Tuesday, December 31, 2019

Learning Theories, Behaviorism And Social Cognitive Theory

Introduction Learning is a complex process that influences the knowledge and behaviours that humans do, or do not develop to adapt to a variety of situations (Ormrod, 2016). However, for people with disability, this learning process can often be hindered by the lack of abilities, or external and internal stimuli such as prejudice and self-efficacy respectively (Conyers, Enright, Strauser, 1998). The following essay will discuss two learning theories, behaviourism and social cognitive theory (SCT), in relation to disability practices. Behaviourism explains learning through stimulus-response associations, with the two main theories being classical conditioning and operant conditioning (Ormrod, 2016). For professionals in disability,†¦show more content†¦Generally, there is a pre-existing unconditioned stimulus (UCS) that elicits an unconditioned response (UCR) from the organism without it having to be learnt (Ormrod, 2016). For learning to occur, a neutral stimulus (NS) that the organism does not already respond to is introduced (Ormrod, 2016). This NS is repeatedly paired with the UCS until it elicits a response, typically, one that is similar to the UCR; however, it can also be different to the UCR (Ormrod, 2016). The NS then becomes a conditioned stimulus (CS) that elicits a learned, conditioned response (CR) (Ormrod, 2016). Sometimes, the CR can also be elicited by a stimulus similar to the CS due to generalisation (Ormrod, 2016). However, stimulus discrimination can be used to teach organisms to differentiate such similar stimuli, by presenting them in the absence of the UCS (Spencer, Hartstone, Carter, Grivas, 2007). Learning through classical conditioning can occur rapidly, and is most effective when the NS is presented immediately before the UCS (Ormrod, 2016). Moreover, associative bias suggests that associations are more likely to be made between stimuli that reflect a true cause-and-effect relationship (Ormrod, 2016). Additionally, extinction of the CR w ill occur if the CS is repeatedly presented without the UCS (Spencer et al., 2007). Nonetheless, spontaneous recovery can occur, wherein, after extinction, the CR reappears, albeit, weaker (Ormrod, 2016). Thus, in eliminatingShow MoreRelatedBehaviorism or Social Cognitive Learning Theory1429 Words   |  6 Pages Behaviorism and social cognitive theories are two great theories to use when setting up a behavior management plan in the classroom. They both offer reinforcements to get desired behaviors. Social cognitive theory focuses on observations that can be used to understand what and how people learn and how they take control of their own behavior (Ormrod, 2011, p. 323). Behaviorism focuses on environmental stimuli that changes individual’s behaviors (Ormrod, 2011, p. 285). Observing and taking careRead MoreBehaviorism And The Operant Conditioning Theory Essay1415 Words   |  6 Pageslearn differently but children and adult learning differ also. Learning theories are conceptualized frameworks which describe how individuals absorb, process and retain information. Behaviorists such as John B. Watson, B.F. Skinner, Edward L. Thorndike, Ivan Pavlov and Edwin R. Guthrie believed that all learners were passive in nature and only responded to external stimuli. Behaviorism, as explored by the before mentioned, is a biological basis of learning and focuses exclusively on observable behaviorsRead MoreThe Psychoanalytic Theory Of Human Development Research1074 Words   |  5 Pages 2014, p. 3). This field studies topics like the theoretical perspective theories that are used in human development research. The Psychoanalytic perspective theory focuses on the emotional and social development, Piaget’s Cognitive-Developmental theory accents the changes in thinking, while the Behaviorism and Social Learning and the Lifespan perspective discuss many aspects on human functioning (p. 21). These theories allow for a different point of view on developme nt while regarding relativeRead MoreTheories of Development: Cognitive Theory and Behaviorism Essay example958 Words   |  4 PagesOff the five developmental theories, I would like to describe and explain two grand theories, Cognitive theory and Behaviorism. The main concepts of cognitive theory focuses on the developmental process of thinking and how this process affects our actions, attitudes, beliefs and assumptions through a life span. Jean Piaget, Swiss biologist and proponent of cognitive theory, developed a general thesis of cognitive theory; he divided the developmental process of thinking into four stages. He saidRead MoreLearning Theories : A Comparison Of Behavioral And Cognitive Views1163 Words   |  5 PagesLearning Theories: A Comparison of Behavioral and Cognitive Views Cognitive and behavioral learning theories tend to dominate modern discussions of learning theories. Employed in both educational and clinical settings, both have important contributions to understanding how and why individuals learn. Is one approach statistically better than the other, or do they each have their own place where one approach may be more effective under specific circumstances? Each theory has supporters who claimRead MoreA Reflection On Learning Theories939 Words   |  4 Pagesthis ties into learning theories. I believe now that through being a more reflective teacher it has shaped my teaching strategy based on three different learning theories I will reflect on. Behaviorism, constructivism, and cognitivism are relatively common theories used in classrooms as ways to approach student learning. Behaviorism focuses on observable behavior, such as being able to follow two step directions to complete a task. Characteristics of a classroom that uses behaviorism would be a rewardRead MoreLearning And Its Implications For Education Essay1271 Words   |  6 PagesLearning is an important process in education and in life in general. One cannot simply grow, adapt, and manage life without learning. However, everyone learns in various different ways. Shuell (2016) states, â€Å"When a particular word is used, people usually assume everyone has a common understanding of what the word means. Unfortunately, such is not always the case. In trying to understand the various theories of learning and their implications for education, it is helpful to realize that the termRead MoreLearning Theories : Theory Of Behaviorism1037 Words   |  5 PagesLearning Th eories Essay Behaviorism focuses on a new behavioral pattern being repeated until it becomes automatic. The theory of behaviorism concentrates on the study of overt behaviors that can be observed and measured (Good Brophy, 1990). It views the mind as a black box in the sense that response to stimulus can be observed quantitatively, totally ignoring the possibility of thought processes occurring in the mind. Some key players in the development of the behaviorist theory were Pavlov,Read MoreThe Diver810 Words   |  4 PagesEdna Foster The Diverse Nature of Psychology The diverse nature of psychology begins with making a difference in a diverse setting. This involves the implementation of critical psychology concepts, subdisciplines and subtopics, motivation, behaviorism, and cognition. Moreover, these subdisciplines and subtopics may be applied to other disciplines in contemporary society. In addition, this paper will include the subdisciplines and subtopics to theoretical perspectives, and concludes with theRead MoreBehavioral and Social/Cognitive Approaches to Forming Habits Essay1390 Words   |  6 PagesBehavioral and Social/Cognitive Approaches to Forming Habits Norman L Fountain PSY 250 May 4, 2011 Nichelle Ancrum Behavioral and Social/Cognitive Approaches to Forming Habits Habit as defined in Webster’s as a: a behavior pattern acquired by frequent repetition or physiologic exposure that shows itself in regularity or increased facility of performance b : an acquired mode of behavior that has become nearly or completely involuntary (Merriam-Webster Dictionary Online, 2011). Behavior

Monday, December 23, 2019

Is There any Treatment for Pornography Addiction Essay

Biological Treatment There is very little scientific evidence supporting the effectiveness of biological treatments for pornography addiction. Though several related studies have been conducted, the focus of these studies was not specifically on pornography addiction, but sexual addiction in general. Additionally, they lacked validity as they were either case studies or small-scale studies, involving less than 30 participants. Conducting a large-scale study may not be feasible at this point of time, as not many people with pornography addiction are willing to seek medical advice, let alone participate in research studies. One of the most prominent medications suggested for treating pornography addiction is Naltrexone. It has been approved†¦show more content†¦He was first referred to a psychiatrist at the age of 24, but his struggle continued for the next 7 years, as he dropped in and out of treatment. He tried antidepressants, group and individual therapy, a 12 step group (i.e. Sexual Addicts Anonymous), and pastoral counselling. He only sustained success at avoiding compulsive Internet use when he participated in a Naltrexone trial. However, his urges returned when he discontinued consuming Naltrexone. In order to recede them, he had to continue taking the medication. Ryback specifically studied Naltrexone’s efficacy in reducing sexual arousal and hypersexual behaviour in adolescents convicted of offenses including rape, bestiality, and sexual activity with young children. While receiving doses between 100 and 200 mg/d, most participants described decreases in arousal, masturbation, and sexual fantasies, as well as increased control over sexual urges (Ryback, 2004) It is clear that Naltrexone is in no way a cure for pornography addiction. However, for some extreme cases this drug may be necessary to equip individuals with pornography addiction with enough resolve to stand firm against pornography for long enough for psychosocial treatments to be effective. Additionally, in determining the right treatments for pornography addiction, professionals ought to look out for other problems that coexist with the addiction. If a dualShow MoreRelatedIs Addiction to Pornography a Brain Disease?1027 Words   |  4 PagesIs Addiction, Brain Disease? Pornography addiction and sex addiction are very alike sicknesses, arguably a sex addiction is not a disease or sickness however, and I feel as if it is. Walking around a sex addict you would probably never know about their disorder unless told otherwise. Many debates are about whether or not sexual addiction is an actual brain disease but just like drug addiction and alcohol addiction I classify it as the same. In a study taken in 2013 The Discovery Channel foundRead MoreSex and Media around the World813 Words   |  3 Pagesexplicit and casual treatment of sex and sexuality in our society is doing more harm than good. Maintaining the biblical standards of sexuality, the love shared between a husband and a wife, is becoming a dying institution of lust versus love. Sex and human sexuality are gifts from God, but these gifts have been shamefully misused and misconstrued. The images of sex that the media bombards people with, as well as the pornography industry, is only helping in fu eling this monster of addiction. Just like alcoholicsRead MoreEssay on Critical Book Review1166 Words   |  5 Pagesï » ¿ Critical Book Review Healing the Wounds of Sexual Addiction Michelle Beel Liberty University Psych 307 Summary Dr. Mark Lasser’s book â€Å"Healing the Wounds of Sexual Addiction† gives insight to those who suffer from sexual addiction and to the families, friends and other people in their lives. Dr. Mark Lasser has chosen to write this book, to share with others his personal struggle and victory with sexual addiction. Dr. Lasser has written this book from a Christian view, toRead MoreHyper Sexual Addiction Is A Disorder Essay1731 Words   |  7 PagesHyper Sexual addiction is a disorder that can be defined as a person having a habitually elevated sex drive, fantasies, and urges. Nevertheless, compared to other sexual addictions, this could be known as one of the most riskiest and dangerous addiction. Hyper Sexual Addiction has become more prevalent because of the infidelities amongst some celebrities and political figures. Sexual addiction has always existed, but because of technology and social media, people have become aware of it. PeopleRead MoreThe Effects Of Gambling Addiction On The Brain1682 Words   |  7 PagesBiological Factors Addictions are known to activate the culmination of sites in the brain that make up the ‘reward centre’ which is responsible for feeling happiness or pleasure through the release of dopamine (Linden, 2011). After repeated exposures, receptors in the brain build a tolerance towards the addiction meaning that there is a need for increased stimulation to provide a similar ‘high’. Eventually behaviour patterns develop so as to avoid withdrawal. At this point addiction is occurring andRead MoreEtiology, Predispositions, And Vulnerabilities1738 Words   |  7 Pagesbeen designed to explain the how IAD develops in an individual and how it is then maintained. These models draw from different fields of psychology such to determine different theorised causes for the addiction such as biological factors (such as chemical imbalances making one more susceptible to addiction), psychological predispositions (such as other mental health problems or personality) and social factors (such as culture, socio-economic standing and acceptance of the Internet from others). WhilstRead MoreEssay about Critical Book Review1170 Words   |  5 PagesCritical Book Review Healing the Wounds of Sexual Addiction Michelle Beel Liberty University Psych 307 Summary Dr. Mark Lasser’s book â€Å"Healing the Wounds of Sexual Addiction† gives insight to those who suffer from sexual addiction and to the families, friends and other people in their lives. Dr. Mark Lasser has chosen to write this book, to share with others his personal struggle and victory with sexual addiction. Dr. Lasser has written this book from a Christian view, to give other individualsRead MoreEssay on Internet addiction1725 Words   |  7 PagesInternet and Video Game Addiction Internet addiction is a worldwide disorder that is oblivious to the technological age we live in. Since its inception in 1991 (Livingstone), the World Wide Web has only improved our quality of life. People don’t perceive online technology as a problem but as a solution to make our lives cheaper and efficient. As a working college student, my whole life is run on the internet. I use Facebook religiously to keep in-touch with my friends, I play Xbox Live to competeRead More Sex Addiction Essays1379 Words   |  6 PagesSex Addiction Addiction, a compulsive psychological need for a habit-forming substance according to an online dictionary (p). In this instance, the substance is sex or masturbation. A sex addict needs progressively more and more explicit pornographic material in order to become aroused. Their behavior becomes centered on different sexual experiences and the desire to attain them. The person cannot control their sexual appetites resulting in severe consequences for themselves and others. SexRead MoreSex can be an Addiction1083 Words   |  4 Pagescan be an Addiction About Sexual addiction Do you think sex addition is a real disease? According to Karen Huffman, sex is defined as a biological maleness and femaleness including chromosomal sex; also sexual behaviors, such as masturbation and intercourse. Addiction, is a broad term describing a compulsion to the use a specific drug or engage in a certain activity according to the Psychology in Action textbook (Huffman, 2012). In our society today being a sex addict is an addiction that is sometimes

Sunday, December 15, 2019

Maricalum Mining Corporation (MMC) Free Essays

Maricalum Mining Corporation (MMC) in south Negros. Having 2,673 claims on mining in Barangays Cansauro, Hinablan, Tao-angan and Hinablan, of the towns of Cauayan and Sipalay, Negros Occidental. Actually I had gone into the place and had seen the impact of the mining in the people and to its natural habitat. We will write a custom essay sample on Maricalum Mining Corporation (MMC) or any similar topic only for you Order Now Especially on Sipalay, I saw dead mountains, white ones. Waters sources and the rivers covered with the area are not portable therefore the people would go to the lowlands to buy fresh water to drink. Crops productions are cut into halves and the villagers experience skin diseases. Poisoning and many fish kills are reported before. People would always complain about the air pollution brought by it causing suspended sandstorms and dust particles. 2. One of the government policies was REPUBLIC ACT NO. 7942 or also known as â€Å"PHILIPPINE MINING ACT OF 1995†. This policy states that the all the private and public mining land are owned by the state. Therefore the government and other private sectors are responsible to the development, utilization and conservation of the place. Protecting the rights of affected communities and limits the land that are available for mining. Section 7, Article X of the constitution provides that LGU or Local Government Units are responsible to protect and co-manage the environment and to enhance the right of the people. Both RA belongs in the EXECUTIVE ORDER NO. 79 created by state. How to cite Maricalum Mining Corporation (MMC), Papers

Saturday, December 7, 2019

Introduction to Data Science Report on Cookies Limited

Question: Write areport on Cookies Limited. Answer: 1.0 Introduction In this assignment, the different changes needed in the organizational structure of the company have been discussed. For this purpose, changes are to be brought in the data collection and storage systems of the company (Chamberlain et al. 2015). These possible changes have been discussed along some modifications that are necessary for expanding the companys business. Again, some suggestions have been provided regarding implementation of customer-centric product design and business to increase customer base and gain more revenue (Andreassen et al. 2016). Furthermore, some recommendations have been provided regarding the action plan of the company during power outages and other disasters. 2.0 Data Collection and Storage 2.1 Data Collection System For implementing online business as well as new information system, a new data collection system is to be implemented by Cookies Limited in order to make the information system more efficient. There are two aspects that are to be considered during implementing a data collection system (Brown and Wyatt 2015). These are qualitative and quantitative. For qualitative data collection, the company needs to survey regarding the quality and flavor of products produced as well as the quality of products most of the customers prefer. For the quantitative data collection, company needs to analyze the net sales of each flavor of the cookies and increase production of those that have maximum popularity (Cornish et al. 2015). There are many online vendors that provide cheap and efficient data collection tools that can be implemented by Cookies Limited for their data collection system. 2.2 Storage System For online business, the storage system needs to be upgraded. It can be virtual storage system along with hardware storage support. However, there are several requirements that must be kept in mind. First, there should be two different memories for qualitative and quantitative data collection and storage (Pang et al. 2015). These memories should act differently but maintain a balance between the two and the data should be easy to access. This system can be implemented by using cloud computing services. Cloud computing provides efficient virtual interface for storage and operations of data. Second, security measures should be taken in all types of storage system used, be it virtual or physical (Brewer and Guiterman 2016). Moreover, back up memory should be created in case of emergencies. Finally, the computer systems are to be upgraded in order to support the new storage and information systems with maximum efficiency. 3.0 Data in Action 3.1 Consumer-centric Product Design In this part of the organizational plan, the company needs to consider public demands as well as specific products popularity in order to manufacture better products and achieve more success in business. For this, the company needs to design its products in a customer-centric manner (Li et al. 2015). For instance, the company should conduct a survey to determine which flavors of cookies are most popular among the customers. They should conduct another survey among regular customers to know about possible new flavors they can produce to increase customer happiness as well as popularity. If they can implement the necessary changes, the company can also gain huge revenues from cookie sells (Stanek, Babkin and Zubov 2016). Hence, the company needs to focus on the customer demands and design products accordingly. Again, there should be another step here. The company will have to design or implement an operational software that will be able to analyze the profit ratios of each flavor of th e cookies. In other words, the software will calculate profit percentages by measuring revenue to production ratio that will give the company an idea which products to emphasize on and which not (Gupta et al. 2015). The flavors that will have highest revenue production ratio should be produced in greater amounts to satisfy customers and gain more popularity. Again, the product design should be such that it will ensure popularity. For example, if they make a cookie whose flavor is based on some sour fruits, that flavor will be almost certain a failure in the commercial scale. On the other hand, a cookie flavored with nuts and dry fruits will almost certainly achieve commercial success (Kamal et al. 2016). These customer-centric products designs are to be considered by Cookies Limited authority. 3.2 Recommendation System Not each company will have the same customer measurements to gauge customer centricity. Nonetheless, the two most imperative customer centric measurements that ought to be deliberately checked are churn rate and customer lifetime values. Churn Rates - Gaining new customers is getting more troublesome. Along these lines, more organizations are putting resources into continuing existing customers as opposed to attempting to discover new ones: Acquiring new customers can cost up to 5x more than continuing existing customers A 2% expansion in customer maintenance has the same impact on benefits as cutting expenses by 10% On an average, companies lose approx. 10% of its customer base every year Companies with a high degree of consistency become quicker. The way to achievement is to comprehend why individuals leave, and why individuals remain customers. To figure the churn rate, measure the quantity of customers who left in the most recent 12 months separated by the normal number of aggregate customers (amid the same period). Customer Lifetime Value (CLV) For a customer driven business, the most significant resource is the customer. The benefits created amid the maintenance stage are regularly known as customer lifetime quality or CLV. Customer Lifetime Value (CLV) measures the benefit your association makes from any given customer. To compute CLV, the income the company procures from a customer is to be taken, the cash spent on serving them is to be subtracted and the majority of the installments for time estimation of cash is to be modified. Another approach to ascertain it is to take normal request esteem and rehash buy rates. For instance, if the companys normal request worth is $100 and the rehash buy rate per customer is 20% the companys assessed CLV is $125. Computing the customer lifetime esteem helps the company comprehend why it bodes well to put resources into keeping its customers. It is an extraordinary approach to get a comprehension of the customer portfolio and to fragment the customer. The movement towards turning into a really customer-centric company is both unpredictable and long in any case, the company should not be put off by this as even the littlest changes to strategy and procedures can have a critical advantage for both representative and the companys customers. Being a client driven association is the Holy Grail towards opening the genuine capability of client worth. The company should continuously place itself in the shoes of the customer to minimize client exertion and augment client esteem. 4.0 Business Continuity: Survival of Online Business during Disasters In case of Data Center Disaster Recovery Planning, the operational plan should be designed with protecting the organizations investment in information technology (Kamat and Liang 2016). The required planning is to be integrated within the server management, for further scenarios of disruption. For identifying the survival planning and checklist making, the designers required to make suitable backup mechanisms (Gupta et al. 2016). The relevant assumptions are considered in this aspect as following: Data center building that is physical infrastructure, construction architecture, building blueprints, and floor areas Power generation of the circuitry as in commercial power and backup power systems Power protection as in proper grounding of entire circuitry, line conditioners, lightning arrestors, and suppressors Environment as in overheating, ventilation, and air circulation in form of air conditioning Critical systems in servers, VoIP systems for calling, cable systems, distribution of power units Other aspects as in fire protection, utilities, and work space management Now, the organization should consider some disaster response making over identified factors to mitigate (Pancholi and Patel 2016). The factors are to be accounted as in following items and considerations: Most serious data center threats as fire, power outage, failure in system, personnel blunder, security breach, and others. The assumptions may be wrong, the corrections should be made accordingly (Sahebjamnia, Torabi and Mansouri 2015). Outdated backup process in case of system management and protection Stating an acceptable outage time for controlling the suspended work and its impact Emergency teams that can be trained for the same purpose (Phillips 2015) Previous disaster reports and the lessons learnt to avoid same type of mistakes and faults The suitable checklists can be prepared according to some sorts of scenarios as in power outage, Server failure, Data center files, and other disasters. The power outage checklists are prepared for action taken and comments regarding the action (Cook 2015). The actions may be separate under certain scenarios. The power outage scenario includes the actions as determining the outage cause, staff required for evacuation, potential damage to the firm, utility power management, and others. Again, in scenario of server failure, the actions should be checking situations as server outage, loss of data, and others, contacting senior personnel management and regular progress maintenance (Chang 2015). The remedial actions should be taken for data center files management are using extinguishers for fire suppression, after fire is extinguished, the damage assessment is to be performed. These were the disaster recovery steps and systematic planning in present scheme of disasters (Downey 2015). The post-disaster assessments should be conducted as in reviewing the scenario, indentifying the cause of the disaster, and determining what happened in that situation and how the recovery is conducted and its preferable relocation of the servers as well. The disasters might have some adverse effects in maintaining the services of online business, however; this planning required to be followed considering all the impact of the disasters (Marn et al. 2015). In this manner, the checklists will help the organization to take control of the 5.0 Conclusion In this report, several aspects of business requirements have been discussed in detail. These aspects include implementation of new data collection and storage system that are essential for implementing the new organizational plan for Cookies Limited. The company looks to implement customer-centric online business for which they need to use a new data collection system in order to make the information system more efficient as well as a virtual storage system with hardware backup. For the customer-centric business plan, the company needs to consider public demands as well as specific products popularity in order to manufacture better products and achieve more success in business. Most serious data center threats as fire, power outage, failure in system, personnel blunder, security breach, and others serious issues as well. For this, the company needs to design its products in a customer-centric manner. Again, there may be cases of power outages and disasters that may hamper the busine ss of the company. The recommendations for the company in such cases have also been provided. 6.0 Recommendation The recommendations for the company are as follows: A new data collection system is to be implemented by Cookies Limited in order to make the information system more efficient. For qualitative data collection, the company needs to survey regarding the quality and flavor of products produced as well as the quality of products most of the customers prefer. For the quantitative data collection, company needs to analyze the net sales of each flavor of the cookies and increase production of those that have maximum popularity. The company needs to consider public demands as well as specific products popularity in order to manufacture better products and achieve more success in business. The company needs to design its products in a customer-centric manner. The company will have to design or implement operational software that will be able to analyze the profit ratios of each flavor of the cookies. The company should check two most imperative customer centric measurements, the churn rate, and the customer lifetime values. References Andreassen, T.W., Kristensson, P., Lervik-Olsen, L., Parasuraman, A., McColl-Kennedy, J.R., Edvardsson, B. and Colurcio, M., 2016. Linking service design to value creation and service research.Journal of Service Management,27(1), pp.21-29. Brewer, P.W. and Guiterman, C.H., 2016. A new digital field data collection system for dendrochronology.Dendrochronologia,38, pp.131-135. Brown, T. and Wyatt, J., 2015. Design thinking for social innovation.Annual Review of Policy Design,3(1), pp.1-10. Chamberlain, M., Esquivel, J., Miller, F. and Patmore, J., 2015. BT's adoption of customer centric design.Applied ergonomics,46, pp.279-283. Chang, V., 2015. Towards a Big Data system disaster recovery in a Private Cloud.Ad Hoc Networks,35, pp.65-82. Cook, J., 2015. A six-stage business continuity and disaster recovery planning cycle.SAM Advanced Management Journal,80(3), p.23. Cornish, K., Goodman-Deane, J., Ruggeri, K. and Clarkson, P.J., 2015. Visual accessibility in graphic design: A clientdesigner communication failure.Design Studies,40, pp.176-195. Downey, A., 2015, November. Creating healthier, more resilient and sustainable communities: Applying a health-in-all-policies approach to disaster recovery. In143rd APHA Annual Meeting and Expo (Oct. 31-Nov. 4, 2015). APHA. Gupta, A., Gupta, S., Ge, R. and Zong, Z., 2015, December. CRUSH: Data collection and analysis framework for power capped data intensive computing. InGreen Computing Conference and Sustainable Computing Conference (IGSC), 2015 Sixth International(pp. 1-6). IEEE. Gupta, U.K., Bauer, A.L., Parenti, M.A. and Todd, S.J., Emc Corporation, 2016.Supplying software via data storage system. U.S. Patent 9,262,146. Kamal, A.H., Bull, J., Ritchie, C.S., Kutner, J.S., Hanson, L.C., Friedman, F., Taylor, D.H. and Group, A.R.C.W., 2016. Adherence to Measuring What Matters Measures Using Point-of-Care Data Collection Across Diverse Clinical Settings.Journal of pain and symptom management,51(3), pp.497-503. Kamat, M. and Liang, S., Emc Corporation, 2016.Online replacement of physical storage in a virtual storage system. U.S. Patent 9,250,823. Li, T., Vedula, S.S., Hadar, N., Parkin, C., Lau, J. and Dickersin, K., 2015. Innovations in data collection, management, and archiving for systematic reviews.Annals of internal medicine,162(4), pp.287-294. Marn, A., Bodin, ., Gelcich, S. and Crona, B., 2015. Social capital in post-disaster recovery trajectories: Insights from a longitudinal study of tsunami-impacted small-scale fisher organizations in Chile.Global Environmental Change,35, pp.450-462. Pancholi, V.R. and Patel, B.P., 2016. Enhancement of Cloud Computing Security with Secure Data Storage using AES.International Journal for Innovative Research in Science and Technology,2(9), pp.18-21. Pang, Z., Chen, Q., Han, W. and Zheng, L., 2015. Value-centric design of the internet-of-things solution for food supply chain: value creation, sensor portfolio and information fusion.Information Systems Frontiers,17(2), pp.289-319. Phillips, B.D., 2015.Disaster recovery. CRC press. Sahebjamnia, N., Torabi, S.A. and Mansouri, S.A., 2015. Integrated business continuity and disaster recovery planning: Towards organizational resilience.European Journal of Operational Research,242(1), pp.261-273. Stanek, J., Babkin, E. and Zubov, M., 2016. A new approach to configurable primary data collection.Computer Methods and Programs in Biomedicine. Whybark, D.C., 2015. Co-creation of improved quality in disaster response and recovery.International Journal of Quality Innovation,1(1), pp.1-10.