusionist, and Merritt, the mentalist,Read MoreWhat Do You Mean?1076 Words   |  5 Pagesstrangers that they are subhuman cousins?† I retorted, â€Å"Oh by the way kiddies this is my husband Azrael. Brilliant Doctor, surgeon and one of the four horsemen of the apocalypse otherwise known as Death.† â€Å"this is your boss?† Jacob asked throwing me for another loop. â€Å"No. Keep up sweetheart, my boss is the grim reaper my husband is one of the four horsemen. I’d love to stay and chat some more but we have a lot planned†¦Ã¢â‚¬  â€Å"are you sick?† Aaron asked roughly. â€Å"what?† â€Å"he said medical room. Are you sickRead MoreThe Best Heist Film Ever Directed By Boaz Yakin1338 Words   |  6 Pages the teleportation machine that allows The Spectator to transfer from United States to Paris was revealed to the FBI as simply being a secret room underneath the stage design the bank Paris. Bradley had no hesitation to reveal the secrets of the horsemen cut he revealed himself to be someone who devote traditions. The first time the phrase the number one rule of magic is to be the smartest person in the was when Atlas was arrested. after his interrogation scene and when he magically transfers theRead MoreThe Contemporary Art of Atomic Vacation by Todd Schorr759 Words   |  3 Pagespainting with great detail. II. Analysis The subject of this painting is quite obvious. The four horsemen come straight from the New Testament of the Bible when it is depicting what will happen during the apocalypse after the rapture, and the innocent American family out on vacation, not even knowing what was coming their way. The most distinctive feature of this work hands down has to be the four horsemen with the mushroom cloud behind them. The structural organization is horizontally oriented. SenseRead MoreThe Book Of Revelation By John When He Was On The Isle Of Patmos1248 Words   |  5 PagesLamb broke each seal, a judgement is released or an apocalyptic event occurs. The opening of the first seal is described in Revelation 6:1-2, â€Å"And I saw when the Lamb opened one of the seals, and I heard, as it were the noise of thunder, one of the four beasts saying, come and see. And I saw, and behold a white horse: and he that sat on him had a bow; and a crown was given unto him: and he went forth conquering, and to conquer.† (The Thompson Chain-Reference Bible, King James Version, RevelationRead MoreThe Apocalypse Of John s Revelation1844 Words   |  8 Pagesunderstand the meaning behind the book of Revelation, both in literary and in historical context. The first seal is broken and a man on a white horse appears to John. John tells his readers, â€Å"I heard, as it were the noise of thunder, one of the ‘Four Beasts’ saying, come and see. And I saw, and behold a whit horse: and he that sat on him had a bow; and a crown was given unto him: and he went forth conquering, and to conquer† (Revelation 6:1-2). The rider of the white horse is later found to beRead MoreThe Film Calls The Four Horsemen And How They Are Wreaking Havoc On The Global Community1378 Words   |  6 Pagesall of the major financial institution more power to grow because information was available more quickly on new conquest. This paper will explore what the film calls the four horsemen and how they are wreaking havoc on the global community. The narrators suggest we deal with the horsemen before it is too late. The Four Horsemen are as follows: finance, organized violence/terrorism, and poverty along with resource depletion on a global leve l. Corrupt financial system First we have to dealRead MoreThe First Four Seals Show Horses And Riders Essay1656 Words   |  7 PagesIn Scripture, the first four seals show horses and riders in the form of astonishing metaphors, and imagination. Obviously, it is not God’s intention to tell his believers who these people are, but to teach them what to look for during world conditions. These Four Horsemen represent a snapshot of man’s inhumanity to man. They are a prediction of how people behave under extreme conditions when the universe cannot settle God’s real purpose. While this is not new for most governmental leaders, but whenRead MorePersonal Relationship Wellness : Marriage1337 Words   |  6 Pagestying unity, harmony, and communication together to make relationship and marriage work. When a couple who does not have consummate love (intimacy, passion, and commitment), they often portray the six indicators of divorce: harsh startup, the Four Horsemen, flooding, body language, failed repair attempts and reflecting on bad memories (Gottman, 2009). Divorce often occurs within the first two years of marriages and almost half of divorces end within the first seven years (Bhutto-Ramirez, 2015).

Monday, December 16, 2019

Ipod Decision Making Process Free Essays

Describe and explain the characteristics that affect consumer behaviour and outline the consumer decision-making process as it relates to Apple iPod Introduction ‘Consumer purchases are influenced strongly by cultural, social, personal and psychological characteristics’ (Kotler, Armstrong, Wong Saunders). This report will investigate the characteristics that affect consumer behaviour and the consumer decision-process as it relates to the purchase of an Apple iPod. This report will be describing and explaining how consumers go through five different stages to reach a buying decision and outlining the consumer decision-making process when a consumer buys a product. We will write a custom essay sample on Ipod Decision Making Process or any similar topic only for you Order Now The Apple iPod is a brand of portable media players and was launched on October 2001. There are four different types of players, which can play both music and videos, including the ‘iPod Classic’, ‘iPod Touch’, ‘iPod Nano’ and the ‘iPod Shuflfe’. The Apple ‘itunes’ software can be used to transfer music to the iPods from computers. Both the Sony Walkman and Samsung YP-P2 are the iPods biggest competitors and have the same touch screen control panel. They both can hold similar amount of music to that of an iPod. ‘Mintel forecasts that the UK audio equipment market will grow by an estimated 8% to reach a value of ?2. 2 billion at current prices over the period 2007-12. In real terms, with massive price deflation for electronics taken into consideration, this equates to 100% rate of growth until 2012. (mintel, accessed at 19th November 2009) ‘Market growth since 2006 for the Apple iPod has been in decline due to the high pricing scheme of the devices although price cuts like those applied to the iPod shuffle on Tuesday and cheaper Internet –capable models down the line should help the company reverse course and maintain a steady rate of growth through 2009, says one Wall Street analyst’, (http://www. appleinsider. com/articles/08/02/20/growth_potential_seen_in_steadily_maturing_ipod_marke t. html 20th February 2008). The Apple iPod is aimed at young adults aged between 12-25, both males and females. The Apple iPod is aimed at people in the middle/high class and for those who have a particular interest or passion in music. The report will also provide a discussion of the type buying behaviour related with Apple iPods and compare the process with a less complex product, such as a bottle of water in this report. Marketing recommendations will then be given for the purchase of an Apple iPod. The Characteristics that Affect Consumer Behaviour It can be seen that cultural, social, personal and psychological are the four characteristics that influence consumer behaviour. This section will describe how some of the characteristics associate with consumer behaviour when purchasing an Apple iPod. For the social characteristic influence, this can be that the person who is buying an iPod can be influenced by friends, family or any other groups the person is part of, a friend of the person may recommend an iPod to be the best portible audio player to purchase, which would then give the consumer more confidence to buy an iPod. Inspirational groups, such as celebrities who could be seen using an iPod, might have also influenced consumer behaviour. This may influence a consumer, due to the status of a celebrity. Personal characteristics such as the age of a person can affect consumer behaviour. In this case a consumer may be in an age group where it is cool and common to have an iPod, so this would be more of a want for the buyer to have the product. An Outline of the Consumer Decision-Making Process Type of Buying decision behaviour This section of the report will discuss the type of buying decision behaviour associated with the Apple iPod. The decision behaviour for the buyer of an iPod would be complex buying behaviour due to the high cost of the product and is mainly purchase infrequently. It could be said that the consumer has much to learn about the product and may have little knowledge about the product before making a decision to purchase it. For example, an iPod buyer may not know what functions of the product to consider. ‘Many product features carry no real meaning to the great majority of potential purchasers’ (Kotler 2008 page 263, p1). This can relate to the iPod when looking at the memory size and price of the product, a customer may not know the difference between a ‘10GB iPod and a ‘160GB’ iPod. So the buyer will pass though a learning process, first developing attitudes, and then making a thoughtful purchase choice’ (Kotler 2008, page 263, p1). So for marketers of an iPod, they must understand the way a consumer gathers information and the evaluation behaviour of a high involvement product. The advertising and size of the iPod may be used to help make it easier for a consumer to understand what the memory size is of an iPod. Dissonance-reducing buying behaviour can be associated with the buying of an iPod, due to how expensive the product is and how infrequent it is purchased. For example, consumers buying an iPod could face a high involvement decision because of the high price of an iPod compared to a low involvement product such as a toothbrush and how the product can express the consumer, such as the which style and colour of iPod suit the consumer best. The Consumer may evaluate and do some research into the types iPods, prior to the buying decision to make give them more knowledge of the product. An explanation of each stage of the decision-making model This section of the report will explain each stage of the decision-making model for a buyer of an iPod. Below is the five-stage decision making process, buyers go through when they purchase a product. ‘The buying process starts with need recognition – the buyer recognising a problem or need’ (Kotler 2008, page 265, p4). The first stage of the decision making model is where the consumer has recognised a problem or a need. Need recognition In relation to the iPod, is where the consumer has recognised that the product is available to buy and may have dissatisfaction with their current portable audio player. The iPod is not necessary a need, such as food or water. It is more of an individual want and the consumer may have more income spare to purchase an iPod. The purchase of an iPod could be mainly because of its appeal. ‘A need can also be triggered by external stimuli. Anna passes a bakery and the smell of reshly baked bread stimulates her hunger; she admires a neighbour’s new car; or she watches a television commercial for a Caribbean holiday’. (Kotler et al 2008, page 266 p1). This statement states that external stimuli can trigger a need. In relation to the iPod, the external stimuli could be an advert on television or someone in the public using an iPod, who seems to be having a fun with the product. The second stage of the decision-making model is the information search stage. This is the stage where a consumer is aroused to search for more information about the product they have been attracted too in the need recognition stage. ‘The consumer may simply have heightened attention or may go into active information search’ (Kotler et al 2008, page 266 p2). Heightened attention simply means the consumer becomes more receptive to information about a product. The consumer may pay more attention to adverts and products used by friends. Active information search is where the consumer gathers information, such as searching reading material or phoning friends to gather information, this usually depends of drive of the consumer to search for information about a product. ‘The amount of searching she does will depend upon the strength of her drive, the amount of information she starts with, the ease of obtaining more information, the value she places on additional information and the satisfaction she gets from searching’ (Kotler et al 2008, page 266 p2). This statement explains that the more a consumer wants a product, the more searching for information about the product will occur. In relation to the Apple iPod, a consumer may have been aroused by external stimuli such as an advert on television and then may go through active information search, where the consumer can obtain information from any of the following sources: * Personal sources: Family, friends, neighbours Commercial sources: Advertising, salespeople, the Internet, packaging, displays * Public sources: Mass media, consumer-rating organisations * Experiential sources: Handling, examining, using the product Personal sources can be the most effective for some products, as friends and families recommendations can be more reliable than an advert on television. As more information has been gathered from the above sources, the consumer’s knowledge of the iPod increases. The consumer may know the different types of iPods available and their features that best suit the con sumer. The third stage of the decision-making purchase is the information evaluation or evaluation of alternatives. This is the stage of the decision-making process, where the consumer uses information from the previous stage to evaluate other brands, products and services. The consumer also evaluates the benefits and features of the product they are going to buy. For high-involvement products such as the Apple iPod, the consumer is more likely to carry out a more extensive evaluation. Such as evaluating the advantages and benefits of the product they are interested in purchasing. How to cite Ipod Decision Making Process, Essays

Saturday, December 7, 2019

Challenge of Cyber Supply Chain Security - MyAssignmenthelp.com

Question: Discuss about the Challenge of Cyber Supply Chain Security. Answer: Introduction Cyber security is a combination of many technologies whose main target is to protect computers from threats like virus and hacking. There are many ways which can pose threats to the computers and most of them are based on the internet so any computers which are used for internet services are at risk. One of the main threats is cybercrime which can be defined as any attempts which are tried via the internet to cause damage to computers (Sunde et al., 2017). This security-related issues have made customers to loose trust in different companies hence making a great challenge to any business which is carried out online. Once a company is subjected to a cybercrime its data may be stolen and the hackers demand money in exchange of the stolen data. This crime is carried out in different ways which may include social engineering, hacking, or use of fake emails. All these methods are equal to the risks they pose to any company which becomes a victim of the crime. In many instances, companies have strategies which are put in place to make sure that they dont fall victim of cybercrime but after all, they find themselves in the situation. In the past years, cybercrime has been growing at a high rate a fact that has led to many challenges concerning cyber security. The more the cyber security grows the more the cybercrime grows hence becoming very hard to totally curb the vice. One of the main challenges of cyber security is that those people who are concerned with it are the same people who carry out the crime in many instances. This study will focus on determining the challenges which cyber security is experiencing in the current world. After the end of the study, recommendations will be made on how to solve those challenges. The main objective of this study will be to evaluate the challenges which are facing cyber security. The following are the other objectives of the study. To access how the challenges affect different types of businesses which are carried online To evaluate the main factors which have led to the increase of the cyber security challenges To discuss the level of cybercrime for the past two years To determine the sectors which have many cyber security challenges What are the main challenges facing cyber security? How do those challenges affect businesses which are carried online? What is the level of cybercrime for the past two years? Which sectors have been affected more by cybercrimes? Project scope This study will be carried out online by the use of the survey. It will be limited to specifically chosen people to participate on the study since cyber security is a global issue. The study will not be focused on one area because that may not give out accurate results hence data will be collected globally by use of online surveys. Cyber security can well be defined as a combination of different technologies which are put in place to curb, minimize or eliminate cybercrime. On the other hand, cybercrime can be defined as the process of accessing other people information without their consent via the internet. In the current situation, it seems that cybercrime has overtaken cyber security hence posing a great danger to on how to handle it. The following discussion will summarize the history of cybercrime. The first machine which was used for hacking was called Engima and was created by Alan who became the pioneer of the modern computer science (Schjolberg, 2014). This machine was used for hacking and the owner of the machine basically focused on getting data from un authorized sources. The first greatest attacks occurred back in 1989 in the National bank of Chicago where huge sums of money were stolen from the bank hence marking the start of the modern cybercrime (Pereira, 2016). In the recent years, cybercrime has become a threat to national and international security as it continues to grow every day with new techniques which are adopted every day by the hackers. This has posed a threat to the cyber security which seems to grow slowly. There are many areas which hackers focus while carrying out cybercrimes. These areas include, emails, social media sites, websites designed for businesses, and other areas like ATMs. All these areas have security measures which have been set but they seem not to be able to solve the problem of cybercrime. Hackers, most of the time focus the big companies which they know if they succeed they get a lot of money hence those companies are in great danger of cybercrimes every day. Classification of cyber crimes Cybercrimes are classified in different categories depending on the type of the crime. The following discussion will analyze all the classification and how they are carried out. This is crimes which are related to money. Fraud is any act of misinterpreting information with the main goal of stealing (Douglas et al., 2013). The hackers can create a page which looks similar to the true pages of the site they are intending to steal from and then when a staff member sees the created page, he or she ends up signing in on that page hence giving out important information which is later used to carry out crimes. This crime occurs when hackers deny the owners of websites, emails or any other form of social media communication methods an access on those sites unless they give out money. This crime if the most common and it affects many companies in the world today. The targeted companies end up paying the hackers the money they demand hence so as to allow them to access their information. This type of crime involves any actions of terrorism which are carried out online. Hackers may target different sites of national security to hack them so as to get information which will help them carry out terrorism acts (Uma and Padmavathi, 2013). Once the hackers get the data they go on with their mission of carrying out the crimes which have many effects to people. Security agencies face this challenge of how they should eliminate this vice since it leads to deaths of many people if the hackers mission was to carry out an attack in a given country or area. Challenges facing cyber security Cyber security has faced many challenges in the recent years. It seems that many of those challenges are hard to solve since they dont have a specific formula to solve them. The following discussion will highlight some of those challenges. Many companies nowadays have very big volumes of data. These companies end up using the third party to manage their data. These third parties may not be trusty worthy and they can plan cybercrimes for those companies hence making it a great challenge (Linton et al., 2014). Companies lack enough data personnel since it is very expensive to hire them and thats why they prefer the third party to manage data. The systems used to prevent cyber-attacks are not more advanced like the once used by the hackers to carry out cybercrimes (Vandeberg et al., 2014). The hackers first study the systems which the targeted company use for security and develop a more sophisticated system which can be used to carry out the hacking. This poses a great challenge to the companies since they end up becoming victims of cybercrimes. It is evident that those people who carry out cybercrimes are more qualified to develop cyber security but they lack ethics. This leads to a great competition between cyber security system developers and cybercrime system developers. The cybercrime system developers first study the systems of cyber security then develop their own systems for hacking. This makes it very hard to control them hence posing a great danger to all those companies which operate online. Research methodology Research methodology is a scientific method which is adopted in carrying out research and it involves an explanation of how the research will be carried out (Mackey and Gass, 2015). It gives out how data will be collected and analyzed to get a good result. This study will be a quantitative study. Quantitative research is an empirical type of research which is based on empirical data and is carried out in a specified protocol to give out scientific and verifiable results (Claydon, 2015). This type of study has twelve steps which must be flowed to ensure that the results are scientific and reliable. The following discussion will involve the twelve steps of quantitative research. The first step of the study is to come up with a problem which needs to be researched. The problem should be empirical and researchable. It should also be able to give out results which are important (Yilmaz, 2013). The second step of the study is to come up with objectives which should be met by the end of the study. The objectives should be in line with the literature review and the topic under study. The third step is to explain where the study will be carried out. In this step, the scope of the study is explained and justification given why the research will be carried out the specified area. There follow the research questions of the study. The research questions are given out and they should be based on the objectives of the study. Those are the questions which will be answered by the collected data. There follows the research hypothesis. This hypothesis is the ones which are tested using the collected data to give out the results of the study. The hypothesis should be in line with the objectives and the research questions so as give the study a logical order and to make it scientific and more reliable. The next step is a literature review of the study where the researcher reviews the already existing literature on the topic under study. This step is very important because it gives the researcher a solid back ground on the gaps of the study and also gives him or her firsthand knowledge. It also expands the researchers minds on the topic and makes him able to identify the gaps which need further research. The next step is the data collection where the researcher collects data based on the specified target group and allows him or her test the research hypothesis by use of that data (Todeschini and Bacini, 2016). The collected data is important and should be able to answer the research questions. There follows the step of data analysis where the researcher transforms the data into information (Wang et al., 2013). This step is the one which gives out communication about the study and makes the study either reliable or void. The next step is communication of the findings. In this step, the researcher gives out what he or she found after carrying out the study (Babbie, 2015). The last step is recommendations where the researcher explains what should be done to make sure that the problems under study are solved. The Research design is the structure within which a study is carried out. It gives a blue print for data collection and analysis (Neuman, 2016). This study will use a descriptive design which will entail the collection of data by use of surveys (Ary et al., 2013). The surveys will be carried online to collect the data. The target population of this study will be companies which carry out their businesses online. The surveys will be posted on those sites for the workers of those companies to fill them and hence the researcher will get data for analysis. The researcher will not limit any person from participating in the survey given that the participant will give out the required data. However, any participant who will not be able to give out the required data, that data will be omitted during analysis. sample of 400 participants. Any participants who will give out irrelevant data, that data will be omitted during the analysis. The researcher will only choose 400 participants who have given out relevant data for analysis. The researcher will only use questionnaires as the main tool for data collection. The questioners are the ones which will be uploaded as surveys online to collect the required data. The researcher will make sure the questions in the questioners are relevant to the study to avoid making the study unreliable. The data will only be collected online and then will be downloaded. The researcher will crosscheck the questionnaires then enter the data into an excel file to make it ready for analysis. This data will be then screened to clean it and make it ready for analysis. There are few limitations associated with this study. The first limitation is that the participants may not be willing participate in the study hence important information may be left out. Also, the participants may give out fake data hence making the research too hard. Another limitation is that he study may not be conducted to a specific group and hence it may attract some people who are not supposed to participate in it. The study will be carried out for a period of two months. The following is a table which included the time schedule of the study. the first month first week 1. Evaluation of the theoretical part of the study 2. Understanding the theory related to the study second week 1. Designing the questionnaires 2. Uploading the questionnaires as surveys to the related sites third week 1. Monitoring the process of survey how it is going on fourth week 1. Evaluating the data collection process second month first week 1. Down loading the filled questioners 2. Cross-checking the Questionnaires second week 1. Coding the data into excel file 2. Data cleaning third week 1. Data analysis fourth week 1. Communicating the findings 2. Recommendations Conclusion This research will be carried out with the main goal of evaluating the challenges facing cyber security. The study will be conducted for a period of two months so as to give the researcher humble time to give out accurate results. The researcher will follow the protocol of the research so as to make it logical and more reliable. This will make it one of the best researchers to be used to solve cyber security challenges. The study will answer all the research questions to make sure it is reliable. It will evaluate the challenges which are facing cyber security, access how those challenges affect businesses which are carried online, evaluate the main factors which has led to increase of cyber security challenges, it will also discuss the level of cyber security challenges for the past two years and determine the sectors which have many cyber security challenges. This will make it possible for the related bodies to take action on how to solve those problems and hence improve cyber secur ity. References Ary, D., Jacobs, L. C., Irvine, C. K. S., Walker, D. (2013).Introduction to research in education. Cengage Learning. Babbie, E. (2015).The practice of social research. Nelson Education. Claydon, L. S. (2015). Rigour in quantitative research.Nursing Standard,29(47), 43-48. Douglas, J., Burgess, A. W., Burgess, A. G., Ressler, R. K. (2013).Crime classification manual: A standard system for investigating and classifying violent crime. John Wiley Sons. Linton, J. D., Boyson, S., Aje, J. (2014). The challenge of cyber supply chain security to research and practiceAn introduction. Mackey, A., Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Neuman, W. L. (2016).Understanding research. Pearson. Pereira, B. (2016). Fighting Cybercrime: From an Abundance of Standards to Their Perfectibility.Revue internationale de droit conomique,30(3), 387-409. Schjolberg, S. (2014).The History of Cybercrime: 1976-2014. BoDBooks on Demand. Sunde, I. M., Flaglien, A., Dilijonaite, A., Hamm, J., Sandvik, J. P., Bjelland, P., ... Axelsson, S. (2017). Cybercrime Law.Digital Forensics, 51-116. Todeschini, R., Baccini, A. (2016).Handbook of bibliometric indicators: quantitative tools for studying and evaluating research. John Wiley Sons. Uma, M., Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification.IJ Network Security,15(5), 390-396. Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., ... De Bos, T. (2014). On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. InProceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium(pp. 13-14). Wang, W., Xu, L., Kong, J., Fan, H., Yang, P. (2013). Quantitative research of histone H3 acetylation levels of human hepatocellular carcinoma cells.Bioanalysis,5(3), 327-339. Yilmaz, K. (2013). Comparison of quantitative and qualitative research traditions: Epistemological, theoretical, and methodological differences.European Journal of Education,48(2), 311-325.