Saturday, May 30, 2020

Reading Research Literature †Week 5 NR439 RRL - 1650 Words

Reading Research Literature – Week 5 NR439 RRL (Essay Sample) Content: Reading Research Literature Week 5Type your answers to the following questions using complete sentences and correct grammar, spelling, and syntax. Click Save as and save the file with your last name and assignment, e.g.,NR439_RRL_Smith. Submit to the Week 5 RRL basket in the Dropbox by 11:59 pm MT Sunday at the end of Week 5. The guidelines and grading rubric for this assignment may be found in Doc Sharing.Title: RRLName: [replace this text with your name]The following questions pertain to: George, S., Thomas, S. (2010). Lived experience of diabetes among older, rural people. Journal of Advanced Nursing, 66(5), 1092-1100. HYPERLINK "http://search.ebscohost.com.proxy.chamberlain.edu:8080/login.aspx?direct=truedb=rzhAN=2010620411site=ehost-live" http://search.ebscohost.com.proxy.chamberlain.edu:8080/login.aspx?direct=truedb=rzhAN=2010620411site=ehost-live What is the purpose of this research?The purpose of this study was to demonstrate the perceptions and experienc es of self-control in aged insulin-reliant persons that live in rural areas. The primary aim of the study was to gather the participants experiences to help them construct a new diabetes education framework.What is the research question (or questions)? This may be implicit or explicit.This may be implicit or explicit. Is there need to develop guidelines for diabetic management specifically for the aged population? Did the authors describe the research design of this study? If so, give a description.Yes, the author described research design of the study. The authors used a phenomenology study collect the lived experiences of the older insulin-reliant individuals by using unstructured interviews. Furthermore, the design was selected because of its ability to describe lived experiences by research participants.Describe the population (sample) for this study.The sample used in the article was retrieved from local agencies on aging; selection was made between January and May 2005. The pa rticipants were English speaking and aged between 65-85 years. The chosen participants were willing to talk about the experience with diabetes. Furthermore, they were located in social homes and rural areas. The number of people who participated in the study involved eight Blacks and two White women. In addition, they received social security as the only source of income. The length of time with diabetes ranged from seven to 39 years; five individuals had been living with diabetes for 25 years. The other five had lived with the disease for 12 years. All patients had visible evidence of diabetes-related complications. Furthermore, they were widows and had more than one diagnosed disease. Was the sample adequate for the research design that was selected?The sample used in this article is suitable for the research because it involves less than 20 participants who will provide sufficient evidence and information needed for quality research.Describe the data collection procedure.Data col lection used in the research was interviews and surveys. Interviews were conducted in patients home and at their convenience. Unlike structured interviews, the dialogues used in the research involved a quick question such as "please tell me what it is like for you living with diabetes (George, 2010, p. 1096). The interviews allowed patients to provide their experiences. They lasted 1-2 hours depending on how the participant answers the questions. They were also recorded using tapes. After the conversations, a survey was conducted to evaluate the issues of self-management, for example, the rate of testing blood glucose level.How were the data analyzed after collection?Analysis of collected data was performed using Thomas and Polia method of analyzing phenomenological research. The analysis was carried out by phenology research groups comprising of research students enrolled in a doctoral program. The study involved reading and re-reading the recordings to establish insight and the se nse of lived experience.Discuss the limitations found in the study. The limitations present in the study were significant in providing gaps existing in diabetes among the aging in the society. First limitation is that the research used a small sample size that affected the depth of understanding of the relationship between self-monitoring, diabetes, and elderly in the community. Furthermore, few samples create a concept of redundancy or saturation that is achieved when new thematic material arises during interviews. The second inadequacy is that the reading generalizes the relationship between diabetes, rural areas, and elderly. The investigation fails to capture the aspect of different ethnicities such as minority groups, for example, Hispanic Americans, Asian Americans, and Native residents. Additionally, the survey was not gendered sensitive, as it did not include men. Furthermore, the transference of data and findings into research report depended on the researcher; the research ers can create biases due to the fear of some aspects such as death and severe illnesses (George, 2010). Irrespective of all the limitations, the analysis captured critical concepts relating to the prevalence of diabetes among old adults in the United States.Discuss the authors' conclusions. Do you feel these conclusions are based on the data that they collected?From the findings in the article, the author concludes that the traditional method of educating individuals with diabetes should be discarded. Moreover, self-management education should involve nursing model incorporating patient insights and experiences. George points out that caregivers should allow patients or clients to participate in providing ideas that are used in modification or adaptations of needed structure; instead of forcing diabetes patients into the intellectual, financial, and psychological system, nurses should allow them to decide. Additionally, George advocates for the adoption of International Diabetes Fe deral model that is characterized by patient experience and self-management. He asserts that self-management has the potential of promoting collaborative relationship. An evaluation of the authors conclusion shows that it was done basing on the outcome of the study. The conclusion also provides a long-term solution to the problems that affects diabetes patients during self-management. Therefore, the end is adequate and appropriate for the research was done.How does this advance knowledge in the field?The findings from the study have a significant impact on healthcare. Firstly, the study adds to the existing research on diabetes among the aged. Some of the information added to the reading is that having diabetes and living in a poor state leads to introspection and existential questioning. Furthermore, the research provides an alternative framework for caring for elderly people diagnosed with diabetes. The following questions pertain to:Hunt, C., Sanderson, B., Ellison, K., (2014). Support for diabetes using technology: A pilot study to improve self-management. MedSurg Nursing, 23(4), 231-237. HYPERLINK "http://search.ebscohost.com.proxy.chamberlain.edu:8080/login.aspx?direct=truedb=rzhAN=2012695204site=ehost-live" http://search.ebscohost.com.proxy.chamberlain.edu:8080/login.aspx?direct=truedb=rzhAN=2012695204site=ehost-liveWhat is the purpose of this research?The purpose of the study was to determine how technology could be utilized to assist individuals with type 2 diabetes. Specific aims of the article were raising self-efficacy for diabetes self-management, increasing participation in self-management, and improving on diabetes.What is the research question (or questions)? This may be implicit or explicit.There are two research questions for this study: Can technology assist persons diagnosed with type 2 diabetes? Can Apple iPad technology support diabetes self-management? Did the authors describe the research design of this study? If so, give a descrip tion.Yes, the authors described the design for the study. The pilot study utilized a two-group repeated measures design. The participants in the study were sampled from an employee group diagnosed with diabetes located in a medical center in the Southeast. The primary investigator sent emails to describe the research. Interested individuals were given questions and determined if they qualified.Describe the population (sample) for this study.The sample target for the study was 20 employees. Sixty individuals offered to participate. About 17 people were recruited for the research. Was the sample adequate for the research des...

Thursday, May 28, 2020

Friday, May 22, 2020

Sample Scholarship Essay - Make Use of This Simple Guide

<h1>Sample Scholarship Essay - Make Use of This Simple Guide</h1><p>Many individuals wrongly go to an online article webpage and afterward either rounding out a protracted structure, or then rounding out a one-passage paper, and afterward trusting that it gets read by some school confirmations official some place. Shockingly, this isn't the most ideal approach to get things done. Truth be told, in the event that you are utilizing on the web article destinations to compose your paper, you will probably be investing considerably more energy in something that ought to be fun and easy.</p><p></p><p>The reason that exposition composing is such a dreary procedure is, that such a large number of various elements must be thought of. There are numerous snippets of data, and thoughts, and proposals to consider. You have to think about sentence structure, style, accentuation, tone, and as a rule how to write as a rule. This requires some serious energy and can truly hinder an ordinary individual attempting to traverse a run of the mill day of work.</p><p></p><p>A better, and progressively compelling approach to compose an exposition, is to recruit somebody who spends significant time in the field of article composing. In the event that you go through even an hour or two of your time composing an article, that is a whole semester of work!</p><p></p><p>By recruiting somebody to compose your exposition for you, you will spare yourself the time that it would take to do it without anyone's help, just as the expense of employing an expert author. The large advantage to employing somebody is that they will for the most part charge you a level expense for each article, however will work with you on numerous parts of the exposition to ensure that you can succeed. You will show signs of improvement and quicker completed item, just as will have a significantly more lovely experience, which is a decent prize for placing in the time.</p><p></p><p>Now that you have this new technique for composing your example grant exposition, you can escape. Numerous individuals feel that composing something like this is only an exercise in futility, and that they should simply acknowledge whatever offer that they were given. The thing is however, you have to request a variety of grants, and you have to have many paper tests, with the goal that you can make your papers stand apart from the rest.</p><p></p><p>Many times the grant council will give you an exposition to survey before the cutoff time, and this can be an extraordinary chance to take a gander at some different models, and see what works for you. The equivalent goes for the grant application paper too. You can get a fundamental thought of what the board of trustees anticipates from you by taking a gander at the accommodation guidelines.</p><p></p><p>It is sig nificant that you follow the rules, and you have to compose a quality bit of composing. This may take a brief period, yet the outcomes will be justified, despite all the trouble at long last. Actually, it is conceivable that you might be approached to resubmit a few times, yet the exact opposite thing you need to do is send in an inadequately composed or nonexclusive essay.</p><p></p><p>If you compose your grant exposition with proficient plan, at that point the board is bound to see your application as being more focused towards the particular school or college you are applying to. It is a smart thought to concentrate on what the individual grant is for, and why you accept that you will be an extraordinary contender for it. At that point you will have the option to compose a paper that will truly get the consideration of the confirmations committee.</p>

Wednesday, May 6, 2020

Media Coverage of the Vietnam War Essay - 952 Words

Vietnam and the Medias Coverage of It Vietnam is unlike any war ever fought, unlike other war that we fought none before that brought so much controversy as to how it was covered by the media, it forever changed the way we the public looked at war. As technology evolved so did the ability to cover news. In the years prior to Vietnam there was only radio and television was not yet in every household, not to mention there wasnt no color televisions and very few color pictures. The media not only improved with their technology but they also were bigger than they had ever been. It was not so much the size of the war that really made an impact as to how we saw war afterward, in other past wars there†¦show more content†¦The means of showing those images was not quite there, most people would listen to the radio or those moments shown on television that portrayed the war were recorded and already edited. The coverage with Vietnam was different in that the media was far less regulated. It was harder to hide the truth when the means of showing it was there and the support for the war wasnt. At first the media took the approach of trying to show the Americans as winning the war but the that quickly changed by the way the images showed otherwise. It showed families being killed. What people were seeing on television was disgusting them. Americans were in a war like no other, in past war the enemy would be in uniform and it was clear who to kill who not to, in Vietnam it was different the enemies would also be families who did thing that were unheard of such as strapping bombs to their babies so that to kill a bunch of soldiers because the Americans were least likely to believe that there was any harm to a kid on a stroller. Many military operations were done from civilian homes where there would be underground tunnels where the enemies would be at and could not be seen. Unlike any oth er wars the mistakes of are soldiers were magnified because not only were they seen by there own comrades but by the people watching the television. The impact the coverage madeShow MoreRelatedMedia Coverage On The Vietnam War1549 Words   |  7 PagesThe Vietnam War introduced many new forms of technology on and off of the battlefield. Increased weaponry helped shape the outcome of the war, but media coverage also played a large role in representing the news and opinions of the war. Viet Thanh Nguyen’s The Sympathizer helps illustrate how the media influences and spreads the opinions of the people during the Vietnam War. The war media, which includes newspapers, movies, and most importantly television, caters towards its audience. What the mediaRead MoreMedia Coverage Of The Vietnam War1257 Words   |  6 Pagesleast not in the traditional sense. They fight with audio and video, instead. (Rewrite Hook) This was live coverage of the Vietnam War, a long, bloody, unforgotten, and unappreciated war. Once these horrifying images were cast onto American screens, United States would find itself covered in ruins. Ruins that would cost years and years to rebuild. (Fix Transition) Media coverage of the Vietnam War ignited a new era of journalism and served as a driving force in the public’s perception of United StatesRead MoreMedia Coverage in the Vietnam War and the War on Iraq2062 Words   |  9 PagesWinston Churchill. Ideally, the media has a responsibility of making sure that it does not happen. The media plays a crucial role in covering the war in the most objective, bias-free and truthful manner, even if negative stories have to be reported. In this essay, the comparison of media coverage between the Vietnam War and Gulf War II has four areas to cover, which are the freedom of correspondents, embedding, the reliability and quality of the coverage. The media also plays the role of a watchdogRead MoreImpact Of Media Coverage During The Vietnam War2252 Words   |  10 Pagesbecause news and media are such an integral part of society, important events of wars are typically published in newspapers across the globe, featured on nightly news, and talked about extensively. In fact, it is hard for the average person in Western societies to not be informed about the happenings of particular events due to the fact that this information is so widespread. However, warfare coverage has not always been at the forefront of media. It was not until the Vietnam War that wartime happeningsRead MoreWhat Evidence Exists to Demonstrate That the American Media Coverage of the Vietnam War Influenced Its Outcome?2591 Words   |  11 Pages‘Television brought the brutality of the war into the comfort of the living room. Vietnam was lost in the living rooms of America – not on the battlefields of Vietnam.’ (Marshall McLuhan, 1975). What evidence exists to demonstrate that the American media coverage of the Vietnam War influenced its outcome? There are only two comprehensive inferences that can be drawn upon when assessing the impact and legacy of the reporting of the Vietnam War on America and its media; the impact was enormous and itsRead MoreThe Vietnam War And Its Horrors1130 Words   |  5 Pages The Vietnam War and its horrors came into the living rooms of people through from news reports through television. This war was the first war to issue full freedom to the press. There was a huge response to what people saw in a negative way. Many people thought the war should not have been televised. According to â€Å"U.S. at War: A History of Shame†, it was until 1965 that the Vietnam War became a big story on television. Journalism coverage of this war using television had a huge effect on the peopleRead MoreThe Problem With Vietnam Essays1660 Words   |  7 PagesThe Problem With Vietnam Wartime in the United States has always placed pressure on the government and the citizens of the country to provide support by whatever means to the situation. During World War II, that support was propagated by the government in the form of censorship and a strategic public relations plan to maintain the public opinion in favor of the cause. Glorification of Americas involvement in the war helped America maintain the image of a cause worth fighting for. TechnologyRead MoreEssay about Why the U.S. Withdrew Its Forces from Vietnam in 1973924 Words   |  4 PagesWithdrew Its Forces from Vietnam in 1973 The USA’s involvement in Vietnam started in 1954, for a few reasons. Firstly, the Americans were, as always, concerned with the spread of communism. They wanted to stop communism spreading through south-east Asia. They were worried that if one country were to fall to a communist leader, so would neighbouring countries. This was known as the Domino Theory. These reasons for joining the war in Vietnam and the fact that theRead MoreWhat Role Did the American Media Play in the Vietnam War1741 Words   |  7 PagesIntroduction: The American media is a vital resource for coverage on national and international affairs. They keep the public informed and report on matters that the United States is involved in so the American people can form their own views and opinions on them. Notably the media simply cannot report on every event that involves America so, they also have the job of picking and choosing between what is most important and what is newsworthy, alongside the task of reporting news reports that willRead MoreHow The Autonomy Of Journalists Are Affected During War Times1675 Words   |  7 PagesTitle-How the autonomy of journalists are affected during war times and the power struggle related to media coverage. New technology During the 1990s, the creation of advanced news-gathering equipment, the apparent growth of the 24-hour news channel, the increase of transnational media organizations and the spread of the internet platforms suggests the arrival of a more pluralized public sphere. The overall effect of these technological developments, according to many analysts, was a reduction in

Tuesday, May 5, 2020

Security Privacy Issues in internet Internet †Free Samples

Questions: 1.What are the security and privacy issues in internet of things ? 2.What are the applications of internet of things? Answers: Introduction In simple terms internet of things is a concept of connecting the devices to the internet by simply using on and off button. It is also used to connect devices to each other. The list of things that includes is very vast and it includes many things like cell phones, wearable devices, washing machines, lamps, and anything of which one can think(Morgan, 2014). The concept of internet of things is not very old. It all started in 1800's time period with the invention of telegraph which is called as wireless telegraphy. Then the next big step was the first radio voice transmission which was conducted in 1900. This gave a start to the necessity for developing internet of things(Postscapes, 2004). And so began the development process of computers in 1950's. The use of internet was started as part of DARPA that is (Defense Advanced Research Projects Agency) in the year 1962 and this was later on developed as ARPANET in the year 1969. Later commercial service providers started showing interest in the public use of ARPANET which grew as internet in today's modern world. The next step in the development of internet of things was a major step and that was the development of Global Positioning Satellites commonly known as GPS in the year 1993. And this gave a boost to the privately owned satellites as well as to the development of commercial satellite system that started orbiting in the space. The use of Internet of things into a number of technologies has been started since 2013(Foote, 2106). When the people didnt even knew the term internet since then the manufacturers are using this to connect things around us(Chase, 2013). Scope of Engagement The scope of internet of things is very wide. It has many significances in the field of technology, social as well as economic significance. Today everyday objects are connected with internet of things like utility products, consumer products as well as capital products, cars, etc. you name a thing and it is connected with internet of things in some way. Elements of internet of things that provides it a wide scope that includes- wireless sensors, wireless battery free sensors, wireless sensing networks, industrial internet, digital mechanical engineers etc. are the elements of internet of things(Tyagi, 2014). Internet of things has the capacity as well as capabilities to transform the way of life as well as the manner one thinks, play and respond to other works. Internet of things has spread its scope in every nook and corner of the world and in every aspect of one's life like in agricultural sectors, transportation sector, in developing cities, as well as in developing any industry as well as helping it to prosper(Prasad, 2016). It is also being used in the mobile applications. It provides a huge scope to the technological companies as they get many opportunities to develop something new for the changing demand of the consumers(Sinha, 2014). As it is seen that technology is also developing with developing needs of man so it can be said that the future of the internet is very bright. Today every person belonging to any caste, race gender or anything uses internet by sitting in any corner of the world(Khan, 2015). 1. Internet of things has opened the scope of virtual networks of real world to connect with the real time people for carrying out interactions. The initial stage which was developed of internet of things is the M2M that is machine to machine connection which included several unique features as well as several subscriptions. Then came the wireless area network commonly known as (WAN). This opened a scope for operations that can be unattended without human intervention(Patel, 2014). The major security issues related to internet of things are as follows: Public Perception: this is the first issue that usually arises in front of the manufactures because usually people are scared of their data getting stolen. So this is the issue which may restrict the consumers from purchasing any products. And people even hesitate to connect to devices due to privacy concerns. Vulnerability to Hacking: the fear of hacking is very major in internet of things. There are specific groups that conduct the work of hacking and spend their time on hacking other people's data or even websites are hacked by such unethical hackers. Every internet of things has certain holes in it that is tracked by these unethical hackers and then it is misused by them. True Security: the companies need to develop security devices at the very stage of developing any internet of things. Network connections needs to be made secure as those are the connecting links (Meola, How the Internet of Things will affect security privacy, 2016). Front end Sensors and Equipment: this receives data with the help of built in censors. After receiving these data, they transmit this data using different modules. So this makes the machines involved in business important. So these machines need to be secured from outside access by any unethical intruder. Network: network is the main part in connecting one device with other devices so it is very important that these networks should be secured properly or else due to network congestion unauthentic people can use the loop holes to intrude. Back end of its system: the back end system requires special attention as at this point high security is needed. The security related to internet of things includes certain major standards that include communication layer security, confidentiality, as well as integrity of the concerned data, controlled accessibility, and the most important being the protection of privacy concern. The major privacy issues related to the internet of things are as follows: Too much data: a number of data related to individuals as well as related to then organizations are available on the internet. This gives a chance to the unethical hackers to hack in their data and misuse it. And this leaves the data of individuals vulnerable. Unwanted public profile: there are a number of documents that gives the companies right to collect information related to an individual. For example, the insurance companies are authorized to gather information related to a person's health, and this is done by the insurance companies in the light of their customers. So, this leaves a scope for the hackers as well to gather any information that can be of importance to them. Eavesdropping: there are chances that hackers can connect to someone's device virtually. One major example of this is, a number of German researchers were able to intercept in the unencrypted data of few people and by that they were able to see what a specific person or family was watching on a television set at that particular moment. Consumer Confidence: all these above factors leaves a fear on the minds of consumers so they hesitate to purchase the products and this limits the scope and potential of internet of things(Meola, How the Internet of Things will affect security privacy, 2016). Privacy in Device: the devices like hardware device as well as the software devices contain much sensitive information that needs to be protected. If this information gets leaked any how than it can be a serious threat as the data contained by these devices can be misused in any manner. For instance, a hacker can hack a company's cameras and link it with his device and can see whatever is going on in the company and can see all the places and plan anything after that. Privacy during Communication: secure communication protocol should be developed to avoid the leaking of data while the process of communications. Encryption of data is conducted to protect the data while communicating. The encryption adds data in certain packets which if stuck into congestion can be hacked. Privacy in Storage: to protect the private information from being hacked it is important to protect the data stored in it. For this one should practice storing least possible information in the storage that is required. If it is compulsory then only one should keep personal information in the storage(Patel, 2014). Recommendations Any organization that develops internet of things products should also take effective measures to develop certain security measures regarding the products. Ample amount of money should be spent on developing the remedies to deal with any kind of security vulnerabilities if occurs. It is believed that companies should develop security for any internet of things at the development stage itself as a precautionary measure rather than taking it as a preventive measure. To undertake this activity, the companies should conduct a privacy risk assessment at the beginning, all the security measures should be put to test at an earlier stage only. Few other measures that can be taken for this is that the employees should be trained accordingly to deal with any kind of security issues. Service providers that provide better security should be adopted by every organization. A defence in depth approach should be developed by the organizations immediately after identifying the risks in their systems. And the major step that can be taken by a company is that they can limit the access control to a certain extent to avoid any access made by any unauthorized person, so that unethical activities can be prevented from happening. And the device as well as data related to organizations and the consumers can be protected. The other step that a company can take is that a continuous checking and evaluating system should be developed in order to identify any threat at an early stage and make further move accordingly(FTC, 2015). 2. Applications of internet of things Smart Home: one of the most popular applications of internet of things is the smart home. As these smart homes are the most affordable as well as are readily available to the consumers. The smart homes provide the people with facility to control all the home activities with their voices, and make their life more comfortable and happy to live in. All the communicational technologies as well as information technologies that are able to connect with internet are proving of utmost importance to carry out the daily household work. Smart home systems are made especially for this purpose. Today every household appliance like washing machines, ovens, coolers, air conditioners almost everything today can be controlled by remote or even by voice of a person, the internet of things has become so advanced in nature. Wearable: the most famous example to site in this section is the watch made by Apple Company. Today Apple watches as well as other smart watches are doing the work of smart phones as well along with telling time. These smart watches enable the option of text messaging, as well as phone calls and many more activities that one must have not even dreamt of. Smart Cities: today internet of things even has the capability of developing entire cities. They are able to solve the issue of, congestion of traffic; they can even reduce the noise and control noise pollution in a specific city. Internet of things is able to control pollution levels, reduce the rate of crime in the city and many more tasks are there that can be conducted by internet of things. Connected Car: today even cars are equipped with many apps and technologies. Today vehicles can share their internet access with others as well just by connecting themselves like the wireless network. So, it can be said that today nothing is there that is not connected or that does not involve internet of things involved in it(Meola, Internet of Things devices, applications examples, 2016). Conclusion So, it can be said that though there are a number of security as well as privacy issues that are connected with internet of things it is still growing as it has the capacity of changing the entire life of persons as well as the way of thinking of every person. Internet of things has the capacity of taking the information and communication technology to new high level. It even has the potential to bring in the field of information and communication technology many new things that are only in minds of the researchers and developers of such systems. So, it is very important to tackle the issues related to its security as well as privacy as it has vast potential in it. The most important challenge of internet of things is the protection of data of individuals as well as of the organizations(Kontsevoi, 2015). In this article topics related to the problems and challenges of security as well as privacy issues of internet of things has been dealt with detail. The in-depth application of internet of things has also been dealt with in this article in detail under different headings. This article even considers certain recommendations that can be adopted to avoid the risk related to security and privacy concerns of internet of things. Internet of things term has gained a lot of weightage in today's world, as it has the capacity of changing the future, of the way things are working today and have the potential to develop many new things and make it of use to the world. References Chase, J. (2013, sept 13). The evolution of IOT. Retrieved from ti.com: https://www.ti.com/lit/ml/swrb028/swrb028.pdf Foote, K. D. (2106, Aug 16). A brief history of the internet of things. Retrieved from dataversity.net: https://www.dataversity.net/brief-history-internet-things/ FTC. (2015, Jan 13). Internet of things Privacy and securityin a connected world. Retrieved from ftc.gov: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf Khan, F. (2015). Future Scope And Possibilities In Internet Of Things. International Conference on Advances in Engineering Science and Management (pp. 310- 312). Agra: T R Publication. Kontsevoi, B. (2015, oct 27). 5 lessons and conclusions about the emerging IoT industry. Retrieved from linkedin.com: https://www.linkedin.com/pulse/5-lessons-conclusions-emerging-iot-industry-boris-kontsevoi-cop Meola, A. (2016, dec 19). How the Internet of Things will affect security privacy. Retrieved from businessinsider.com: https://www.businessinsider.com/internet-of-things-security-privacy-2016-8?IR=T Meola, A. (2016, dec 19). Internet of Things devices, applications examples. Retrieved from businessinsider.com: https://www.businessinsider.com/internet-of-things-devices-applications-examples-2016-8?IR=T Morgan, J. (2014, may 13). A Simple Explanation Of 'The Internet Of Things'. Retrieved from forbes.com: https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#2b7a2dc51d09 Patel, J. S. (2014). A Survey on Internet of Things: Security and. International Journal of Computer Applications , 20-26. Postscapes. (2004, may 13). Internet of things History. Retrieved from postscapes.com: https://www.postscapes.com/internet-of-things-history/ Prasad, D. E. (2016, march 15). Scope of Internet of Things : An Emerging Technological Innovation. The Olden days Vedas - Krishana's 64 kalas and 14 vidyas : 64 Golden Cube. Retrieved from linkedin.com: https://www.linkedin.com/pulse/scope-internet-things-emerging-technological-olden-days-prasad Sinha, J. H. (2014, may 14). Scope and challenges of Internet of Things :An Emerging Technological Innovation. Retrieved from researchgate.net: https://www.researchgate.net/publication/272820593_Scope_and_challenges_of_Internet_of_Things_An_Emerging_Technological_Innovation Tyagi, S. (2014, April 15). How the internet of things will shape the future. Retrieved from engineering.com: https://www.engineering.com/ElectronicsDesign/ElectronicsDesignArticles/ArticleID/7454/How-the-Internet-of-Things-Will-Shape-the-Future.aspx