Saturday, December 28, 2019

Domestic Violence in the UK - a definition and analysis - Free Essay Example

Sample details Pages: 9 Words: 2724 Downloads: 7 Date added: 2017/06/26 Category Sociology Essay Type Analytical essay Did you like this example? The ability to live free from violence and fear is a basic human right. Sandra Horley CBE, Chief Executive of Refuge. Annual Report, 2014, p 2 Introduction A brief essay cannot detail all aspects of a topic which transcends gender or sexual orientation and encompasses psychological, physical, sexual, financial, and emotional abuse. Domestic violence (DV) includes forced marriage, human trafficking, rape and sexual assaults, honour killings and elder abuse (Crown Prosecution Service, 2015). Don’t waste time! Our writers will create an original "Domestic Violence in the UK a definition and analysis" essay for you Create order While recognising the importance of these issues and acknowledging that men can also be victims, this essay will focus on DV against women. The evidence shows that the majority of victims are women in heterosexual relationships (Department of Health, 2005). Also, as women tend to have overall responsibility for their offspring, it is relevant to discuss the impact of DV on the children involved. Domestic violence against women will be noted in the context of patriarchy, but this essay will also build on the main findings of Dobash and Dobashs groundbreaking research (1979) which helped to identify DV as a separate topic for investigation. Many responses have been developed to meet the needs of victims. This essay will focus on the Refuge model and the newer MARAC inter-agency support structure. For illustrative purposes, case histories will be cited where appropriate. Finally, as modernisation of services has attracted criticism and reductions in funding have put pressure on servi ce provision, the impact of these changes will be considered. Domestic violence is defined as any incident or pattern of incidents of controlling, coercive, threatening behaviour, violence or abuse between those age 16 or over who are, or who have been, intimate partners or family members regardless of gender or sexuality (Home Office, 2013). The Crown Prosecution Service states that one in four women in England and Wales will be a victim of DV during her lifetime (CPS, 2015). International statistics suggest that one in three (one billion women) have suffered DV (Heise et al, 1999). UK police receive one phone call every minute of every day (Womens Aid, 2014) and the British Crime Survey estimated that 12.9 million DV incidents are perpetrated against women over a one year period. At the same time, DV against men accounts for a further 2.5 million incidents (Walby and Allen, 2004). It must be acknowledged that female victims can on occasions be the aggressor. However, the lev el of violence inflicted by men is generally more extreme (Hester, 2009). Repeat victimisation is also more common in DV cases than in any other type of violent crime. The impact on victims is long-lasting. Besides physical injuries, women face increased incidence of depression and suicidal ideation. Psychosomatic disorders are commonplace and there is greater risk of unplanned pregnancy, HIV or STIs (World Health Organisation, 2002). Finally, they run an increased risk of being killed: every week, two women in the UK are murdered by their current or former partner (CPS, 2015). The World Health Organisation estimates that 40-70% of murdered women are killed by their current or former partner (WHO, 2002). Children are also victims. Womens Aid (2015) notes that mothers shield their children to the best of their ability, and may defer seeking help in the belief that the family should stay together. However, 90% of DV incidents are witnessed by children who may also be victims of abuse at the hands of the same perpetrator (Department of Health, 2005). DV has not always been viewed seriously. Early feminists identified violence towards women as a form of patriarchy, arguing that the power relationships inherent in patriarchal society were reflected in male domination of the domestic sphere (Millett, 1970). In 1971, Erin Pizzey opened the first UK Womens Refuge in West London. At that time, DV was rarely spoken of openly but the volume of women and children seeking help forced the issue onto the political agenda. In 1975, the first Government Select Committee was created to investigate DV. They recommended a minimum of one family refuge place per 10,000 people. The following year (1976) the Domestic Violence and Matrimonial Proceedings Act was enacted, offering civil protection orders (injunctions) for those at risk of abuse. The Housing Act (Homeless Persons) 1977 acknowledged that women and children at risk of violence were effectively homeless and had th e right to state-funded temporary accommodation (Isaac, 2014). Domestic violence costs the taxpayer money:  £3.1 billion in 2004 (Department of Health, 2005). However, the cost to the victims is immeasurable. A ground-breaking study of women in a Glasgow refuge confirmed that most abuse goes unreported. Male sexual jealousy was the usual source of conflict. Most women believed the abuse would stop after marriage, suggesting that warning signs were there at an early stage (Dobash and Dobash, 1979). This is supported by a recent SafeLives survey, which found that victims stayed in abusive relationships for around three years during which time they could be assaulted up to fifty times. On average, they saw five professionals in the final year before accessing specialised help (Topping, 2015). Refuge (2014) noted that women using their services had suffered for an average of five years before escaping. The opening of the first Refuge marked a sea-change in service provision . Refuge is now one of the best-known charities involved in the sector, with a network of safe houses across fifteen local authorities. Their experience, garnered over four decades, gives them a credible voice and their three-pronged approach à ¢Ã¢â€š ¬Ã¢â‚¬Å" provision, protection and prevention à ¢Ã¢â€š ¬Ã¢â‚¬Å" has spawned a range of services. Refuge protects women by advocating on their behalf for services, and lobbying for implementation of progressive legislation. They advise other agencies on best practice and campaign to raise awareness of DV by promoting education, training and research. DV should never be taken lightly: 80% of victims suffer multiple types of abuse, including physical, sexual, financial and emotional violence. 55% of women accessing Refuges had been strangled or choked by their partner and 55% had received threats to kill (Refuge, 2014): Michelle was in a coma for thirteen weeks after being savagely attacked by her ex-partner. He hit her with a cro wbar thirteen times. Her children witnessed the assault.   (Refuge, 2014, p 6) Most Refuge residents were denied access to economic resources, including bank accounts or welfare payments. Sometimes debts had been accrued in their name, and they may have been prevented from accessing education or employment. Empowering women to regain financial independence with workshops on budgeting skills and preparation for work courses are key components of the Refuge programme (Refuge, 2014). Activities are organised locally with input from refuge residents, and often reflect the ethnicity of the client group: the Hackney Refuge celebrates Eid and Diwali festivals with the exchange of gifts and special food prepared by the residents. Refuges are sensitive to the cultural needs of minorities, including victims of human trafficking and those with insecure residential status. Special services are staffed by refuge workers (who speak a total of 28 different languages) from the same cul tural background (Refuge, 2014). Ayla suffered years of abuse at the hands of her husband and his relatives before fleeing with her daughter and contacting police. Her husband was arrested; Ayla was referred to the Refuge because of the serious risk of honour-based violence. Her Key Worker introduced her to a local service which provided counselling in Kurdish to help her manage her depression and build up her confidence. She notes: Ayla .. continued to receive death threats from her extended family for leaving her husband. When she arrived at the Refuge, she had some bruising to her face and her right ear. She could not hear in this ear . She was sent for various tests at the local hospital [and] was found to be profoundly deaf in her right ear due to the physical violence she had suffered over the years. (Refuge, 2014, p6) A Refuge is home to the women and children for weeks, months or longer. Two out of every three residents are children, traumatised and needing spe cialist support. Children who witness domestic violence suffer emotional abuse. The effects include anxiety, depression, insomnia, nightmares, bedwetting, truanting, aggression, social isolation and loss of self-esteem. Older children may begin using alcohol or drugs, may develop eating disorders or resort to self-harm. (Womens Aid, n.d.) Specially trained Child Support Workers are in every Refuge. Once life-threatening injuries are dealt with, other needs are assessed. Refuge staff are adept at organising multi-agency interventions, including support for alcohol and drug misuse or mental health issues. Finding a safe permanent home is not easy but women are supported at every stage. On leaving the Refuge, women can access community-based outreach networks providing continued support for their individual needs. Services are currently being stretched to breaking point as funding is slashed. Home Secretary Theresa May has refused to ring-fence budgets for womens refuges, and pub lic policy has changed to offering protection orders to victims and supporting them to remain in their local community. Erin Pizzey, founder of the UK Refuge movement, thinks this is a retrograde step: My therapeutic model included long-term shared accommodation for vulnerable mothers and children. That is still needed. (Laville, 2014). The impact of budget cuts is significant. During 2014, refuges received 20,736 referrals. Of these, 31% around 6,800 women à ¢Ã¢â€š ¬Ã¢â‚¬Å" had to be turned away (Refuge, 2014). New support structures for high-risk victims include MARAC à ¢Ã¢â€š ¬Ã¢â‚¬Å" a Multi-Agency Risk Assessment Conference which brings together social workers, childrens services managers, police and probation officers, drug and alcohol workers, housing officers, mental health officials, medical practitioners, GP link workers, and specialist domestic violence service managers. The concept originated in Cardiff following the deaths of a toddler and an unborn child as a re sult of DV. There are 288 MARACS across England, Wales, Northern Ireland, Guernsey and Scotland, and they usually meet monthly (Tickle, 2014). DV victims deemed at particularly high risk of suffering traumatic or life-threatening events have their cases referred to their local MARAC. Only fifteen out of every thousand cases are men. Panel members contribute their knowledge of each case: rapid decisions are made and actions follow (Tickle, 2014). In one instance a man had made serious threats towards his partners unborn child; child protection social workers were immediately assigned to the case. The victim was unaware of her partners previous convictions for battery. Under the Domestic Violence Disclosure Scheme (Clares Law) it was decided to inform her of his previous history (Tickle, 2014). It is not apparent from these measures just how safe the victim would be, or how confident she would feel, while awaiting more permanent arrangements. Despite MARACs attempts to create a safety net around potential victims, the number of fatalities linked to DV has not decreased. Links between MARACs and multi-agency hubs based in local authority areas are being enhanced to facilitate earlier identification of cases, particularly those involving children. The risk to a child in an abusive household may be higher than the risk to the adult, and many of these children remain unknown to childrens services. However, the multi-agency approach has its critics. Hague (1998) acknowledges the potential benefits of the policy but cautions against over-optimism, arguing that they exclude the main stakeholders à ¢Ã¢â€š ¬Ã¢â‚¬Å" the victims à ¢Ã¢â€š ¬Ã¢â‚¬Å" as contributors, and can provide a smokescreen to disguise inaction. She also predicted the marginalisation of the refuge movement (Hague, 1998). Preparing an abuse victim to leave home and find a place of safety takes time. Tickle (2014) notes: Becoming safer and staying safe are long-term, hard-won goals.    There are many barriers to ending a relationship with an abusive partner, including shame, guilt, lack of support, and financial dependence. Safety is a real concern, and with good reason. Women are considered to be at the greatest risk of homicide at the point of separation or after leaving a violent partner (Refuge, 2015). However, the links between DV services and the Justice system have been considerably strengthened in recent years. Independent Domestic Violence Advocates (IDVAs) are specialist refuge staff based in police stations, hospitals etc, working with high risk women and supporting them through the criminal and civil justice systems. During 2013 à ¢Ã¢â€š ¬Ã¢â‚¬Å" 2014, IDVAs supported 2,642 new women and 2,918 children, including helping 1,024 women through the criminal justice system. 95% of women who wanted to make an official complaint were empowered to do so, and 58% of cases which went to court resulted in a guilty verdict (Refuge, 2014, p 11). Conclusion This essay has shown the extent and nature of DV in the UK and the efforts made to provide support for victims. Services have progressed enormously and DV is no longer treated lightly. Police prosecute when they have the evidence to do so, courts have the power to remove abusers from the family home, and women are becoming more aware of the services available to them. Despite this, women are still at risk. Education and public awareness have roles to play in reducing the incidence of DV. In a multi-cultural society such as the UK, it is also essential that women facing particular challenges because of their ethnicity or cultural heritage have the confidence to come forward and lead by example from within their communities. The Refuge model has operated successfully for decades but it has limitations. Their literature rightly highlights their work with women and children, but it does not clarify what happens to adolescent sons. It seems doubtful that they can be accommodated w ithin a Refuge, even though they are presumably as emotionally damaged as their sisters or younger brothers. The Refuge is probably the safest option for women, but that protection may carry a price they are not prepared to pay. It also seems doubtful that abused women would feel completely safe in their family home with just a court order between them and a clenched fist. The MARAC concept has huge potential and it is encouraging to see cooperation between agencies. However, notwithstanding budgetary pressures, when there is an immediate danger to a woman and her children, it would surely more prudent to arrange safe accommodation rather than to rely on care in the community. Nevertheless, women do move on from domestic abuse and the stories of survivors are truly inspiring. Bibliography Crown Prosecution Service (2015). Domestic Violence. Available at https://www.cps.gov.uk/Publications/equality/domestic_violence.html Accessed 18th June 2015. Department of Health, 2002. Womens Mental Health: Into the Mainstream: Strategic deelopmen o mental health care for women. London, Department of Health. Department of Health, 2005. Responding to Domestic Abuse: a handbook for health professionals. London, Department of Health. Dobash, R, and Dobash, R, 1979.Violence against wives: A case against the patriarchy. New York: Free Press. Hague, G (1998) Interagency Work and Domestic Violence in the UK in Womens Studies International Forum, Vol. 21, No 4, pp 441 à ¢Ã¢â€š ¬Ã¢â‚¬Å" 449, 1998 Heise, L, Ellsberg, M, and Gottemoeller, M (1999). Ending Violence against Women in Population Reports, Series L: Issues in World Health. 1999 December (11) 1 43 Hester, M (2009) Who does What to Whom? Gender and Domestic Violence Perpetrators. Bristol: University of Bristol i n association with Northern Rock Foundation. Home Office (2013) Guidance: Domestic Violence and Abuse. Available at https://www.gov.uk/domestic-violence-and-abuse Accessed 18th June 2015. Isaac, A, 2014. Domestic Violence Legislation in England and Wales: Timeline.   Available at https://www.theguardian.com/society-professionals/ng-interactive/2014/nov/28/domestic-violence-legislation-timeline Accessed 18th June 2015 Laville, S (2014) Domestic violence refuge provision at crisis point, warn charities. Available at https://www.theguardian.com/society/2014/aug/03/domestic-violence-refuge-crisis-women-closure-safe-houses Accessed 18th June 2015 Millett, K (1970). Sexual Politics. New York, Doubleday. Refuge (2014) Annual Report. Available online at https://www.refuge.org.uk/files/Refuge-annual-report-2013-2014.pdf Accessed 18th June 2015 Refuge (2015) The truth is that there are many practical and psychological barriers to ending a relationship with a violent p artner. Available at https://www.refuge.org.uk/about-domestic-violence/barriers-to-leaving Accessed 18th June 2015 SafeLives (2015) Getting it right first time. Executive Summary.   London and Bristol, Safe Lives. Available online at https://www.safelives.org.uk/sites/default/files/resources/Getting%20it%20right%20first%20time%20executive%20summary.pdf Accessed 18th June 2015 Tickle, L, 2014. Domestic Violence; how services come together to support high risk victims. https://www.theguardian.com/social-care-network/2014/nov/25/day-elimination-violence-women-domestic-abuse Accessed 17th June 2015 Topping, A, (2015) Domestic violence could be stopped earlier, says study. https://www.theguardian.com/society/2015/feb/25/domestic-violence-could-be-stopped-earlier-study Accessed 17th June 2015 Walby, S, and Allen, J (2004). Domestic violence, sexual assault and stalking. Findings from the British Crime Survey. London, Home Office. Womens Aid (2014) Annual Survey. Avai lable at https://www.womensaid.org.uk/wp-content/uploads/2015/10/Womens-Aid-annual-survey-report-2014.pdf Accessed 17th June 2015. Womens Aid (n.d.) Topic: Children. Available at www.womensaid.org.uk/domestic_violence_topic.asp?section=0001000100220002 Accessed 18th June 2015 World Health Organisation (2002) World Report on Violence and Health. Geneva: World Health Organisation. Available online at https://www.who.int/violence_injury_prevention/violence/global_campaign/en/chap4.pdf?ua=1 Accessed 18th June 2015

Friday, December 20, 2019

Article Bibliography On Global Warming - 1385 Words

This paper will be concerned with an article pertaining to the topic of global warming. The article, written by R. Cowen, appeared in a November 2006 issue of Science News. The article discusses a recent idea for using technology in order to solve the problem of global warming. Like other technological solutions, this one seeks to reduce global warming without at the same time undermining the existing economic system. In addition, like other proposed solutions, this one is based on the assumption that the global economy requires the continued development of industry, with all the polluting emissions that are caused as a result. This paper will first define some relevant terms, followed by a summary of the content of Cowen’s article. The paper will conclude with my personal reaction to the article, along with my opinion on what I think needs to be done to alleviate the problem of global warming. Some key terms need to be defined in order to clearly understand what Cowen’s article says, as well as what it implies. First, â€Å"global warming† refers to the phenomenon that occurs when certain gases in the earth’s atmosphere (known as â€Å"greenhouse gases†) make it impossible for sunlight to be reflected off the earth and back into space. These gases are created by emissions of carbon dioxide and other pollutants. Most scientists agree that global warming is having a negative impact on the environment. It causes climate changes, the melting of polar ice caps, and a rise inShow MoreRelatedClimate Change : Should We Be Worried? Essay777 Words   |  4 PagesClimate Change: Should We Be Worried? Global warming is one of the most stressed issues on mainstream media today, behind the war on terror. Although, should we be worried about it? In this annotated bibliography, the sources consider plenty of information about climate, such as, how it affects the earth, possible solutions to the energy problem, and proof that global warming is happening and that it is caused by an excess of CO2 in the atmosphere. For solutions to the problem the sources contemplateRead MoreAnnotated Bibliography on Global Warming1303 Words   |  6 PagesGiacomo Real ENG 1302 Comp. amp; Rhet. II Professor Kamm Monday amp; Wednesday 7PM – 8:15PM Annotated Bibliography amp; Essay Annotated Bibliography on Global Warming: Fact or Fiction Fumento, Michael. â€Å"The Cooling Off on Global Warming.† The Washington Times 8 July 1999: 15. LexisNexis Academic . Academic Universe. W. I. Dykes Lib., University of Houston-Downtown. 20 Feb. 2010 http://www.lexisnexis.com.ezproxy.uhd.edu/hottopics/lnacademic/ Fumento explains that a nonprofit groupRead MoreClimate Change Essays1637 Words   |  7 Pagesclimatologists, the notion of Global warming today is commonly heard but very misunderstood. One might ask, what exactly is global warming and should we care? According to What is Global Warming? in LiveScience, global warming is a gradual increase in the temperature of Earths surface and atmosphere, that has become a world-wide environmental issue.1(Lallanilla,2013) Similarly, this topic is one of great controversy because of widely differing opinions on current global warming rates and the impact byRead MoreGlobal Warming s Terrifying New Math1151 Words   |  5 PagesThesis Development: In the article â€Å"Global Warming’s Terrifying New Math†, Bill McKibben opens by saying that back in 2012, according to the statistics, Canada surpassed the global record high for climate temperature, destroying other previous records. Despite the research and the displaying of data, no one is doing anything to address the issue. McKibben takes three distinctive numbers that shed light on this issue 2 degrees Celsius, 565 gigatons, and 2795 gigatons, to validate and support hisRead MoreGlobal Warming And Its Effect On The Environment1311 Words   |  6 PagesIntroduction Global warming refers to an incremental in earth’s temperature. Some believes this is occurring naturally but the prevailing view attributes climate change to the greenhouse effect. The greenhouse effect refers to the warming resulting from certain gases such as carbon dioxide in Earth s atmosphere trapping heat. These gases traps heat but let light in, similarly to the glass walls of a greenhouse. The general belief is that mankind are chiefly responsible for global warming becauseRead MoreGlobal Warming Essay1228 Words   |  5 PagesGlobal warming is the rising of average temperature of the Earth’s atmosphere due to greenhouse gases. Greenhouse gases are gases that trap heat in the atmosphere. The greenhouse effect consists of gases such as carbon dioxide, methane, nitrous oxide, and water vapor insulating the Earth’s surface and helping it maintain warm temperatures. However since there is so much carbon dioxide filling the air the Earth atmosphere absorbs almost all of the suns emission. When the sun heats the earth the atmosphereRead MoreClimate Change And Global Warming1022 Words   |  5 Pagesrelated change in oceans, land surfaces and ice sheets, happening over time scales of decades or longer. It’s the world’s greatest threat. Climate change is the change in temperature over a period of time. It involves the greenhouse effect and global warming. Where is it? It is an issue affecting everyone everywhere. Climate change exists within the Earth’s atmosphere, where temperatures are slowly rising. The Top Ten countries affected the most by Climate Change are generally countries with aRead MoreGlobal Warming Essay1407 Words   |  6 PagesNovember 2014 Global Warming Essay The idea of global became prevalent when the world began industrializing. As the popularity of cars grew and industrial factories began to spring up the air quality suffered. The problem was not recognized because, aside from a few orange skies, there were no obvious effects. Although in this day and age we can see what global warming is doing to our Earth, there are still those people who believe that humans are too small to make an impact. Global warming is tooRead MoreAn Inconvenient Truth Research Paper1374 Words   |  6 Pagesyears to come. This film explores the problem of global warming and what we have to do now in order to slow down or reverse the dangerous effects of climate change. The main theme of this film, is the issue of climate change. He starts out by showing how global warming is caused, how the earth is heated and the atmosphere holds in the heat, but with greenhouse gases, the heat is held in. The greenhouse gas that is responsible for global warming is carbon dioxide, or CO2. A graph was shown thatRead MoreClimate Change And Global Warming1371 Words   |  6 Pagesthe world is facing today. The purpose of this essay is to discuss the processes that lead to climate change and strategies that can be used to address this issue. In order to comprehend how human activities contribute towards climate change and global warming, we have to truly understand the science behind this phenomenon. First of all we need to clarify what anthropogenic climate change means. This refers to the change in the amount of greenhouse gases and aerosols in the atmosphere as a result

Thursday, December 12, 2019

Seminar Paper On Humanitarian Intervention - MyAssignmenthelp.com

Question: Discuss about the Seminar Paper On Humanitarian Intervention. Answer: Introduction Over the past decade it has witnessed a resurgence of the interest in the regulation, and politics of the military, particularly whenever undertaken for which was acknowledged to be the humanitarian functions. Nevertheless, the issue of when, or previously, outside the parties could possibly be legitimately intercede in the sovereign state to address on the massive suffering of the state populace, that is definitely contentions ones. [1]The humanitarian rationale for the utilization of the force that dates going back to the outset of modern state system has continued to come across the resistance, regardless of the apparent appeal. This seminar explores the possibility of the humanitarian intervention as the frame-work for the human security. The paper will certainly objectify the humanitarian intervention that is the element which will make the human security autonomous and will not standalone nor entirely independent from the conventional security. [2]There have been numerous liter atures which confuses the two terms as the synonymous with one another, in which others differentiate them explicitly. Consequently, the essay will certainly address on the ambiguity of each of the conceptions in addition to discuss the humanitarian intervention significantly less diverse concept from the information security but instead claims that it could be part and parcel of it, and a potential frame-work to be able to explain the paradigm of the human security autonomous to the non-traditional security. This involvement desires for the sound, simple and clear element with regards to the human intervention and concerns which are in the middle way for both human security and the non-traditional security with regards to meeting the tangency point. This really is a re-conceptualized model of the human rights. Problem formulation The essay aims to discuss the ambiguity of the conceptions and address the human intervention especially on the aspects to the human security. [3]There will be a feasible frame-work which can describe the paradigm of the human security autonomous to the non-traditional security. This contribution may also address the unambiguous interpretation of the human security particularly to evolving field of the security particularly in the sub-discipline of the international relations. Purpose and hypothetical questions The hypothetical question to highlight is why there is certainly a necessity to separate the human security from the non-traditional security? Within this inquiry there is should consider the aim of the seminar paper as stated before, consequently the question need to fit to the construction of the essay. [4]The proponent may want to emphasize there is not necessary of separating the human security from the non-traditional security since the second hypothesis look at the middle way for the ideas that are conceived. The related literatures have confused on the autonomous of the security from the conception and the increased in the ambiguity that has directed the scholars as well as the practioners in formulating their own interpretations when it comes to the human security and the non-traditional security. Methods This essay will use case study and text analysis in the collecting of the information. One of the case study which will be used is the Kosovo case study which will focus on the study on the US government perspective in regards to the humanitarian intervention. This example is interesting in that it strongly supported and led the NATO countries relative to the scale of the atrocities which are revealed. [5]The case study is also interesting in that it shows the primary reasons for the importance of the humanitarian intervention from the perspective of US policymakers. One of the thing that the case study discuss is on the ethical consideration, and the moral necessity to protect the innocent civilian from the persecution and the ethnic cleansing. Second is on the perspective that it was significant for the US security to maintain the stability of European. This case study will help in learning of the government perspective, as to why humanitarian intervention could be pursued as the f oreign policy objective, when the humanitarian intervention could be regarded justified, and from this analysis could study the status of the current conflicts. Arguments, critics, comparison and analysis The predicament of the humanitarian intervention attracted a substantial attention after the Cold War had come to an end. There are numerous people who considered that the new probabilities of the cooperation were opening between the main powers, and the humanitarian intervention was among the items that were near the top of the agenda. It might be morally desirable to legitimize the practice of the humanitarian intervention, which could be completed in the awareness of the dangers which are inherent in this kind of type of the practices. Depending on the argument of some authors is the fact there is an important battery argument as it pertains realist tradition which are not always appreciated, and this count against the sanctioning to the humanitarian intervention unless this continues to be constrained and regulated properly. According to the argument by Aristotle highlights that the quest for the security continues to be connected with the ideas of the fullness of becoming and also the ideal nature. This has leased out the form of the instinctive striving after the perfection since it is embodied when it comes to the species. When it comes to the Confucius security that is associated to the commitments to various universal principles of the conduct, it can be argued that the ultimate aim all along is to bring about the condition of the universal social harmony as well as the stability. The goodness of the human nature was assumed, and in the event it was damaged could have been restored through proper education.[6] According to critics of Rousseau, is that the quest to the security diverts from the man aim to go back to the natural condition was portrayed as the natural goodness of the man, and his quest to the political legitimacy. Security continues to be the recognition to the rational potential for t he universal peace. Nevertheless, this continues to be critized by the Indian thinker Kautilya who contends to contain the opinion that the universal egoism helps make permanent security to be feasible. He has developed a structure of the security in which this continues to be treated as diverse strategies wherein given, the egoist nature of the man social living or perhaps the security could be made manageable and relative security could be attained. The Italian philosopher by the name Cicero, was the first individual to have come close to identify security as the human security in which has described it as absence to the anxiety upon to which the fulfilment to life might depend on. The arguments of Hobbes on the organized society where the security has prevailed to take place lies in the shadows of the Leviathan ruler, who was ever prepared in using his sword in order to enforce all his conditions to the social contract, and this was the origin choice of the anarchic individuals. This argument has been criticized by Buzan and Waever who have pointed that the premises of Hobbes are very individualistic. Humanitarian intervention framework. The expression to the humanitarian sentiments when it comes to the world of politics is the product to the changing historical as well as the social processes. [7]The world or even the domestic events usually alters or impact various sentiments which individuals experiences. This has been left to the international community to address the graved humanitarian crisis such as what was experienced in country like Rwanda in 199 or Sbrenica in 1995. Currently, Sudan Darfur which is facing this kind of the tragic and the worst problem that could ever occur to a state or a community of individuals. Traditionally, the interventions had been highlighted as the forcible breach of the sovereignty which interferes to the state internal affairs.[8] The legality in regards to the forcible humanitarian intervention is a matter of the dispute between the restrictions as well as the counter-restrictions. The perspective usually pointed out that the states would not intervene to the predominately humanitarian reasons, states not permitted to risk their own soldiers lives on the basis of the humanitarian crusades, claims would certainly abuse their right to the humanitarian intervention utilizing it as the cloak in promoting the national requirements. Additionally, the state would apply the principles of the human intervention selectively. Humanitarians have found scant supports when it comes to the international law. Nonetheless, it is very important observe that the legislation of the international law happens formally as well as informally. The United Nations has increased in playing a more robust role with regards to sustaining the standards of the human security and the justice. Yet, dealing with the humanitarian intervention problem there has been problems for the UN. Nonetheless, UN charter does not assert to the rights of states.[9] The number of the occasions the UN has warranted the interventions due to the gross human rights violation continues to be limited. Moreover, the charter as well upholds to the rights of the people. There are numerous references to which the UN charter has justified the look at that the extreme violations to the human rights offers the basis to justify humanitarian intervention. Summary Humanitarian interventions has been an issue for the discussion for a decade now. After the Holocaust the international community that swore they would not admit to such crimes against the humanity any more. Nonetheless, countries such as Bosnia, Somalia, Rwanda and even Darfur has highlighted that the problem has not been solved. It is reasonable to find that individuals should understand the humanitarian intervention. The outcome of the humanitarian intervention, and ignorance by the world community could be quite different in either case. The question of the USA and the UK credibility level are among the international community which is disputable one. Every violation of the human rights is not justification when it comes to intervention. It all depends upon the nature, scope in addition to the significance of the issue. The circumstances needs to be extreme and life as well as the liberty should be a stake when they were to require the usage of the force, across the international boundary. Numerous situation of the violation should be managed locally, but the local stakeholders. There are merely cases for example the genocide, ethnic cleansing or the systematic massacre of the religious or the natural community that could validate the international response. Even though the issues are continuing to arise there is absolutely no effective mechanisms for the internal influence on the states that are involved. The international sanctions could be ignored and the world community requirement could be neglected. The military sanctions may not be the best way out. There are various major considerations in regards to the humanitarian inter vention that could be adopted. Initially, it is important to ask ourselves if we are sure of the case. The aspect of insecurity and war could be an imperfect instrument when it comes to righting the humanitarian distress.The second issue to ask is if all the aspect of the diplomatic options have been exhausted. The rationale of the humanitarian intervention usually pulls into directions. One hand, is from the realistic point of view, the inviolability of the sovereign rights of the state that is provided supremacy. The states usually are prohibited to utilize the armed forces against territorial integrity of another state, aside from the self defence. Hence, the intervention is not permissible. Alternatively, the intervention is just justified from more liberal method to punish the wrong and to safeguard the innocent. Conclusion The concern of the humanitarian intervention has attracted substantial attention after the cold war that have arrived at an end. There are numerous people who believed that the new likelihood of cooperation which were opening up between the major powers. This seminar paper has studied the probability of the humanitarian intervention as the framework for the human security. The papers has objectified the humanitarian intervention that is the element that has made the human security autonomous. References Bellamy, Alex J, Humanitarian intervention (Routledge, 2017) Benhabib, Seyla, Dignity in adversity: Human rights in troubled times. (John Wiley Sons, 2013) Donnelly, Jack, Universal human rights in theory and practice (Cornell University Press, 2013) Forsythe, David P, Human rights in international relations (Cambridge University Press, 2017) Goodhart, Michael, Human rights: politics and practice (Oxford University Press, 2016) Hehir, Aidan, Humanitarian intervention: an introduction (algrave macmillan, 2013) Kent, Ann, China, the United Nations, and human rights: The limits of compliance (University of Pennsylvania Press, 2013) Kuperman, Alan J, "A model humanitarian intervention? Reassessing NATO's Libya campaign." International Security 38, no. 1 (2013): 105-136. Murdie, Amanda, and Dursun Peksen. "The impact of human rights INGO shaming on humanitarian interventions." The Journal of Politics 76, no. 1 (2013): 215-228. Paris, Roland, "The Responsibility to Protectand the structural problems of preventive humanitarian intervention." International Peacekeeping 21, no. 5 (2014): 569-603. Pieterse, Jan Nederveen, ed, World orders in the making: humanitarian intervention and beyond (Springer, 2016) Smith, Rhona KM. Textbook on international human rights (Oxford University Press, 2016) Tomuschat, Christian, Human rights: between idealism and realism (OUP Oxford, 2014) Weiss, Thomas G, Humanitarian intervention (John Wiley Sons, 2016) [1] Christian, Tomuschat and Christian, Human rights: between idealism and realism (OUP Oxford, 2014). [2] Michael, Goodhart, Human rights: politics and practice (Oxford University Press, 2016). [3] Jack, Donnelly, Universal human rights in theory and practice (Cornell University Press, 2013). [4] Thomas, Weiss, Thomas, Humanitarian intervention (John Wiley Sons, 2016). [5] Michael, Goodhart, Human rights: politics and practice (Oxford University Press, 2016) [6] , Aidan, Hehir, Aidan Humanitarian intervention: an introduction (algrave macmillan, 2013). [7] Ann, Kent. China, the United Nations, and human rights: The limits of compliance (University of Pennsylvania Press, 2013). [8], Alan Kuperman, "A model humanitarian intervention? Reassessing NATO's Libya campaign." International Security 38, no. 1 (2013): 105-136. [9] Jan Nederveen, Pieterse, World orders in the making: humanitarian intervention and beyond (Springer, 2016). [10] Rhona Smith, Textbook on international human rights (Oxford University Press, 2016).

Wednesday, December 4, 2019

Internet of Things and Development of Technology

Question: 1.What are IoTs and how are they currently being used? You should explore a range of applications of IoT, for example, in areas such as healthcare, manufacturing and production. 2.Discuss at least two potential IoT applications that could be developed by your organisation in the next five years. You should explore ways that those two IoT applications could be used to provide opportunities to expand your business both locally and globally. Analyse potential options that could lead to recommendations at the end of your report. 3.Assess the advantages and disadvantages of IoTs. Consider the current IoT applications and the two potential IoT applications to be developed by your organisation (see tasks 1 and 2 above). Explore the ethical, social and legal considerations, and the potential positive and negative impacts your organisation should consider. These should lead to some recommendations at the end of your report. Answer: Introduction Internet of Things or popularly known as IoTs has emerged to be a part of daily life of human being. It is the connected network of physical devices that make human life easier and faster. Currently, there are several IoTs applications that have caught a good market grip due to its extended benefits and usage in common life (Lee, Guo Yin, 2013). Hence, it is important to analyse the market opportunities of the IoT applications before planning to develop new applications for commercial purpose. The paper has been developed on behalf of Smartech to analyse the potential opportunities of IoTs applications in the Australian market as well as in the international market to grow its business. Organisational Context Smartech is a small research and development company of Australia that is planning to expand its business by introducing two IoTs applications that will have good demand in the domestic as well as in the international market. Smartech has a good team of researchers capable of developing innovative ideas and products that will attract people from all across the globe. A span of five years has been approved by the CEO to develop two IoTs applications that can be beneficial for the company to grow its business commercially. Objective and Methodology The primary objective of the report is to conduct a market research and analyse the current scope for the IoTs applications in the global market. Furthermore, the research aims to analyse the commercial demand for IoTs that are currently available in the market. On basis of the market research, two potential IoTs applications will be chosen by the company to get them developed in a span of given deadline (Lee, Guo Yin, 2013). The major limitation of the study is that the research is based on secondary data that are fetched from articles and journals presented by different IoTs developing companies (Sood, Yu Xiang, 2016). Furthermore, it becomes difficult to judge the future opportunities of the IoTs applications because the research is based on secondary evidence and assumptions. Hence, there is need of primary research on the given field of study before investing on the development of IoTs applications by Smartech Research and Development Co. Report Outline The report starts with a basic introduction to the IoTs. A literature review has been presented on IoTs t observe the current market for the IoTs applications. According to the literature review, the two potential IoTs have been chosen that can be developed by Smartech for commercial growth. Furthermore, the study will present the advantages and issues related with the chosen IoTs to understand the potential opportunities for the applications. Along with that, the paper presents the security risks, ethical, social and legal obligations that must be considered by the Smartech Research And Development Company while developing the potential applications. The study also presents few recommendations that must be considered while planning the development project. 1.Definitions of the Internet of Things (IoTs) In the contemporary technological scenario, leading business organisations have substantially utilised specific Internet of Things (IoTs) for improved productivity and manageability. Lately, IoTs have provided momentous opportunities for business corporate to use advanced technology as a part of improvisation (Juntao, Xiaolin Gang, 2013). Convincingly, the term Internet of Things (IoTs) includes a featured system interconnected computerised mechanisms, digital resources and human participants. Moreover, the interconnected elements of IoTs have generated an exclusive automatically operated network. Evidently, the network of Internet of Things has been efficiently utilised for sharing and transferring data and information without any humanto-machine or humanto-human interface (Almeida, Doneda Monteiro, 2015). In the existing scenario, research and development organisations all around the globe have identified the commercial benefits of developing latest IoTs for business perspective (McEwen Cassimally, 2014). In modern business development, the sensor technology has been redefined to manufacture technologies such as Radio Frequency Identification (RFID), real-time localisation, wireless communication system for short-range, and sensor networks authorize computing systems. The application areas of the IoTs are growing at a robust speed (Elwenspoek, 2011). Primarily, the IoTs have been implemented in areas such as health and medical industry, production industry, the electronic appliances manufacturing sector, and IT industry. The sensor and connectivity technology have been unanimously applied to develop IoTs effective to monitor health activities and medical assistance. IoTs can be utilised for automatic baby monitor facilities to check the real-time information about a babys body temperature, breathing status and regular activity level (Yao, Wang, Farrokh-Baroughi, Wang, Qian, 2013). Through smart phones, such monitoring system can be controlled. On the other hand, sensors applications such as accelerometer, proximity, compass, GPS and connectivity such as Wi-Fi, Bluetooth and NFC can be utilised at the same time to monitor regular movements, sleeping patterns, activity level, workout status and location of a person throughout the entire day. Such IoTs have become massively popular as a form of wrist watches and gear technology (Elwenspoek, 2011). Also, IoTs have been utilised for Smart housing applications, driving applications, health measures, and Smart farming applications for further benefits. In electronic industry, IoTs have been functioned through sensor technology automatically to detect the position of the user, room temperature and other essential information about the surroundings. Thus, auto-functional refrigerators and air-conditioners have been manufactured (Wong Ma, 2013). Moreover, some of the clinical applications can be helpful to read a patients biometrics information such as heart rate, ECG and respiratory rate and sent the details to the doctors in order to deal with the emergency situation. Thus, IoTs have made medical monitoring exceptionally easier than before. Meanwhile, unknowing or knowingly, IoTs have become a part of human life for better lifestyle and health provisions (Nitti, Atzori Cvijikj, 2015). Analysis of the Internet of Things (IoTs) 2.Two Potential IoTs applications that can be developed by the organisation There are different IoTs applications in the market that can be developed by the company to seek growth in the long run (Lee et al., 2016). Out of the different IoTs applications, two potential IoTs applications that have the potential to grow its demand to a peak in the span of five years are Smart Home Applications and Smart Farming Applications (Sood, Yu Xiang, 2016). Smart Home Applications are already in the top of the table because of its high level benefits and regular usage in the human life. On the other hand, Smart farming is at the bottom of the table because of its few applications available in the current market. The two potential IoTs applications that can be developed by Smartech are discussed in details herein below: Smart Home Appliances Smart Home Applications include automatic light, fans and temperature controller. Along with that, it includes the security systems such as home monitoring systems that can be developed by the company to start its venture in the IoTs industry (O?ba, 2012). All of these appliances are conducted through the cloud computing network that enables the user to monitor the smart devices. Hence, there is a need of internet connection that makes the user aware of the people visiting their homes and provides them with a new experience (Watts, 2015). The Smart Home application is at the top list of the current IoT application market. It keeps the house safe and properly controlled. Smart Farming Applications The smart farming applications include remote sensors that take care of the pasture land. Telemetry networks are installed in the fields that continuously provide the farmers all information about the farm land. Along with that, sensors can be developed for the livestock that will use GPS to keep track of the animals (Piyare Lee, 2013). All these devices are connected to the users using the cloud computing platforms. Though these applications are not much famous in the current market scenario, they have the potential to grow in the upcoming years with new developments (Pavan, 2015). It makes the Smart farming applications lie at the bottom of the list, but it has the potential to grow in the upcoming future. 3.Advantages and Issues with the IoTs There are several advantages and issues related to development of IoTs in the organisation. The advantages and issues with the IoTs are presented herein below: Advantages of the IoTs The advantages of the IoTs are presented herein below: Saves time and effort: The IoTs applications work faster and automatically as because they are connected through the cloud computing network using the internet. The IoTs applications save time and effort of the users. It makes the work of the users easier and increases their efficiency. Automation of daily work: The IoTs applications make the work of the users automated that increases the potential demand for the products. The innovative technology keep the devices connected to the internet that makes all applications work automatically (Weber Weber, 2010). Share Information: The Smart Home Appliances helps to share information regarding who is visiting the house or detect any trespasser (Yao, Wang, Farrokh-Baroughi, Wang, Qian, 2013). Furthermore, the Smart farming applications help to know the weather conditions and get information regarding the livestock. Monitor: The IoTs applications help to monitor the farmland and the animals. Furthermore, it helps to monitor the house when the user is not there at home (Weber Weber, 2010). Along with that, the smart home appliances set the room environment according to the need of the users. Issues with the IoTs The issues related with the IoTs are presented herein below: Complexity: The IoTs applications are complex for new users. People who are not a regular user of internet face difficulty in using the IoTs applications. Hence, the company needs to target technology geek people who are capable of using the IoTs applications (Olson Olson, 2015). Technology takes control of life: Technology takes the control over life that makes all information about a person or activity available over the internet. Furthermore, it makes people lethargic and loss control over their own life (Weber Weber, 2010). Costly investment: It is a costly investment for the company as well as for the customers (Olson Olson, 2015). There is a need to invest high amount of money to develop such projects. It will make the prices of the products much high in the market. Loss of data and information: As the IoTs applications uses the cloud computing network to share information, there is a chance of hacking that may lead to loss of data (Olson Olson, 2015). It brings the privacy of the users under risk. Security Risks, Ethical, Social and Legal Considerations Global product developers have identified IoTs as one of the most instrumental technologies to be implemented for business purpose. The remarkable technological advancement has opened up new dimensions in information and communication technology (ICT) (Weber Weber, 2010). The IoTs has simply merged the physical world with the virtual world creating complete digital infrastructures for diverse usability. For instance, the evaluation of ICT has provided a broad range of applications and subdivisions to the societal public (Bandyopadhyay Sen, 2011). Under the current circumstances, IoTs has evolved so many latest tracking devices and sensor technology that can be utilised to monitoring human activities, statistical data and human behaviour on a regular basis (Sheng, 2015). Thus, some of the ethical issues of privacy, security and safer management of data sharing must be identified under the ethical quandaries. Unknowingly social public have attached themselves to the IoTs without know ing the privacy policies and usability of the shared data. Hence, the research and development firms of IoTs must confirm the ethical liability of their products so that the consumers can be assured (Cooper James, 2009). Furthermore, internet advertisers must become proactive so that accurate information can be supplied to the target demographic profile about the IoTs. Also, users and developers must consider the ethical assumptions of monitoring each of the moves of the human body during their daily lives. Moreover, some of the social and legal consideration must be taken into identification before developing research-based IoTs. The acceptability and accurate usability of IoTs must be recognised at the societal front so that humans can find better living perspective through the IoTs and latest electronic devices. Also, invasiveness prospects of the IoTs must be analysed at the broader perspective (Kobayashi, 2016). On the other hand, legal factors and regulations must be considered in developing IoTs for global market perspective. Through the identification of the potential security problems and privacy issues, the IoTs must fit in according to the legislative restrictions. Invariably, the confidentiality and security of data must be protected under the laws of different countries (Yao, Wang, Farrokh-Baroughi, Wang, Qian, 2013). Most importantly, the IoTs must fulfil the Data Protection Act, Human Rights Act, and Data Protection Directives to protect the individual rights of the cons umers. In the case of innovativeness, IoTs must be registered under the patent regulations so that any violation of developing rights can be protected (Ziegeldorf, Morchon Wehrle, 2013). Moreover, so-called standards of data sharing and transferring must be kept secret following the Data Privacy Policies. Meanwhile, the IoTs monitoring system must be verified under the Data Protection Act and regulations for regular workable practice. Opportunities for growth through the identified IoTs The existing financial position of Smartech has forced the organisational management to innovate in the field of Internet of Things (IoTs) so that the commercial benefits of the IoTs can provide significant strengths to the financial structure of the Melbourne-based Research and Development Company. Under the current circumstances, Smartech can get massive future projects on the basis of Smart Home and Smart Farming Applications (Lee, 2016). The two identified IoTs have been more than a revolution to their target demographics profile. Furthermore, the opportunities are endless for both the selected IoTs in the upcoming future as there is massive global market. Primarily, the Smart Home Application has been highly demanded by the modern home-making companies willing to provide additional technological efficiency to their building. By utilising the sensor technology, Smart Home Application can be controlled by the Smartphone of the operators to complete some operations significant for security, temperature control, cleaning purpose, lighting purpose and much more (Lee, 2016). As a result of the scenario, many investing companies will fund the research for Smartech. Conversely, the identified Smart Farming Application is another exceptional IoTs that is utilised for the commercial purpose in the farming industry (Rasmussen, 2015). By using the GPS technology, modern farmers can control shared data, latest technology and efficient agriculture standards through one touch of the Smartphone. In the United States of America, Australia and other European countries such Smart Farming Application can be a massive hit in the upcoming five years (Lee, 2016). Hence, on the basis of the global growth perspective, the opportunities are never-ending for the identified IoTs of Smartech. Conclusion The above discussion has identified the clear prospects for Smartech in developing the IoTs for the specialised niche market. Two of the identified IoTs such as Smart Home Applications and Smart Farming Applications can provide significant market prospect due to increasing standards of urbanisation. The contemporary business organisations and social public attached to the construction industry and farming industry have demanded latest technological advancement so that their lifestyle and productivity will be impressed. As a result of the scenario, in the next five years, the IoTs developed by Smartech can generate the impressive scale of demand in the niche market. The endless commercial benefits of the two identified IoTs can set significant standards in the competitive market area. By considering the efficient data mining procedure of the Smart Home Applications and Smart Farming Applications, Smartech can manufacture electronic gadgets and devices profitable for business perspecti ve. Invariably, latest monitoring sensor technology must be efficiently applied to the IoTs so that users can get the highest sustainability. Emerging Internet of Things has designed sustainable technologies for the target market linking the material and virtual world. Furthermore, through the identification of the social impacts of the IoTs, privacy, security, legal and ethical considerations must be addressed to develop emerging applications and communication paradigms supportive for social propagation. Also, the recognised IoTs can facilitate new dimensions for the users for better knowledge and infrastructural sustainability. Through the identification of latest prospects related to the specific Internet of Things (IoTs) of Smartech, the RD team of the organisation can increase their performance standards in the niche market in the upcoming five years. Conclusively, the research data and findings of the investigation can show the sustainable efficiency of the IoTs so that it can commercially benefit the organisation. Recommendations Through the identification of the commercial propagation of the Internet of Things (IoTs), Smartech can invent the best IoTs usable in the Smart Farming and Smart Housing industry. Moreover, considering the discussion including the advantages and disadvantages of the IoTs, the research and development firm must understand the future perspective of the Internet of Things (Shi, Cao, Zhang, Li, Xu, 2016). Similarly, the ethical, legal and societal considerations must be identified to not only focus on the profitability but also benefits of the social public. Therefore, through the critical analysis of the identified outcomes, three recommendations have been given in the underlying section to be followed by Smartech. Significant and Comprehensive Market Research: Evidently, comprehensive market research will be an essential part of the developing phase to identify what are the available prototypes in the niche market. Through the identification of existing IoTs intended towards housing and agriculture industry, Smartech can focus on something latest and innovative ideas to add a new whole dimension in the target market (Lee, Na, Kim, Chang, 2016). Meanwhile, Rarity and innovativeness of the IoTs will be the most crucial factors for capturing the market in the upcoming years. Moreover, the organisation needs to assure that such IoTs technology has been untouched till now to make it more unique and demanding. Differentiation of IoTs applications: As Smartech has identified the Smart Housing Application and Smart Farming Application to be developed at the commercial stage for further business perspective, the RD team of the organisation must look for differentiation of the IoTs applications. Thus, the IoTs applications and devices can be offered to the majority of the target industry (Ortiz, Hussein, Park, Han, Crespi, 2014). Also, the existing market review of the available IoTs will be crucial so that the enterprise can develop a different set of IoTs to influence the target demographic profile. In addition to that, such differentiation of IoTs applications can widen the market area for successful commercialisation of the product. Improvise Contemporary Marketing Concepts: By identifying the technological advancement in every industrial sector, developing the IoTs will not be enough for commercial purpose. Hence, Smartech must realise the potential need of latest marketing strategies of the IoTs so that the prototypes can impress the international clients at the very initial phase (Ortiz, Hussein, Park, Han, Crespi, 2014). Thus, the organisation can manage to bring more investors to complete their entire research work. Also, the advanced marketing agenda must include a glimpse of the probable pricing of the IoTs so that more interested clients can be contacted at the initial testing period of the developing IoTs. References Almeida, V., Doneda, D. Monteiro, M. (2015). Governance Challenges for the Internet of Things.IEEE Internet Computing, 19(4), pp.56-59. Bandyopadhyay, D. Sen, J. (2011). Internet of Things: Applications and Challenges in Technology and Standardization.Wireless Pers Commun, 58(1), pp.49-69. Cooper, J. James, A. (2009). Challenges for Database Management in the Internet of Things.IETE Tech Rev, 26(5), p.320. Elwenspoek, M. (2011).Sensor technology 2001. Dordrecht: Kluwer Academic. Juntao, L., Xiaolin, C. Gang, L. (2013). Research of IOTs Complex Event for Supply Chain Application.TELKOMNIKA Indonesian Journal of Electrical Engineering, 11(8). Kobayashi, G. (2016). The Ethical Impact of the Internet of Things in Social Relationships.IEEE Consumer Electron. Mag., 5(3), pp.85-89. Lee, C., Guo, Y. Yin, L. (2013). A Location Temporal based Access Control Model for IoTs.AASRI Procedia, 5, pp.15-20. Lee, H., Na, O., Kim, Y., Chang, H. (2016). A Study on Designing Public Safety Service for Internet of Things Environment.Wireless Pers Commun. https://dx.doi.org/10.1007/s11277-016-3230-z Lee, I. (2016). An Exploratory Study of the Impact of the Internet of Things (IoT) on Business Model Innovation:.International Journal of Information Systems and Social Change, 7(3), pp.1-15. McEwen, A. Cassimally, H. (2014).Designing the internet of things. Chichester: Wiley. Nitti, M., Atzori, L. Cvijikj, I. (2015). Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies.IEEE Internet of Things Journal, 2(3), pp.240-247. O?ba, R. (2012).Intelligent sensor technology. Chichester, West Sussex, England: Wiley. Olson, J. Olson, G. (2015).Working together apart. Ortiz, A., Hussein, D., Park, S., Han, S., Crespi, N. (2014). The Cluster Between Internet of Things and Social Networks: Review and Research Challenges.IEEE Internet Of Things Journal,1(3), 206-215. https://dx.doi.org/10.1109/jiot.2014.2318835 Pavan, E. (2015). Down on the Mapping Road. Progresses and Challenges of Mapping Internet Governance within the Global Media and Communication Governance Landscape.SSRN Electronic Journal. Piyare, R. Lee, S. (2013). Towards Internet of Things (IOTS): Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing.IJCNC, 5(5), pp.59-72. Rasmussen, T. (2015). Techno-Politics, Internet Governance and Some Challenges Facing the Internet.SSRN Electronic Journal. Sheng, L. (2015). QoS Design and Its Implementation for Intelligent Industrial Ethernet.International Journal of Materials, Mechanics and Manufacturing, 4(1), pp.40-45. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L. (2016). Edge Computing: Vision and Challenges.IEEE Internet Of Things Journal, 1-1. https://dx.doi.org/10.1109/jiot.2016.2579198 Sood, K., Yu, S. Xiang, Y. (2016). Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review.IEEE Internet of Things Journal, 3(4), pp.453-463. Watts, S. (2015).The Internet of things (IoT). Weber, R. Weber, R. (2010).Internet of things. Berlin: Springer. Wong, W. Ma, T. (2013).Emerging technologies for information systems, computing, and management. New York, NY: Springer. Yao, R., Wang, W., Farrokh-Baroughi, M., Wang, H., Qian, Y. (2013). Quality-Driven Energy-Neutralized Power and Relay Selection for Smart Grid Wireless Multimedia Sensor Based IoTs.IEEE Sensors J.,13(10), 3637-3644. https://dx.doi.org/10.1109/jsen.2013.2262270 Ziegeldorf, J., Morchon, O. Wehrle, K. (2013). Privacy in the Internet of Things: threats and challenges.Security and Communication Networks, 7(12), pp.2728-2742.