Tuesday, December 31, 2019

The Mega Marketing Of Depression - 898 Words

Cultural differences are celebrated as a way to welcome diversity in todays society. A culture defines the way individuals think by grouping likeminded individuals for the sake of society. Culture is defined as a shared belief, values, and behaviors amongst other individuals. With many individuals being a part of a certain culture, these individuals have different experiences. Essentially, having a different culture causes a different perception of the embodied experiences. Nature vs. Nurture is one of the oldest arguments concerning how an individual perceives the outside world as well as themselves. This argument tries to explain if whether a nurturing environment such as culture plays a role in development or if the science of nature is more influential. In Ethan Watters text titled â€Å"The Mega-Marketing of Depression in Japan† the Japanese culture influenced the society on how to process certain emotions. This clouds the true emotions felt by individuals. In Barbara Fre derickson’s piece titled â€Å"Selections from Love 2.0: How Our Supreme Emotion Affects Everything We Feel, Think, Do, and Become† culture clouds the true biological feelings of love. This starts a debate regarding the influence of science and culture on society. Culture shapes the scientific practices used in different societies by altering mindsets to explain society’s needs and wants. Being a part of a culture separates individuals from the rest of the world. With so many different cultures in todaysShow MoreRelatedThe Mega Marketing Of Depression1448 Words   |  6 Pagesin such a sensitive area it differs from physical illness in the sense that there is no universal symptom for a certain mental illness such as depression, but there are hundreds of symptoms for a mental disorder throughout the world. These inconsistencies based on region can best be explained in Ethan Watters essay titled, The Mega Marketing of Depression in Japan. Watters’ discuss es how a pharmaceutical company, GlaxoSmithKline, sponsored a seminar in order to discuss ways to market their antidepressantRead MoreThe Mega Marketing Of Depression1480 Words   |  6 Pagesdriven by expectations that are both artificially created and rooted in cultural tradition. In his essay â€Å"The Mega Marketing of depression in Japan†, Ethan Watters explores the relationship between cultural expectations and the experience of happiness via the marketing campaign undertaken by pharmaceutical behemoths which succeeded in radically altering the Japanese definition of depression to agree with the Western model. Through Watter’s study, a better understanding of how language and values canRead MoreThe Mega Marketing Of Depression1522 Words   |  7 Pagesnegative. For instance, the goal of any debate is not to find the right answer, but to reach an agreement. Nevertheless, Watters’ â€Å"The Mega-Marketing of Depression in Japan† is an example where differences in consciousness are negative. In Watters’ story, while the Western conception of depression is a severe feeling of sadness and anxiety, the Japanese citizens see depression as a simple disease that does not require much attention. They refuse to take medication or ask a doctor. It is often necessaryRead MoreThe Mega Marketing Of Depression1412 Words   |  6 Pagesbehavior. It is never definite because it is continually being modified to match current trends, however, historical principles still remain. Watters’ The Mega Mega-Marketing of Depression in Japan compare and contrast the American culture to the Japanese and it illustrates how the difference in these two societies shape how people view depression. Conversely, contrasting behaviors within societies are not limited to mental illness, but can be applied to cultural aspects affect all fragments of anRead MoreThe Mega Marketing Of Depression1410 Words   |  6 PagesIn Ethan Watters’ essay, â€Å"The Mega-Marketing of Depression in Japan,† he has a discussion with Dr. Laurence Kirmayer regarding Kirmayer’s invitation to the International Consensus Group on Depression and Anxiety. In their discussion Kirmayer talks about how the basis of his invitation was on the notion t hat he as the director of the Division of Social and Transcultural Psychiatry at McGill could add to the answer the large pharmaceutical giant, GlaxoSmithKline was looking for. The question at handRead MoreThe Mega Marketing Of Depression1566 Words   |  7 Pagespharmaceutical companies alike. Ethan Watters in â€Å"The Mega-Marketing of Depression in Japan† delves into the dangers of the globalization of a mentality for depression that seeks to transcend cultural values and traditions completely. Pharmaceutical companies, proponents of globalization, aim to eliminate the social and natural confines of a disease like depression, and instead, establish a medical model that is rigidly enforced through marketing and challenging existing cultural norms. Drug corporationsRead MoreThe Mega Marketing Of Depression Essay1609 Words   |  7 PagesMakeover,† presents how the enforcement of mundane standardization in American education systems leads to the decrease of original talents and creativity. Similarly, Ethan Watters’ essay, â€Å"The Mega-Marketing of Depression in Japan,† portrays the ways in which pharmaceutical companies attempt to standardize depression, shifting the reality of an entire culture, for the sake of their profit. Lastly, in â€Å"The Mind’s Eye,† Oliver Sacks illustrates how reality differs between individuals by using stories fromRead MoreThe Mega Marketing Of Depression Essay1756 Words   |  8 Pagesassumptions are not absolutely right and can change along with time as well as cultural transformation. Ethan Watters in his essay â€Å"The Mega-Marketing of Depression†, mentions his research of the Japanese and other Asian countries’ understanding and acceptance of depression. He wonders why these countries are different from the United States when facing the problem of depression. In â€Å"Son†, Andrew Solomon describes his growth as a gay and talks about parental influence on c hildren’s self-acceptance of ownRead MoreThe Mega Marketing Of Depression1909 Words   |  8 PagesThe Structure of Marketing In ‘The Mega-Marketing of Depression in Japan†, Ethan Watters exemplifies a unique phenomenon in his work on the idea of cultural change in Japan. Watters essay discusses how a nation was altered for the benefit of industry through the use of marketing. The stance that Watters takes in his essay makes abundantly clear the implications of marketing and its techniques which can be used to change the thinking of an entire country. Karen Ho’s essay â€Å"Biographies of Hegemony†Read MoreThe Mega Marketing Of Depression1732 Words   |  7 PagesJapanese culture for their benefit in his narrative titled â€Å"The Mega-Marketing of Depression in Japan.† Watters makes it clear big companies, such as the drug company GlaxoSmithKline, are reshaping Japanese culture to market a pill that supposedly cures depression. Society is constantly changing and companies are able to take advantage of that by prompting the route in which society chooses to take. Large comp anies practice this style of marketing everywhere in the world and they are successful in influencing

Monday, December 23, 2019

An expository essay written on the topic of religious...

Teens today are bombarded with multiple types of external and internal conflicts. AIDS and other STDs impact the way they live externally; depression and suicide can govern their internal lives. However, religious tolerance grabs at both their internal and external lives. The biased media always attempts to push teens beliefs one way or another, yet it is the choice of the individual to which counts in the end. ApologeticsIndex.org defines religious tolerance as Acknowledging and supporting that individuals have the right and freedom to their own beliefs and related legitimate practices, without necessarily validating those beliefs or practices. It also defines religious intolerance as a) Refusing to acknowledge and support the right†¦show more content†¦The first is where there is an extreme reluctance to change (e.g. Islam in the Middle East). The other comes in a form where change has happened all too rapidly. For example, secular countries like America and others in Euro pe have gone from origins in religion, to actually putting down religion (mainly through the media; Bernard Goldberg, Bias: A CBS Insider Exposes How the Media Distort the News). Saying that religious intolerance is a problem is a massive understatement and the numbers certainly do not lie. In a study by the University of North Carolina, a poll was taken of seniors in high school about organized religion. An astonishing one third of seniors felt alienated by organized religion. Of these numbers, half the students felt hostile towards organized religion and another half felt no emotions towards it. One third is not a majority, but a whole third of the adult population is an alarming number. In this trend, it is to be expected that nearly 50% of youth will feel threatened by organized religion in little more than a decade (The Empty Church : Does Organized Religion Matter Anymore by Thomas C. Reeves). In a Youth Gallup Poll (ages 13-17), 40% of youth who are identified as non-churchgoers agree that most Muslims around the world are accepting of other religions. This number compares to only 27% of churchgoers who believe Muslims are religiously tolerant. This is a stark contrast. AreShow MoreRelatedOrganisational Theory230255 Words   |  922 Pagesthe book is accessible , well researched and readers are encouraged to view chapters as a starting point for getting to grips with the field of organization theory. Dr Martin Brigham, Lancaster University, UK McAuley et al. provide a highly readable account of ideas, perspectives and practices of organization. By thoroughly explaining, analyzing and exploring organization theory the book increases the understanding of a field that in recent years has become ever more fragmented. Organization theory is

Sunday, December 15, 2019

Dan Pink Surprising Science of Motivation Free Essays

Dan Pink on the surprising science of motivation This pitch was in my opinion really good. Divided in three parts with a sum up at the end that enforce and give power to what he said. The first part was when he gives facts, states experiences and its results. We will write a custom essay sample on Dan Pink Surprising Science of Motivation or any similar topic only for you Order Now In the second part give credibility of results fund during the experiences, explain those results and shows that most important economists of the world agree with those results and found the same. The third and last part is about giving example that are currently applied in the world and illustrate perfectly his theory that traditional rewards are not as effective as we think, it is even the opposite. Both ethos, logos and pathos were used and used at the right moment, in the right proportion and the result is that he caught people’s attention and give credibility to his speech. Ethos: His way to tell his speech as if it was a â€Å"lawyerly case† as he said it. And to involve quickly everyone he talks to them as if they were a jury (â€Å"ladies and gentlemen of the jury†) and this until the very end of his speech finished by the sentence â€Å"I rest my case†. At the end of the explanation of the second experience that gave illogical results and to consolidate his results and give his speech more credibility, he affirms that for him too that is illogical and that he is exactly like everyone in the room (â€Å"I am an American (†¦) that is not how it’s supposed to work†) This example and the fact that at the beginning of his presentation he tells everybody that he did not get good results from his law university are really clever from him. Saying that he is getting more trustful to people, imperfect side of him make him more human for others. Logos: He has a very strong logos during the whole presentation. And at the beginning of his speech he said directly that his facts are true, proved. He has a PowerPoint used only for his logos that help the explanation of experiences made with the candle, show the important words of his speech. He also used scientist results and conclusions given by the most important economists worldwide (such as the conclusion made by the economists of LSE). And in his third part he gave an explanation based on three words, illustrate by example and repeated several times to give them more impact on the audience. Pathos: Begin with a story, more than a story it is like he is going to confess something that he is not proud (â€Å"I need to make a confession†). Saying that he makes people trust in him, because he exposes himself. But it is fact a joke, which is also really good because humour is always a good way to catch people’s attention. And during the whole speech, he will have a lot of humour. His speech was like him dynamic, enthusiastic and totally engaged with his audience. With this combination of ethos, logos and pathos Dan Pink make an informative speech and the audience easily receives its message. How to cite Dan Pink Surprising Science of Motivation, Essay examples

Saturday, December 7, 2019

Cyber Security Active Defence Samples for Students- Myassignment

Question: Discuss about the " Private Companies and Governments Be Able to Mitigate Cyber Attack By Destructively Counter-Striking Against Attackers". Answer: Introduction It is an unanswered question whether counter attacking the hackers is just another method of ensuring that security hacks are prevented. It is observed that the IT security professionals and the lobby groups are demanding for fresh laws that would give weightage and room for the private entities to fight against the hackers. They are basically wanting to hack back at the states and corporates rather than depending upon the government to react to such attacks. It has been argued by many that the corporates should now undertake an active defence attitude which would help them fight the online security hacks. Although in the legal parlance, the same is yet to be dealt with the law part of it, yet it is construed that the same would not be considered as unethical if these private entities made efforts to halt the various hacks on their IP. It is very crucial to understand the phenomena cyber crime before heading towards safeguarding mechanisms that should be adopted by the private compan ies and the governments. A cyber crime is defined as a heinous crime wherein the information and communication technologies may be the main victim or the target of the crime and it may comprise of a single event or a number of events (Geers, 2011). Those who conduct such crimes are basically swayed by negative motivations such as thrill, profit making or vengeance. The said paper discusses about the fact whether the private companies and the government are able to fight a cyber attack by destructively counter striking against those who attack the cyber space. Unfortunately the cyber crimes are not only being conducted by the hackers but also by employees of a company past or present, as they enter the structures of the organization which otherwise they are suppose to protect (Melancon 2015). The said essay is in support of the tactics undertaken by these private entities of counter attacking the hackers instead of depending upon the law making authorities wherein they can at least use the said method as a stop gap if not an ultimate solution to the problem. How Private Companies And Governments Be Able To Mitigate Cyber Attacks By Counter Striking The past four years has witnessed high profile cyber attacks in companies like JP Morgan Chase, Sony Pictures and Fiat Chrysler, which has toppled down the trust of the consumers as well as the staff members of the corporates so much that these companies are now drooling over spending huge amount so as to be able to improvise upon their presently active defence mechanisms against these attacks (Lohrmann, 2016). However, the series of such attacks has been beneficial for the businesses, since they have allowed the companies to adopt a new procedure of protection against the attackers commonly known as active defence. As the name suggests it is a more aggressive methodology of fighting the crime rather than simply depending upon the age old methodology of applying pass-codes and firewalls (Sexton 2016). The owner of Black Hills Information Security, John Strand, uses such ways and means which would attract the attackers in a manner so that they would also fall into his trap or to be able to outline the steps taken by the attackers so as to be able to find out the origin of their attack. Unfortunately some of the victims use such methods which are illegitimate such as hack back against such a crime of the cyber world. As per the notion of many, even though hacking back may not be within the legal boundary, yet it becomes necessary at times to counter attack the criminals in their pattern only (Kutler, 2016). After a flurry of destructive hacks, the private companies and the governments are trying to voice it back by strengthening their counter attacks thus looking more active methods so as to mitigate the threats from such cyber hacks. But ultimately, the first movers advantage with regards technological advancement rests with the attackers, wherein the lawful and political deliberat ions restrict the area of counter attacks by victims (Messmer, 2011). The increase in the number of cyber attacks has proved how weak the various sectors are such as the banking, retail, healthcare givers etc. Thus such attacks, eventually forced the companies to cater to such active defence methodologies. One such took place in the year 2013, wherein the demonstrator has entre the cloud services which was being used by the hackers, got hold of their contact details and also was able to locate their office building with the help of GPS . However locating these criminals was easier but in spite of them stealing away millions of data and money, they have not been taken into custody and will never be. Simple reason for the same is that most law are national despite cyber crime conventions, while the internet is borderless and international by definition. (Kuchler, 2015) The fact is still debatable that whether counter-attacking the cyber criminals is acceptable and legal or not. However, the US alone, the Department of Justice names hacking back as likely illegitimate. However the same has not been defined as unlawful. It is the ethics which is guiding the hacking back. The issue here is that even if the law authorities are taking steps to punish the attackers, but the same is not deterring them from attacking further. If the judicial system is punctured due to the system in vogue, then it may not be considered vigilantism to take action against the attackers (Lin, 2016). Part of our public bond to produce and abide by government is to surrender our ordinary powers to take integrity into our control, in exchange of a more dependable and acceptable legal system. A person or entity is always entitled to defend oneself ad it does not wade off even if there is law to help him (Iasiello, 2016). Risk Involved In Hacking Back However, the biggest risk in the hack back policy is that it may at times lead to hacking back the offender who actually was innocent simply because it is very difficult to identify the actual attacker at times. Thus even if the private companies and governments may be able to mitigate a cyber attack by counter attacking at the hackers, there still lies a possibility of counter attacking the innocent which is very devastating in nature. For instance in a DDoS attack, if one thuds out all the systems that were unsuspectingly attacked and were used to throng against ones system, the question being asked here is whether the innocent are being attacked due to the same and is it acceptable ethically (Centre for Cyber and Homeland Security 2016). The owners of the systems may not be harmful and had no intention to act maliciously although they may be inattentive in updating their system against malicious attack. However the said type of attack against the attackers connotes that it is not important to prove a person or a group of persons guilty before one can act against a possible threat. If not done then most of the time the results and the outcomes may be devastating. Therefore keeping the guilt aside, one should ensure that if a person poses to be a threat then the same should be counter attackers in defence (Paganini, 2013). The critics about hack back system have questioned the mitigation policies of cyber attacks by counter attacks. As per them, the hacking back may lead to destruction of proofs which would else be available and required at the time of prosecution of the earlier stages of the attack. However the same criticism is counter attacked by the fact that it is acceptable to destroy the evidences, if that would ensure the prevention of the cyber attacks causing losses (Goodman, 2017). The fact that if the private companies and government are able to mitigate the cyber risks via counter attacks, then the same if made lawful and legitimate would ensure deep rooted loss of those hackers who are involved in the IP theft. The counter attacks would lead to an increase in their cost in terms of the IP thieves thus ultimately deterring them from such a conduct. It is said by all that the government has not been able to implement laws which would help private companies safeguard themselves from such cyber attacks (Glosson, 2015). However, the then US president, Barack Obama, noticed those calls in the month of March 2013, by entering into an agreement on signing the executive order that would ensure that the various government agencies would share data on the various cyber security related matters to those private entities. This order will help the entities become aware of the expected terrorization to their existing systems with the help of national intelligence. But unfo rtunately, the said arrangement will not help to vaccinate the companies who share data with the government agencies (Smith, 2013). There still lies a apprehension with regards the expected implications of allowing the private entities to counter attack. It is quite commonly used phrase the best defence is a strong offence also fits to some extent to the attacks caused by these cyber hackers. In cyber space the most apt defence is a strong defence, i.e the best solution is to defend oneself since the idea of retaliating someone else is senseless. If the hacker is being attacked back that will cause them damage too, then they would end up finding recourse into something else via the existing law prevailing and the channels of government. Hence applying a hack-back solution shows that the retaliators have not been able to understand the situation (Hutchinson, 2013). Hence it can be rightly construed that counter attack is a mere hack-back vigilantism and not any proactive policy which would help the problem to be insulated. Aggressiveness In Defence Is Better Than Offence How? Although hacking back is nowadays construed as one of the most prominent ways of safeguarding the system from cyber attacks by the private companies, yet it is very important to understand that showing aggressiveness in the various defence strategies being formulated is better than being unpleasant and offensive by nature. The inclination is still towards hacking back strategy, but it should be understood that via a combination of strategies, policies and such defensive ways and means, the achievement graph of the hackers will significantly diminish and the capability of the defenders to improvise upon the resiliency will augment, thus in turn diminishing upon the cost of dealing with the loss caused by the cyber threats (Harrington, 2014). The companies should develop a strategy wherein they would lure the attackers to attack their system and those defending will check out on their methodologies thereby applying defensive strategies. Denial and deception may also come out to be one of the most successful techniques of defending such hacks. This would enable to deceive the attackers via various technical solutions (Iasiello, 2014). It is a very smart technique which would ensure hacking back the attackers by first and foremost inviting them to attack and then catching hold of them (Leyden, 2016). Another common way would be creation of a website that would consist of files and attachments fulfilled as unsystematic from the actual files simply to perplex the hackers into viewing nonexistent connections. Lastly, the active defence tools comprise of such trigger posts on hosts which would enable automatic identification of the hackers thus leading to they being blacklisted. These are also ways of hacking back but a subtle way which cannot be considered as illegitimate by the law and the regulatory authorities and officials (Myers, 2013). Cyber Deterrence Theory Incidentally there lies three fold stage of defence- prevention, management of the occurrence of the attack and management of the situation. First, it states that the system should be designed in such a manner that it is safe from all ends from being attacked by any hacker. If the same is possible or done successfully, then all such attacks would be futile a preventive measures are already in place (Watkins et.al. 2016). Unfortunately, till date applications are designed but without considering security issues as a main issue to cater to. Mainly the active defence is expected to be conducted by governments. The intergovernmental co-operation will most probably act as a momentum for future developments of such active defence strategies in fields such as the exchange of intelligence. But unfortunately, in such a situation, many private entities are mistakenly construed as cyber criminals (Waxman, 2011). Second, is the management of such attacks occurrence i.e. to make the staff and the others aware of the happening of such an attack which seems to be a better option than ultimate prevention. For ensuring that the attack is managed at the occurrence stage itself, various hurdles are installed. This management helps to protect the important data while such an attack is occurring. Further, it is more easy to handle the attack at this stage since prevention also may have various unmanageable loopholes unlike this stage (Rid, Buchanan, 2015). The last stage comprises of the management of the situation and the ultimate consequence of the attack. It has further two stages i.e. recovery and response. The recovery stage is an age old one wherein the organization which has been attacked tries to reinstate the entire operation to such an extent so as to construe as earlier situation. However, the second stage is a relatively newer one which calls for a more active defence strategy (Tsagourias, 2013). If the attack is planned vigilantly with a lot of thought behind the same, then recovering from the same may become difficult. Thus the various tasks which can be categorised under the second category of response comprises of, getting hold of the correct attacker, measured counter attacks, asymmetries which discusses about what to do about the attackers which comprises of lesser number of IT assets and weaknesses and escalation which enables rating of the attack so as to decide whether the victim wishes to send a strong message o t he attacker so that they are made aware for any such attacks again in future (Romanosky Goldman, 2016). Conclusion Thus on a concluding note it can be said that the cyber space is diseased by a number of attacks by these hackers. It is the fasting growing area of nuisance and the number of hackers have also been multiplying which each passing phase. It is true that the said issue is a diplomatic one which cannot be resolved until the intervention of the government. It cannot be denied that practicality and the effectiveness are lawful alarms about hacking back. However, if the same is legalised then the opportunities are huge. The fact that there still lies some intuitions against the hack-back method such as the risk of misidentifying the actual attacker and by mistake get hold of an innocent person. Therefore it can be rightly said counter attacking can be used as a stop gap approach until and unless the cyber security and the law enforcement agencies are being able to find out better means to identify and punish these attackers. The said method of hack back is swinging like a pendulum between proactive policy and vigilantism References: Centre for Cyber and Homeland Security., (2016), Into the Gray Zone: The Private sector and Active Defense Against Cyber Threats, Available at https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/CCHS-ActiveDefenseReportFINAL.pdf (Accessed 18th May 2017) Geers,K., (2011), Strategic Cyber Security, CCD COE Publication : Estonia, Available at https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/papers/reading/Geers.pdf (Accessed 09th May 2017) Goodman,S.E., (2017), Cyberterrorism and Security Measures, Available at https://www.nap.edu/read/11848/chapter/6 (Accessed 09th May 2017) Glosson, A.D., (2015), Active Defence : An Overview of the Debate and a Way Forward, Mercatus Working Paper, Mercatus Center at George Mason University: Arlington, Available at https://www.mercatus.org/system/files/Glosson-Active-Defense.pdf (Accessed 09th May 2017) Harrington,S.L., (2014), Cyber Security Active Defense: Playing with Fire or Sound Risk Management, Richmond Journal of Law and Technology, vol. XX, no.4, pp. 1-41 Hutchinson, J., (2013), Companies should hack back at cyber attacks : security experts, Available at https://www.afr.com/technology/enterprise-it/companies-should-hack-back-at-cyber-attackers-security-experts-20130527-j0rqm (Accessed 08th May 2017) Iasiello,E., (2016), Is the Best defence a strong defence in cybersecurity? Available at https://fabiusmaximus.com/2016/03/13/is-offense-best-defense-in-cybersecurity-94550/ (Accessed 09th May 2017) Iasiello,E., (2014), Hacking Back : Not the Right Solution, Parameters, Vol. 44, no. 3, pp. 105-113 Available at file:///C:/Users/E-ZONE/Downloads/1434062_1772786097_14289211698173281Hackingbackno.PDF (Accessed 18th May 2017) Kuchler,H., (2015), Cyber Insecurity : Hacking Back, Available at https://www.ft.com/content/c75a0196-2ed6-11e5-8873-775ba7c2ea3d (Accessed 08th May 2017) Kutler,J., (2016), Cybersecurity has started fighting back against hackers, Available at https://www.businessinsider.com/cyber-security-has-started-fighting-back-against-hackers-2016-6?IR=T (Accessed 18th May 2017) Lin,P., (2016), Forget About Law and Ethics Is Hacking Back Even Effective? Available at https://www.forbes.com/sites/patricklin/2016/09/26/forget-about-law-and-ethics-is-hacking-back-even-effective/#32ed84ac47d8 (Accessed 09th May 2017) Lohrmann,D., (2016), Can Hacking Back Be An Effective Cyber Answer? Available at https://www.govtech.com/blogs/lohrmann-on-cybersecurity/can-hacking-back-be-an-effective-cyber-answer.html (Accessed 18th May 2017) Leyden,J., (2016), National cyber Security Centre to Shift UK to Active defence, Available at https://www.theregister.co.uk/2016/09/16/uk_gov_active_cyber_defence/ (Accessed 18th May 2017) Melancon,D., (2015), Should Companies Strike Back at Hackers? Available at https://www.tripwire.com/state-of-security/security-data-protection/should-companies-strike-back-at-hackers/ (Accessed 09th May 2017) Messmer,E., (2011), Is retaliation the answer to cyber attacks? Available at https://www.networkworld.com/article/2199010/malware-cybercrime/is-retaliation-the-answer-to-cyber-attacks-.html (Accessed 09th May 2017) Myers,L., (2013), Active Defense: Good Protection doesnt need to be offensive, Available at https://www.welivesecurity.com/2013/11/19/active-defense-good-protection-doesnt-need-to-be-offensive/ (Accessed 18th May 2017) Paganini,P., (2013), The Offensive Approach to Cyber Security in Government and Private Industry, Available at https://resources.infosecinstitute.com/the-offensive-approach-to-cyber-security-in-government-and-private-industry/#gref (Accessed 09th May 2017) Rid,T., Buchanan,B., (2015), Attributing Cyber Attacks, Journal of Strategic Studies, 38(1) and (2), pp. 4-37, Available at https://sipa.columbia.edu/system/files/Cyber_Workshop_Attributing%20cyber%20attacks.pdf (Accessed 09th May 2017) Romanosky,S., Goldman, Z., (2016), Cyber Collateral Damage, Procedia Computer Science, vol.95, pp. 10-17, Available at https://ac.els-cdn.com/S1877050916324590/1-s2.0-S1877050916324590-main.pdf?_tid=b09abc7c-3544-11e7-83f5-00000aacb35eacdnat=1494395659_f0cb6430e118607b25d1dca5d65428f2 (Accessed 09th May 2017) Smith,G., (2013), Hacking back Could Deter Chinese Cyberattacks, Available at https://www.huffingtonpost.in/entry/hacking-back-chinese-cyberattacks_n_3322247 (Accessed 09th May 2017) Sexton,M., (2016), U.K. cybersecurity strategy and active cyber defence Issues and risks, Journal of Cyber Policy, vol.1, no.2. Tsagourias,N., (2013), Cyber Attacks, Self Defence and the Problem of Attribution, Journal of Conflict and Security Law, vol.17, no.2, pp. 229-244 Waxman,M.C., (2011), Cyber Attacks and the Use of Force, The Yale Journal of International Law, vol.36, pp. 421-459. Available at https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1403context=yjil (Accessed 09th May 2017) Watkins,LA., Hurley, J.S., Xie, S., Yang, T., (2016), Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications, Journal of Informati