Tuesday, December 31, 2019

Discuss the Proposition That Local Authorities Are Better...

Name: SAMUEL Student Number: AKERA Course: MSc in Risk, Crisis and Disaster Management Essay Title: Discuss the proposition that local authorities are better placed to respond to crises and disasters than central government Introduction Both the local authorities and central government have roles and responsibilities in responding to crises and disaster situations. However, several catastrophic crises and disaster events over the past decades have casted doubts on the effectiveness of central governments in responding to crises and disaster situations. As such, some scholars and†¦show more content†¦In his book, â€Å"What is a disaster?† Quarantelli asked five researchers with different social science background (Gilbert, Dombrowsky, Kreps, Porfiriev and Horlick-Jones) to define the term disaster. Unsurprisingly, all the scholars defined disasters differently (Rosenthal, 1998). For instance, Kreps defined disasters as: â€Å"non-routine events in societies or their larger subsystems (e.g. regions, communities) that involve social disruption or physical harm† (Kreps, 1998:34). A classical definition of disaster was coined in 1961 by a U.S pioneer of disaster research, Fritz: Actual or threatened accidental or uncontrollable events that are concentrated in time and space, in which a society, or a relatively self-sufficient sub-division of a society undergoes severe danger, and incurs such losses to its members and physical appurtenances that the social structure is disrupted and the fulfillment of all or some of the essential functions of the society, or its sub-division is prevented Fritz [1961:655] quoted in Fischer, 1989:2-3). According to some scholars, Fritz’s definition of disaster has stood the test of time very well (Kreps 1988). Nonetheless, whatever the classic definition of crises and disaster, they are bound to vary substantially in the foreign dictionaries reflecting for the particular country and the specifics of the culture and the language of each nation (Porfiriev, 1998). However, for the purposes of convenience, theShow MoreRelatedEmergency Management Essay18946 Words   |  76 Pagesand provides definitions for some basic terms such as hazards, emergencies, and disasters. The chapter also provides a brief history of emergency management in the federal government and a general description of the current emergency management system—including the basic functions performed by local emergency managers. The chapter concludes with a discussion of the all-hazards approach and its implications for local emergency management. Introduction There are many ways to describe emergencyRead MoreNotes18856 Words   |  76 Pageseverything that has gone wrong in Africa since the advent of independence has been blamed on the legacies of colonialism. Is that fair? Virtually all colonial powers had â€Å"colonial missions.† What were these missions and why were they apparently such a disaster? Did any good come out of the African â€Å"colonial experience†? Introduction Colonization of Africa by European countries was a monumental milestone in  ­ the development of Africa. The Africans consider the impact of colonization  ­ on themRead MoreCsr Communication in the Pharma Industry35538 Words   |  143 Pagesthese firms organize their CSR communication, and which CSR communication strategies they use for addressing their stakeholders. Findings: The engagement in CSR of companies developing its activities and business within the pharmaceutical industry respond to the different challenges this industry faces. External stakeholders (NGOs, media, consumer advocacy groups and the public opinion) carefully watch the steps taken by pharmaceuticals. As a consequence, the initiatives and communications must beRead MoreBohlander/Snell-Managing Hr24425 Words   |  98 PagesIdentify the characteristics of a good international compensation plan. objective Explain how domestic and international HRM differ. objective Reconcile the difficulties of home- and host-country performance appraisals. objective Discuss the staffing process for individuals working internationally. objective Explain how labor relations differ around the world. PART 6 Expanding Human Resources Management Horizons 639 Managing Human Resources, 14e, Bohlander/SnellRead MoreCase Study148348 Words   |  594 Pagescopying in the United Kingdom issued by the Copyright Licensing Agency Ltd., Saffron House, 6-10 Kirby Street, London EC1N 8TS. This book may not be lent, resold, hired out or otherwise disposed of by way of trade in any form of binding or cover other than that in which it is published, without the prior consent of the Publishers. 2  © Pearson Education Limited 2011 Contents Acknowledgements Introduction Using this Manual Planning Your Approach Designing the Teaching Scheme A Guide to Using theRead MoreLibrary Management204752 Words   |  820 Pages Library and Information Center Management Recent Titles in Library and Information Science Text Series Library and Information Center Management, Sixth Edition Robert D. Stueart and Barbara B. Moran United States Government Information: Policies and Sources Peter Hernon, Harold C. Relyea, Robert E. Dugan, and Joan F. Cheverie Library Information Systems: From Library Automation to Distributed Information Access Solutions Thomas R. Kochtanek and Joseph R. Matthews The Complete Guide to AcquisitionsRead MoreThe Rise of Social Media and Its Impact on Mainstream Journalism21031 Words   |  85 Pagestopical cases studies from the G20 London summit and Iranian street protests. There are six core conclusions from this study: 1. There has been an explosion of participation over the past two years (2007–9), driven by user-friendly internet tools, better connectivity and new mobile devices. Social Networking and UGC have become mainstream activities, accounting for almost 20 per cent of internet time in the UK and involving half of all internet users. This dramatic change has forced tr aditional newsRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagescompanies also created beneficial impacts for many other companies in dealing with these fundamental wide-ranging issues. These beneficial impacts had an enormous effect in galvanizing fundamental business innovation in companies at a far faster rate than would have been the case if there had been no boom; that is, without those effects, innovation might not have taken place at all. All this business growth has caused increasing complexity in business action and decision making. It has presented chiefRead Morepaul hoang answers72561 Words   |  291 Pagesexpected to cascade to their own departmental staff? The culture of CPD, e.g. the frequency and type of training being offered and how staff view (the value of) CPD. High examination success at the school might suggest there is great importance being placed on CPD at the school. [5 – 6 marks] There is a well balanced answer that explains how organizational culture affects both recruitment and training. Appropriate terminology and examples have been used. [3 – 4 marks] The answer addresses bothRead MoreProject Managment Case Studies214937 Words   |  860 Pagesinstructor) Ellen Moore (A): Living and Working in Korea 177 Ji nan Broadcasting Corporation 196 4 PROJECT MANAGEMENT ORGANIZATIONAL STRUCTURES 205 Quasar Communications, Inc. 207 Jones and Shephard Accountants, Inc. 212 Fargo Foods 216 Government Project Management 220 Falls Engineering 222 White Manufacturing 227 Martig Construction Company 229 Mohawk National Bank 231 5 NEGOTIATING FOR RESOURCES 235 Ducor Chemical 237 American Electronics International The Carlson Project 245

Sunday, December 22, 2019

The Dystopian Concept Of Beholder And Watchdog2 By George...

3. Orwell: A society without privacy In order to analyse deeply about the dystopian concept in Beholder and Watchdog2, here is another example game named Orwell, which basically express same dystopian thoughts as Watchdogs series. It released on 20th October 2016, which developed by a German group named Osmotic Studios. The game idea was directly encouraged by a surveillance program named PRISM which disclosure by a Central Intelligence Agency employee Edward Snowden in 2014. His PowerPoint slides showed that the United States National Security Agency collected internet communications’ information from nine internet companies through this program since 2007 (Gellman Poitras, 2013), the range is not limited to the United States but†¦show more content†¦Even if this Orwell system looks so terrible, however the original intention of creating this system was good. With players’ exploring of the game and collecting the information that drawn from textual clues, they will know the truth and history of this surveillance system. The creator of Orwell set two human elements position to achieve mutual constraint and also aim to restrict Orwell’s power. One element is investigator, which is the role of players, they only can investigate all the personal information, personal accounts and electronic equipment of target persons, and then select the suspicious information to submit. Another element is advisor who is a government insider and cannot get any information of target person. They only know some key information that submitted by investigator and they will speculate to track down a criminal by analyzing these information. But actually this ‘mutual constraint’ cannot get to the expected effect. Because investigator only can investigate target person who is recognized as potential danger, however it is hard to define ‘potential’. Finally more and more person added to the target list, Orwell become to a surveillance network which spy on every citizen . Turning now to the question of the connection between game and dystopian thoughts. Dystopian thoughts are parts of game narrative, according to Jenkins’ game narrative concept (2004), games create a precondition for an immersive narrative experience by

Saturday, December 14, 2019

Public Policy for Animal Welfare in India Free Essays

Public Policy for ANIMAL WELFARE in INDIA. Issues, Challenges and Recommendations Submitted by – DR. PUNIT G. We will write a custom essay sample on Public Policy for Animal Welfare in India or any similar topic only for you Order Now (PGP-2), IIMA. ARTICLE 51 of INDIAN CONSTITUTION Article 51 of Indian constitution provides protection to animals in India by ensuring â€Å"Compassion to all living creatures†. For ensuring the same, PREVENTION OF CRUELTY TO ANIMALS act was enacted in 1960 under which the Government of India instituted the ANIMAL WELFARE BOARD of INDIA for carrying out the activities mentioned in the above mentioned act. Following are some of the important points to be discussed in this backdrop: 1. Saving of DOG population from mass killing by local municipal corporations. a. Enforcing the ANIMAL BIRTH CONTROL PROGRAMME throughout India, i. e. replacing mass killing of stray dogs with vaccination sterilization programmes. 2. Creating SPCA’s (Society for Prevention of Cruelty to Animals), monitoring their activities, and derecognizing those which are non-working or misusing their mandate. 3. Work towards licensing and taxation of all dog and cat sellers. The report that follows will discuss each issue in the backdrop of the necessity for creating such an article in the act, the relevance in today? time, critical analysis of the policy, any suggestions/recommendations to improve the efficacy for the purpose for which it was put in the first place. ABC program: â€Å"SAVING of DOG POPULATION from MASS KILLING† OVERVIEW: Mass killing of stray dogs was started in India in the 19th century during the times of Britishruled India. Almost 50,000 dogs were killed every yea r even after Independence by the local municipal authorities with an objective to eradicate RABIES and also reduce the stray dog population in India. But in 1993, finally the government admitted that this policy had een a complete failure as human deaths due to rabies had actually increased, and also the dog population was on a rise. This meant that the application of the technique (mass-killing) which was followed in developed countries, did not work in India (a developing nation) as the two environments and scenarios are hugely different from each other. Hence in 1994, the killing programme was replaced by ABC (Animal Birth Control) which meant masssterilization (with mass-vaccination against rabies) instead of mass-killing. In either case, the final objective of the programme is straight-forward – â€Å"Controlling the population of stray dogs. OBJECTIVE of POPULATION CONTROL program: Rather than understanding the pros and cons of any method, let us first begin by laying out the objectives for any such system to be in place. Here are a few of the possible objectives: 1. Protecting the public health at large (as dogs are carriers/vectors for many diseases, including Rabies) 2. Maintaining community hygiene, especially in the urban context. The reasons for doing so are based on some of the facts and statistics highlighted below: i. ii. India has the highest population of stray dogs in the world, an estimated 19 million. 0% of all rabies deaths world-wide occur in India, about 30,000 deaths reported each year. iii. iv. 42% of dog-bite victims are children Noise pollution caused by night fights between dog-packs is a severe problem for senior citizens. v. Stray dogs on runways have forced pilots to take evasive action, causing near-accidents to aircraft and necessitating orders from the Mumbai High Court to IAAI to take all necessary measures to clear airport areas of stray dogs. UNDERSTANDING THE â€Å"STRAY DOG† ISSUE: â€Å"Stray dogs† are the ownerless, abandoned, un-muzzled, wandering dogs on the urban road, i. . Free-ranging urban dogs (wikipedia). This means either they are ownerless right from their birth, or become ownerless at some point in their lifetime. These may be pure-bred, true mixed-breed, or un-bred (e. g. Indian pariah). Overpopulation of these stray dogs can cause public health problems for the societies in which they wander freely. The important point to be understood here is that – the societies at risk are majorly the URBAN societies. A lot of literature regarding the stray dogs talks in the context of urban landscape only. Hence it is imperative to understand the reason behind strays becoming a nuisance/menace/problem for the urban landscape, but not majorly for the rural landscape. Is it an URBAN MENACE? Stray dogs or the Indian pariahs are considered scavengers. Principally, this means that they live on the scraps or leftovers from the human households. This is not shocking as history tells us that dogs are those descendants from the wolves which got domesticated due to the humans using them in their hunting expeditions, and rewarding them by passing over chunks of meat or leftovers from the kill. This also implies that this particular evolution of the wolf species has been artificially induced by the humankind. This backdrop is essential in the light of the discussion ahead, as the SCAVENGER nature or utility feature is a part of the domestication feature during the evolution of the dogs. Since ancient times, dogs domesticated around villages serving two primary functions. These being: A. Sanitation B. Security As dogs used to live off on the scraps and the edible waste from the house-holds, they became scavengers in addition to the other natural scavenger animals (including birds). This also meant that they served as an important step in the maintenance of hygiene of the villages by performing effective waste management. In the urban scenario, such a natural waste management system is of no use as there are better waste management systems at disposal. This led to scarcity in the natural food (leftovers) for dogs, leading to the usual survival phenomena of forming packs and searching for food. Hence, this puts the urban society at risk. But given the open access to garbage (a result of improper waste management) in urban areas of developing countries, dogs have found a way to live and breed freely. Hence, the resultant has been that the stray dog-population has been on a rise even when mass-killing was in place. So the technique of control is not a problem in first place, but the lack of proper waste management in the urban scenario. This also brings out an important hypothesis – â€Å"Population control measure of any kind is bound to fail in absence of proper urban waste management systems which lead to free-access of these stray animals to waste which acts as their source of food. † Dogs are territorial animals – that means they guard their territory, not just from other dogs but from anyone they perceive as intruders. This is a feature which has been exploited / put to use by the humans for decades of their symbiosis together. But in the urban setting, this utility feature is not put to use at all, except the use of certain breeds of dogs (mainly nonIndian origin) for security/guarding purpose. The innate guarding nature of dogs lead to these strays barking on beggars entering into new territories, attacking speeding vehicles ONLY DURING NIGHT TIMES, etc. An interesting example to prove this case is the instance of a few stray dogs barking on the 26-11 attackers when they landed by a ferry in Mumbai. These strays were continuously barking at those people trying to make the locals aware that they are sensing some deviation from the normal – perhaps sensing a major threat. But the locals chose to ignore this, and the rest is a fateful history. This also brings out an important hypothesis – â€Å"Stray dogs are nuisance in urban settings not because they are not a fit in the urban environment, but because we haven’t been able to tap into their innate abilities and utilize them for maintain the centuriesold symbiosis between the two species. † ANALYSIS/EVALUATION/CRITIQUE OF THE FACTS: i. India has the highest population of stray dogs in the world, an estimated 19 million. A simple look at this fact makes us think that it is time to control this population. But a deeper understanding of dynamics of dog population will clear a lot of air. Dog populations follow a specific growth curve – the initial being an EXPONENTIAL growth curve, followed by decrease in birth rate and increase in death rate reaching equilibrium depending on the carrying capacity of the environment to keep this balance. The carrying capacity of environment means the availability, distribution and quality of resources (shelter, food and water) which aid the natural growth of dog population. (Jimenez-Coello) This also implies that dog population control measure cannot be seen independent of the factors which impact it. Hence, control on the carrying factors is a pre-requisite for the direct control measures like â€Å"sterilization† to actually succeed. ii. 80% of all rabies deaths world-wide occur in India, about 30,000 deaths reported each year. Rabies is a preventable viral disease transmitted through the saliva of INFECTED animals. Dogs are the most common source of transmission to humans. The control measures adopted currently are the â€Å"Vaccination programs† against rabies. Now the efficacy of such a program depends on a lot of factors which involve maintaining the cold storage or cold supply chain of the vaccine, administering the vaccine when the dog is normal health, administering in puppy stage, regular annual vaccination, etc. The question which arises here is how a stray dog, living in open conditions, can be made to confirm to all the above criteria. Hence, the efficacy of this system will always be questionable. Also, a major loophole exists in actual implementation of this measure – the number of dogs vaccinated by any animal welfare organization is simply taken at the face-value by the AWB. Shouldn? t there be a correlation between the population of dogs in a given area, number of dogs vaccinated and number of rabies incidents reported/found? This should be an evaluation criterion to confirm if the organization is efficient in performing the objective of rabies control. iii. Noise pollution caused by night fights between dog-packs is a severe problem for senior citizens. Do dogs bark only when they fight? If yes, do they occur only during the night? Many such questions can be raised to actually test the truth behind this fact. Yes, barking leads to noise pollution, disturbance during night etc. but dogs bark when they feel threatened OR perceive someone to be a threat to their territory. We also need to prepare a report on number of petty thefts (stealing car audio, burglary etc. ) being prevented due to stray dogs barking at night. That would be a valid critique for the above fact. THE SOLUTION (Combination of CONTROL and UTILITY) A unique model which suits a developing nation like INDIA needs to be created for ensuring that the dog population doesn? t actually become a menace to the society. A species which has long been living in harmony and symbiosis with the human race since ages, doesn? t mutate into a pest for humans – just because we haven? t found a utility of this domesticated species. Along with ANIMAL BIRTH CONTROL PROGRAM and VACCINATION PROGRAM, a „COLLECTIVE PETTING? methodology is proposed which is as follows: POLICE SYSTEM Aid to curb urban crime (theft, burglary, etc) Search Rescue assistance during DISASTERS. EDUCATIONAL INSTITUTIONS Involving students in proper care of strays. Development of a broader understanding of urban environmental balance in students. Development of caring attitude for animals in students. – NGO’s Driving force of this entire project VETERINARY HEALTHCARE Preventive Health care system. Market research. Outsourcing of food medicines for the project. Efficient implementation of the project. – – Main co-ordinator between all the key players. Think-Tank for this entire project. – HOUSING SOCIETIES Collective Adoption of Stray dogs. Better security solution. Reduction in menace to the society. How to cite Public Policy for Animal Welfare in India, Papers

Friday, December 6, 2019

System Analysis of Headspace for NSW- myassignmenthelp.com

Question: Discuss about theSystem Analysis of Headspace for NSW. Answer: Introduction Headspace is a mental health organization that wok with young people from age 12 to 25 those who mainly suffers from anxiety and depression. These are the most common health problems that the youth faces in NSW. Youth commits suicide in NSW from the age group 16 to 25. The youths have to see multiple doctors and professionals for their help (Abolfazli et al., 2014). The problem arises in Headspace in this area that each time the youths shifts their professionals, they have to repeat their story each and every time. Saying the same thing several times, the youth summarizes their problems which make treatment difficult for the professionals. Youths are admitted in the ED (Emergency Department) of the hospital. There is no such system that gives notice to the case workers of the Headspace about the release of the patients. The youths cannot get any type of help from the case workers of the Headspace after their release. For this issue that has arrived in Headspace, a cloud solution is p roposed. The solution that is cloud based provides a solution to the Headspace with all the issues related to data security and data ownership of the Headspace, youth that comes for treatment, to the Emergency Department and the case workers. This report gives a detailed structure that is needed by Headspace related to cloud solution. The non-functional requirements that are needed for the system is clearly stated which includes the use of FURPS+ aspect of the non-functional aspect. The details of the cloud based solution are given stating its advantages as well as disadvantages of using cloud solution in Headspace. Lastly an SDLC approach is described briefly stating the advantages and the disadvantages of predictive and adaptive methods of SDLC. Non-functional Requirements of Headspace The requirements that are needed by Headspace to solve the different attributes of the cloud based system are known as the non functional requirements of Headspace (Awan, Malik Javed, 2015). All the critical qualities of the cloud based system are recognized by the non-functional requirements. The non-functional requirements of system are FURPS+. FURPS+ stands for functionality, usability, reliability, performance and the last is the security. The requirements are important to a system of the Headspace. FURPS+ technique is explained in as follows: Functionality: The Functionality defines the feature of a product that is considered as the most common among all the features (Mijumbi et al., 2016). The functionality requirements are mostly technical oriented which includes printing, auditing, system management, mail, licensing, workflow and security. Usability: The issues that are related with the users are involved in usability of the FURPS+ technique. The issues are related with the user to start the system, look at all the requirements and also capture the system (Rahimi et al., 2014). The non-functional requirements of the cloud system are ensured by the usability factor of FURPS+. Reliability: Reliability ensures availability, accuracy and also recoverability. The dependency on the recovery and the computations are the main factors that are related with the system which protects the system from being shut down. Performance: The information all through the cloud system that are performed and the total time taken by the cloud system is calculated in the performance technique (Penzenstadler et al, 2014). The recovery time that is required for the system to recovery is also calculated in performance. Security: The last technique of the non-functional requirement of FURPS+ is the security. The security is the main factor for Headspace because it needs to keep all the data that are stored confidentially. The data that are kept in the record of Headspace are all highly sensitive as well as confidential (Stoica, Mircea Ghilic-Micu, 2013). The security provides a guard for all the data that are stored in the cloud from unauthorized access. The + sign of FURPS+ describes some particular constraints. This includes interface of the system, physical constraints, the design constraints of the system and also the implementation constraints of the system. Functional Requirements and Non-functional Requirements of Headspace Functional Requirements- The doing of all the services in a system are mainly specified in the functional requirement. To satisfy and maintain the fundamental reasons for existence, the actions that are performed by service comes under the functional requirement. The fundamental activities that are required in functional requirements are manipulating the data and also computing all the data (Balaji Murugaiyan, 2014). The functionality service is not changed by the functional requirements irrespective of all the other properties that are associated with them. The functional requirements that involved in a cloud system area s follows- authorization level, cancellations and the adjustments, transaction corrections, historical data, administrative functions, certification requirements, business rules, requirements that are legal and regulatory, external interfaces, reporting requirements, audit tracking and authentication. The most common example of functional requirement is sending of email when new registration is done by the customers or a customer sign in to their account. Non-functional Requirements- The properties that are possessed by services comes under the non-functional requirements of the cloud system (Chung et al., 2012). All the qualities and the characteristics that are needed to make the cloud service fast, attractive, reliable and usable are the properties of non-functional requirements. In non-functional requirement, fundamental activities such as manipulation of data and computation of data are not at all required in the system. The non-functional requirement of cloud service is made easy and secured for using by adding different functionality. The limit of functionality is kept on the system in non-functional requirements and the behavior is also elaborated in this requirement. The functions of non-functional requirements that are involved in the cloud system are: capacity, reliability, scalability, maintainability, regulatory, interoperability, usability, manageability, security, performance of response time, utilization, static volume tric, availability, serviceability, data integrity, recoverability and data integrity (Galibus Vissia, 2015). All the attributes and the characteristics of the cloud system are mentioned so that all the users accessing that database are aware of the changed updated data. Solution based on cloud Advantages of Cloud Environment- The following are the advantages of cloud environment. Usability- The cloud storage services are taken care of in usability in folders of desktop of personal computers and MAC books (Tuteja Dubey, 2012). This gives all users the facility of dragging and dropping all files they want to store in the local storage. Accessibility- All the files that are stored in the cloud should be enabled to be accessed by the users through the internet from any place the user wants to access. Recovery- There is a high backup plan for the services that are provided by the cloud system. Backup plan is an essential part of any kind of business in case there exists some data breach or some data loss from the organization. All the files that are stored in the cloud keep a copy of those as a backup in case any tragedy happens with the user. Saves the cost- The operational cost of cloud storage that is used by organizations and the businesses are needed annually (Rittinghouse Ransome, 2016). The cost that is actually needed to store data in cloud is calculated as per GB. It costs 3 cents for a single GB to store in the cloud. Disadvantages of Cloud Environment- The disadvantage of cloud environment are as follows. Usability- The feature of dragging and dropping are provides a disadvantage as well for the cloud system. The user those who are adopting the method of drag and drop have to be careful about the method (Kulkarni et al., 2012). Copying and pasting is not allowed in this process. Accessibility- The disadvantage arrives with accessibility because the cloud system is not accessible without internet. The user cannot access the files that are stored in the cloud without internet. Data Security- Most of the time, the security to all the data that are stored in the system are not secured efficiently by cloud system (Li et al., 2013). The privacy of the information is not taken care of as in other system like cloud. Software- Another disadvantage is that the systems which have the installed software for using cloud can only get access to the files and data that are stored in the system. If the system does not have the software installed, the files are not at all accessible. Headspace deals with all the types of data that are very sensitive and are to be kept confidential. A cloud system is implemented in Headspace to keep all the data secured and safe. Some processes are to be followed to store the data in cloud system. Firstly the agreement those are provided by the cloud providers are to be read properly by Headspace. In case there is any data breach in Headspace, the cloud is able to give a security and keep a backup to all the information that is stored in the system. Some of the cloud services that is recommended for Headspace are Spideroak and the other is Wuala. SDLC Approach Predictive Approach Advantages- The model of predictive approach is very easy to implement and very simple to understand the method and implement them. The predictive approach is very easy to manage because the model is very rigid. The processes and the phases that are involved in the predictive approach are all completed at one time which does not create overlapping of the phases. The advantage of predictive approach is that it works well with smaller projects which enable the requirement to understand well. Disadvantages- The disadvantage predictive approach is that if the user proceeds with the method once, then the user feels difficult to go back if the processes reach to its testing stage. The projects that are done with this method are mostly very complex and are object oriented (AlZain et al., 2012). This model provides high uncertainty and also is risky to be carried out. The main disadvantage of predictive approach is that they do not work with a project that runs long. Adaptive Approach Advantages of adaptive model- The functions that are involved in the adaptive model can be developed early before implementing the process. The results that come from this method can also be predicted before the completion of the project. Planning process is done for this adaptive method. Disadvantages of adaptive model- The adaptive method requires many processes which prove a disadvantage of this model. Managing the adaptive method is very difficult as it deals with big projects and methods. For defining the increments, the complete system are to be defined beforehand which is very difficult. Conclusion Headspace can use the SDLC Adaptive method for completing their processes because the functions that are involved in the adaptive model can be developed early before implementing the process. The results that come from this method can also be predicted before the completion of the project. Planning process is done for this adaptive method. The requirements that are needed by Headspace to solve the different attributes of the cloud based system are known as the non functional requirements of Headspace. All the critical qualities of the cloud based system are recognized by the non-functional requirements. Headspace deals with all the types of data that are very sensitive and are to be kept confidential. A cloud system is implemented in Headspace to keep all the data secured and safe. Some processes are to be followed to store the data in cloud system. References Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R. (2014). Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges.IEEE Communications Surveys Tutorials,16(1), 337-368. AlZain, M. A., Pardede, E., Soh, B., Thom, J. A. (2012, January). Cloud computing security: from single to multi-clouds. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5490-5499). IEEE. Awan, S., Malik, F., Javed, A. (2015). An Efficient and Objective Generalized Comparison technique for Software Quality Models.International Journal of Modern Education and Computer Science,7(12), 57. Balaji, S., Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), 26-30. Chung, L., Nixon, B. A., Yu, E., Mylopoulos, J. (2012). Non-functional requirements in software engineering (Vol. 5). Springer Science Business Media. Galibus, T., Vissia, H. E. R. M. (2015). Cloud storage security. Proc NSCE, 2014, 123-127. Kulkarni, G., Gambhir, J., Patil, T., Dongare, A. (2012, June). A security aspects in cloud computing. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on (pp. 547-550). IEEE. Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems, 7(3), 237-271. Mijumbi, R., Serrat, J., Gorricho, J. L., Bouten, N., De Turck, F., Boutaba, R. (2016). Network function virtualization: State-of-the-art and research challenges.IEEE Communications Surveys Tutorials,18(1), 236-262. Penzenstadler, B., Raturi, A., Richardson, D., Tomlinson, B. (2014). Safety, security, now sustainability: The nonfunctional requirement for the 21st century.IEEE software,31(3), 40-47. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. Rittinghouse, J. W., Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press. Stoica, M., Mircea, M., Ghilic-Micu, B. (2013). Software development: Agile vs. traditional.Informatica Economica,17(4), 64. Tuteja, M., Dubey, G. (2012). A research study on importance of testing and quality assurance in software development life cycle (SDLC) models. International Journal of Soft Computing and Engineering (IJSCE), 2(3), 251-257