Tuesday, December 24, 2019

Literature Color Symbolism - 2257 Words

The Color of Literature Color symbolism can be used to set the tone of a story and aspects within that story. Colors can invoke an emotional response as well as paint a picture of a character or scene within the story. In exploring the story of Sir Gawain and the Green Knight (Damrosch, Pike 1200-59) along with Christopher Columbus’ letter The Green and Beautiful Land (Columbus 1-7) there are three main colors that stand out. The first color, as shown in both titles, is green. Green plays a significant role in both tales as it is the main color of the antagonist in Sir Gawain and the Green Knight and the supple landscape that is described by Columbus. Green also represents negative aspects in the stories such as misfortune and lack of†¦show more content†¦Columbus also describes the islands to have â€Å"marvelous pine groves, and extensive meadow country†(2) which again symbolizes the nature and fertility of the islands. At the end of Columbus’ letter, he tells the king a nd queen that he can send gum mastic, aloe wood, and rhubarb, all of which are green and represent the fertility of the new lands (5). Columbus describes the native islanders as â€Å"wondrous[ly] timid† and delighted to receive items of little or no value from the crewmen (2). It is in this description that the reader imagines the inexperience of the islanders, a negative often associated with the color green. The next representation of color is of gold, or yellow. Yellow represents idealism, vitality, and gold, or wealth as well as cowardice, greed, and deceit ((Rohrer; Smith). The Green Knight’s attire was adorned with color, â€Å"bright gold on silk broideries banded most richly† (1207). The saddle blanket of both the Green Knight’s horse and Sir Gawain’s horse was embellished with gold trim. These detailings of gold represent vitality and wealth. The wealth of Bertilak’s castle is also seen in the description of the lavish surroundings, from the curtains with â€Å"clear-golden hems† to the tapestries hung â€Å"on ropes with red-gold rings† (1223). The account of lavish surroundings may also give the impression of greed as well as wealth. The color yellow symbolizes idealism andShow MoreRelated Comparing Symbols and Symbolism in Blue Hotel, Black Cat, Night, Alfred Prufrock, Red Wheelbarrow1620 Words   |  7 PagesColor Symbolism in Blue Hotel,  Black Cat, Night,  Alfred Prufrock,  Red Wheelbarrow      Ã‚  Ã‚   Symbolism of colors is evident in much of literature. The Blue Hotel by Stephen Crane, The Black Cat of Edgar Allan Poe, Night by William Blake, The Love Song of J. Alfred Prufrock by T. S. Eliot, and The Red Wheelbarrow by William Carlos Williams encompass examples of color symbolism from both the prose and the poetry of literature. When drawing from various modes of psychology, interpretationsRead MoreEssay On Color Symbolism In The Book Thief1020 Words   |  5 PagesColors are used in literature to describe the different emotions of a character. Colorism is a type of symbolism used in literature. Death uses color symbolism in The Book Thief to describe a characters emotion because he is the narrator. Color symbolism in literature is when the author uses a color to symbolize the characters emotion; it occurs throughout The Book Thief. Red, white, and gray or silver are the colors that are used the most frequently and have the biggest meanings throughout theRead MoreT heme Of Symbolism In Edgar Allan Poe1164 Words   |  5 PagesSymbolism Throughout the Works of Edgar Allen Poe The American author, Edgar Allen Poe, had a life filled with much hardship, such as, death and loss, these hardships often reflected in his poems and story’s as the topic of most of his works seemed to revolve around those subjects. Poe used extensive symbolism in his works, symbolism is usually defined as something such as an object, idea, place, or person, used for or regarded as representing something else. The most common symbolism regarding toRead More Symbolism in The Great Gatsby, written by F. Scott Fitzgerald1628 Words   |  7 PagesSymbolism in The Great Gatsby, written by F. Scott Fitzgerald The Great Gatsby is a classic American novel, written by F. Scott Fitzgerald in 1927 about corruption, murder and life in the 1920’s. The true purpose for a writer to compose any piece of literature is to entertain the reader, and this writer does this to the best of his ability. In this well-crafted tale, Fitzgerald presents a fast moving, exciting story, and to any typical reader it can be enjoyed; however, if the reader takes the timeRead MoreSymbolism, Use Of Color, And Themes Of Nathaniel Hawthorne s The Scarlet Letter1657 Words   |  7 PagesSymbolism, Use of Color, and Themes in The Scarlet Letter The Scarlet Letter is regarded as the first symbolic novel in American Literature for Nathaniel Hawthorne s skillful use of symbolism and allegory. The novel is also said to be the greatest accomplishment of American short story and is viewed as the first American psychological novel, which makes Hawthorne win an incomparable position in American Literature. Hawthorne’s â€Å"unique gift† for using this kind of skills taps into the roots of manRead MoreSymbolism in the Masque of the Red Death by Edgar Allen Poe1655 Words   |  7 PagesSymbolism in The Masque of the Red Death The Masque of the Red Death is a short story written by acclaimed literary author, Edgar Allen Poe. The story is an emphasis on the fact that there is no avoiding death, no matter how hard you try, which is the overall theme. The text tells the story of Prince Prospero whose town is being plagued by the dreaded Red Death. He attempts to avoid the plague by inviting 1,000 of his closest friends, all of which are variably different, to isolate themselvesRead MoreJane Eyre vs Wide Sargasso Sea Essay example1635 Words   |  7 Pagesï » ¿Tyler Perimenis Professor Mathews English 2301W 21 October 2014 Symbolism through Theme Of Jane Eyre and Wide Sargasso Sea â€Å"To produce a mighty book, you must choose a mighty theme. No great and enduring volume can ever be written on the flea, though many there be that have tried it,† stated Herman Melville. As implied, without theme, no novel can be considered â€Å"mighty† or have any depth. Theme is essential in any work of art. Jane Eyre is a novel by Charlotte Brontà « that takes the readerRead MoreLottery Essay Symbolism1249 Words   |  5 PagesSymbolism Essay Symbolism is a sign that has been used by literary authors to represent a larger idea into another more specific concept or belief. Symbolism can be used to represent an action, an idea or a person’s archetype as well. The term symbolism is the practice of representing things by symbols, or of investing in things with a symbolic meaning or character (â€Å"Symbolism†). Examples of symbolism are: an eagle representing freedom, a dove representing peace, and the color green can symbolizeRead MoreThe Lottery, By Shirley Jackson And A Rose For Emily By William Faulkner960 Words   |  4 PagesThe Use of Symbolism in â€Å"The Lottery† by Shirley Jackson and â€Å"A Rose for Emily† by William Faulkner The use of symbolism is used in literature to enhance writing and add meaning to a story, this is evident in the two short stories â€Å"The Lottery† written by Shirley Jackson and â€Å"A Rose for Emily† written by William Faulkner. With the authors use of symbolism Jackson and Faulkner are able to add depth to their writing in a way that connects with the readers. By adding symbolism to the short storiesRead MoreThe Masque Of The Red Death Symbolism Analysis954 Words   |  4 PagesDarkness of Symbolism Gothic literature often has a common theme of fear and/or death. Author Edgar Allan Poe is the most well known gothic writer because of his famous dark and frightening short stories such as â€Å"The Masque of the Red Death.† Poe is so popular because of his ability to write stories that leave lasting effects on all readers. In this story, he uses many small symbols that then relate to the major symbols, such as Prince Prospero, his name represents his prosperous lifestyle. The

Monday, December 16, 2019

Critical Analysis of Mass Spectrometry Free Essays

string(140) " similar methods of ionization and due to this many of the modern day mass spectrometers can switch between these two methods effortlessly\." Introduction 1. Background: The analytical technique that I have chosen to give an in-depth analysis of is Mass Spectrometry (MS) This analytical technique is basically the study of ionised molecules in the gaseous phase; its main use is in the determination of the molecular weight of the molecule in the sample under investigation by accelerating ions in a vacuum environment. While this analytical technique has been around for over one hundred years there are significant advances being made to this technique in order to cater for more adverse samples which will be discussed in more detail later on. We will write a custom essay sample on Critical Analysis of Mass Spectrometry or any similar topic only for you Order Now The main difference between mass spectrometry and other spectroscopy methods such as NMR is that it not dependant on transitions between energy states which may be responsible for its popularity. The diagram shown below (Figure 1.1.) [1] shows a simple diagram of a common mass spectrometer using electron ionization: Figure 1.1 represents a schematic diagram of an electron ionization-mass spectrometer showing the various processes involved. Courtesy of www.molecularstation.com. In its simplest form the process of determining the molecular weight of the sample typically occur over four main stages which are: Sample volatilisation, Ionisation, Separation and detection. Sample volatilisation: The sample to be analysed if gaseous or volatile can be readily inserted into the mass spectrometer with the more solid samples requiring heating before insertation in order to construct a more volatile or gaseous sample. As can be seen form the above figure the sample is then moved further down the spectrometer towards the area where ionization of the molecules occurs. Ionization: The sample is then hit with a barrage of high energy electrons from an electron gun with a charge of around 70 electron volts (eV). When the molecules collide with the high energy electron beam energy is transferred from the beam to the molecules which cause an acceleration of the molecules. These molecules may then dump an electron forming cation known as the molecular ion (M+†¢) [2]. This interchange is represented in the equation below (Figure 1.2.): M+ e–M+†¢ + 2e– Moleccular Ion This electron barrage usually results in most of the molecular ions fragmenting causing some of the fragments to not gain any charge and remain neutral and have no further part to play. The main purpose of ionisation is to donate a charge to the sample in order for the molecules to break up and become charged. The ionization method discussed here is electron ionisation however there are many other more methods of ionization which will be discussed in detail later on in my analysis. Separation: This beam of newly charged molecular ions then proceed through a mass analyzer which in this case is a very strong controllable magnetic field which separates the charged molecules according to their mass to charge ratio (m/z) causing some of the molecules which are â€Å"too heavy† or â€Å"too light† to be thrown towards the top or bottom of the spectrometer and hence avoid detection. By varying the magnetic field, ions with different m/z values can be detected. Just like there are many different ionization methods for different applications there are also several types of mass analyzers which will also be discussed later. A fundamental consideration in mass spectrometry at this point is mass resolution, defined as R = M/?M. where R is the resolution, M is the mass of particle and ?M is the mass difference compared to adjacent peak with overlap at 10% of peak height. Nowadays a magnetic sector analyzer can have R values of 2000-7000 depending on the instrument [3]. Detection: the final stage in the process is comprised of a detector which then amplifies and records the mass of the ions according to their m/z values. The detector may be set up for detection of molecular ions possessing different mass to charge ratios. The Molecular ions each have a mass that is almost identical to the mass of the molecule (M) and due to the fact that the charges on most of the molecules are usually 1, the value of m/z obtained for each of the ions is simply its mass. The data collected by the detector is fed to a recorder and is presented in the form of a plot of the numbers of ions versus their m/z values [3]. An example of this type of plot is shown below in figure 1.3. [4]: Figure 1.3: A typical graph produced for a sample using mass spectrometry. Picture courtesy of www.research.uky.edu. 2. Methods of Ionization: Electron Ionization (EI): as described above is the simplest method for converting the sample to ions and this method is found on the most common mass spectrometers. Many other simple and complex ionization methods exist for analyzing various samples. Some of these methods include: Chemical Ionization (CI): This is a softer ionization method than EI, causing less fragmentation of the sample under investigation and hence it is mainly used for more sensitive compounds such as 2, 2-dimethylpropane for example which is prone to fragment with little stress. This decrease in fragmentation is due to the ions arising from a chemical reaction rather than bombardment and hence possesses less energy than those produced from EI. In Chemical ionization the molecules to be studied are mixed with an ionized carrier gas which is present in excess. Common carrier gases for CI include ammonia, methane, isobutene and methanol. The selection of the carrier gas depends on the degree of ion fragmentation required. Different carrier gases produce different mass spectra plots. The main advantage of CI is its softer approach lending to clearer results over EI for some samples. Other advantages include the relatively cheap and strong hardware as with EI. The main drawback of using chemi cal ionization in mass spectrometry is the fact that like electron ionization the sample must be readily vaporised in order for the molecules to gain that vital charge. This immediately dismisses the use of high molecular weight compounds and biomolecules [3]. It’s obvious therefore that CI and EI are very similar methods of ionization and due to this many of the modern day mass spectrometers can switch between these two methods effortlessly. You read "Critical Analysis of Mass Spectrometry" in category "Essay examples" Electrospray Ionization (ESI): is a type of atmospheric pressure ionization. This technique is very useful for studying the high biomolecular weight molecules and other samples which may not be very volatile as discussed above. The sample to be investigated is sprayed through a fine capillary which has a charge on its surface, the sample then enters the ionization chamber resulting in the production of multiple charged ions along with single charged ions. This formation of multiple charged ions is very useful in the mass spectrometry analysis of proteins [3]. It is important to note that negative ions may also be formed in ESI and the operation may need to be reversed. ESI has become much more common over the last few years as it relies on a sample in solution which permits its use in LC-MS [5]. Thermospray Ionization (TSI) is closely related to ESI differing only in the fact that it relies on a heated capillary rather than a charged capillary; however ESI remains the more popular of the two methods. Atmospheric-pressure chemical Ionization (APCI): It is obvious form the title that APCI is also a form of atmospheric pressure ionization resulting in a similar interface being used for both methods. This method was born in the 1970’s when it was first combined with liquid chromatography (LC) by Horning et al [6] who conveyed a new atmospheric ion source which used 63Ni beta emission in order to produce the required ions. Even tough APCI and ESI are harmonizing methods the main advantage APCI has over ESI is that it is more effective at determining the mass spectra for less polar compounds due to the reality that the gas phase ionization is more effective in APCI. Many MS instruments are now readily available with high mass resolution and accurate mass measurement, properties which are not as readily available with GC-MS instruments. Fast Atom Bombardment (FAB): this type of ionization method is primarily used for large polar molecules. The sample to be studied is usually dissolved in a liquid matrix which is non-volatile and polar such as glycerol. This sample is then bombarded with a fast atom beam such as Xe– atoms which picks up electrons thus causing ionization from this reaction. This is a simple and fast method to use and is very good for high-resolution measurements. On the downside however it may be hard to compare low molecular weight compounds from the chemical back ground which is always high [5]. Desorption Chemical Ionization (DCI), Negative-ion chemical ionization (NCI), Field Ionization (FI) and Ion Evaporation are other less common ionization methods used in mass spectrometry. 3. Mass Analysers: As described earlier the mass analyzers are used to separate the various ions according to their mass to charge ratio (m/z) and hence focus the ions with the desirable m/z value towards the detector. Some of the mass analyzers available include; Double-Focusing Mass Analyzers, Quadrupole Mass Analyzers, Time-of-Flight Mass Analyzers and Ion Trap Mass Analyzers. Double-Focusing Mass Analyzers are used when a high resolution is of paramount importance. This high resolution is achieved by modifying the basic magnetic design. The beam of ions passes through an electrostatic analyser before or after the magnetic field causing the particles to travel at the same velocity resulting in the resolution of the mass analyzer increasing dramatically. Resolution may be varied by using narrower slits before the detector. It is important to note that this type of analyzer reduces sensitivity but increases accuracy resulting in a fine line between success and failure with regards to detection, for this reason this type of mass analyzer is only used for very selective purposes. Quadrupole Mass Analyzers do not make use of magnetic forces for mass detection; instead they are composed of four solid rods arranged parallel to the direction of the ion beam. Using a combination of direct-current and radiofrequency the quadrupole separates the various ions according to their mass extremely quickly. Quadrupole mass analyzers are most on most GC-MS instruments. Time-of-Flight Mass Analyzers (TOF) operate by measuring the time taken for an ion which has been produced to travel for the ion source to the detector [7]. This is based on the simple assumption that the lighter ions will have a greater velocity and thus will strike the detector first. This type of analyzer has become more and more common in recent years due to the fact that the electronics used in this analyzer have become much more affordable since it was first introduced in the 1940’s. In recent years the resolution and sensitivity of TOF have been increased by the insertation of a reflective plate within the flight tube itself [8]. The main area that this type of analyzer is used is in Matrix Assisted Laser Desorption Mass Spectrometry (MALDI-MS) discussed later. The Ion Trap Mass Analyzer is composed of two hyperbolic end cap electrodes and a doughnut shaped ring electrode [7]. It is very similar to the quadrupole analyzer in resolution terms and basics however the ion trap is more sensitive. 4. The Mass Spectra: The main interest that anybody has from the mass spectra is the molecular weight of the sample that was processed. The value of m/z at which the molecular ion (M+†¢) appears on the mass spectrum tell us the molecular weight of the original molecule. The most saturated ion formed from the ionization provides us with the tallest peak in the spectra know as the base peak (Figure 1.2). From this information the determination of very exact molecular weights of substances may be deduced which is probably the most important application of mass spectrometers. This determination also allows use to distinguish between different substances with a very similar molecular mass which we are unable to do ourselves. For example; the molecule C14H14 has a molecular mass of 182.1096 and the molecule C12H10N2 has a molecular mass of 182.0844. These two molecules may only be differentiated by MS as there is only 0.0252 in the difference even tough they are two completely different molecules. The typ e of MS instrument used in this case is a Double Focusing Mass Spectrometer as discussed briefly above which is capable of providing measurements accurate to 0.0001 atomic mass units. The chance of two compounds having the exact same mass spectra is very unlikely and therefore it is possible to identify an unknown compound by comparing its mass spectra obtained with that of a known library of mass spectra for various compounds. 5. Mass Spectrometry in Synergy with other Techniques: Through the years mass spectrometers have evolved to be used not just on their own but used in tandem with a range of other analytic techniques such as Liquid Chromatography – Mass Spectrometry (LC-MS) in purity assessment and investigating rat urine, Gas Chromatography-Mass Spectrometry (GC-MS) for the detection and measurement of illicit drugs in biological fluids. It is LC-MS that has become the gold standard for detection and analyzation of substances. Gas chromatography works particularly well with mass spectrometry too, due to the face that the sample is already in its gaseous form at the interface. This system has been used by De Martinis and Barnes [9] in the detection of drugs in sweat using a quadrupole mass spectrometer which has been discussed earlier. The ability to identify metabolites in the biological fluids mentioned above can be very difficult and this is due to the fact that these metabolites are present in extremely low concentrations such as parts per mill ion (ppm) or even less in some situations. For many years Nuclear Magnetic Resonance (NMR) was used to identify these metabolites but in recent times it would appear that mass spectrometry has become the more popular method for detection of the metabolite. This may be due to the fact that MS is more sensitive than NMR resulting in less sample amount being required. 6. Advances in Mass Spectrometry Instruments and their Limitations: As mentioned briefly above it is very difficult to study large biomolecules such as proteins due to the fact that they are large polar molecules which are not volatile and as a result are difficult to convert to a gaseous state in order to undergo ionization. In recent years a solution to this problem has been accomplished with the introduction of Matrix- Assisted Laser Desorption Ionization (MALDI). MALDI is a laser based soft ionization method which relies on the sample being dissolved in a solution containing an excess of matrix such as sinapinic acid which has a chromophore that absorbs at the laser wavelength, the sample is placed in the path of high intensity protons causing a collision of the atoms with the sample resulting in ionization of the sample molecules causing them to be ejected from the matrix. One of the main advantages of MALDI-MS is that only a very tiny amount of sample is required (1 X 10-5 moles) [3]. This technique has proven to be one of the most successful ionization methods for mass spectrometry analysis of large molecules due to its soft ionization ability. This technique has been used in the drug-biomolecule complexes in order to investigate the interaction properties and sites of biomolecules with various drugs on the market today [10]. This method was also used by Zschorning et al. to investigate the extracts of human lipoproteins after treatment wi th cholesterol esterase’s [11]. This method although very popular suffers some drawbacks. There is a strong dependence on the sample preparation method and any mistake made during sample preparation or any contamination introduced into the matrix during the sample preparation renders the rest of the investigation pointless. Another draw back of this method is the short sample life although some research has been undertaken [12] with the use of liquid matrices in the belief that this may increase the sample life by making use of the self-healing properties of the sample through molecular diffusion. One obvious drawback that may occur is the fact that the sample may not be soluble and hence may not dissolve in the matrix. This problem may be overcome with the use of compression of a finely ground sample and analyte [13]. Another disadvantage which may become of detrimental in the future is the fact that MALDI is not easily compatible with LC-MS, this problem may have to be rectified id the popularity of MALDI is to c ontinue. Electrospray Ionization (ESI) has been described in detail under the methods of ionization section above and it can be seen that this young technique is proving to be very useful with LC-MS to investigate the a variety of molecules including proteins, DNA and synthetic polymers. The main problem with ESI-MS is that the mass spectra produced may contain many peaks of multiply charged ions which may cause confusion in the interpretation of spectra of some samples. The ESI instrument itself can also present with decreased sensitivity due to the presence of impurities such as salts and buffers, this is not the case with MALDI. Although both MALDI and ESI are both very effective methods of developing mass spectra for large molecules such as proteins, MALDI still remains the method of choice for most analyses. However, as discussed above the fact that MALDI is not very compatible with LC-MS may pave the way for a surge in popularity of the LC-MS friendly ESI. 7. The Future of Mass Spectrometry: Mass spectrometry has come along way since 1897 when Joseph J. Thompson used an early mass spectrometer to discover the electron and there is no reason why the mass spectrometer will continue to advance and evolve into the foreseeable future. The mass spectrometer is an extremely versatile analytical tool which can work in tandem and alongside other analytical methods such as chromatography seamlessly. The main areas in which mass spectrometers have been used for quantification of compounds are LC-MS and GC-MS using the various ionization methods respectively. LC-MS is the gold standard in quantitative bioanalyses and is used by the majority pharmaceutical companies. The other minority tend to use other techniques such as High Pressure Liquid Chromatography (HPLC) and UV as they deem LC-MS to be too expensive. An area of mass spectrometry to watch out for in the future is the use of ion-trap technology to perform LC-MS-MS to LC-MS [7]. This method already exists but reliable routine bioanalytical assays have not been produced as of yet. References: [1]http://www.molecularstation.com/molecular-biology-images/506-molecular-biology-pictures/21-mass-spectrometer.html [2]Daniel C. Harris: Quantitative Chemical Analysis, sixth edition (2003) published by W. H. Freeman and Company, New York. [3]Donald L. Pavia, Gary M. Lampman, George S. Kriz and James R. Vyvyan: Introduction to Spectroscopy, fourth edition, published by Brooks/Cole, Cengage Learing. [4]www.research.uky.edu/ukmsf/whatis.html [5]Ionization Methods in Organic Mass Spectrometry [6]Horning, E.C., Caroll, D.J., Dzidic, I., Haegele, K.D., Horning, M.G., andStillwell,R.N. (1974). Atmospheric pressure ionization (API) mass spectrometry. Solvent-mediated ionization of samples introduced in solution and in a liquid chromatograph effluent stream, J. Chromatography. Sci, 12, (11), 725-729 [7]RF Venn (Ed) (2000) Principles and practice of Bioanalysis Taylor and Francis. [8]Ashcroft, A.E. (1997) Ionisation Methods in Organic Mass Spectrometry, Cambridge, UK: The Royal Society of Chemistry. [9]http://www.asms.org/whatisms/p1.html: The American Society of Mass Spectrometry [10]Skelton, R., Dubols, F., Zenobl, R. Analytical Chemistry (2000), 72, 1707-1710 [11]Zschornig, Markus Pietsch, Roesmarie SuB., Jurgen Schiller and Michael Gutschow. Cholesterol esterase action on human high density lipoproteins and inhibition studies: detection by MALDI-TOF MS. [12]Zenobi, R, Knochenmuss, R. Mass Spectrom, Rev. 1999, 17, 337-366. How to cite Critical Analysis of Mass Spectrometry, Essay examples

Sunday, December 8, 2019

Information Security Management Report for Analyzing

Question: Describe about the Report on Information Security Management. Answer: Introduction The report focuses on analyzing information security threats in a large organization dependent on IT. The organization chosen here is Healthscope, which is a leading enterprise health care provider in Australia. Healthscope has 46 hospitals and 52 medical centers across Australia and employs 17000 people. The operations are fully enabled by IT for and the hospitals and medical centers are connected as one large enterprise IT network. The organization generates huge volumes of information stored as millions of records in their databases. Data is used by most of its employees based on their position and role in the organization from different locations, access is provided. Their pathological services in their system are available for external users located globally. Aims of the report The focus of this report is to provide a brief analysis on the use of Identity Access and Management (IAM) for its benefits and importance in Healthscope. The recent developments in the field of IAM are explored for their implementation in the organization. Overview The IT operations and management in Healthscope are looked after by a department named IT Security and Information Assurance (ISIA). ISIA is fully aware of the fact that securing their IT systems and data is a top priority and crucial to their unique business services to run effectively. In the IT security landscape threats and risks are increasing each day as new and advanced threats such as malware, phishing attacks, botnets, etc. are on the rise (Amigorena, 2015). Therefore in order to have appropriate security measures and data prevention systems, the organization has implemented security measures such as firewalls, perimeter defense, and anti-virus software. However, these measures were recognized by ISIA as inadequate as their systems are used through the internet and number of employees are mobile, access their systems from mobile devices which increase the level of threats. ISIA is headed by a Chief Information Security Officer (CSIO) and four managers responsible for securit y in key areas namely, information and physical security, data and user privacy, busies continuity, managing attacks from malware and botnets, identifying vulnerabilities and applying appropriate remedial measures to ensure the systems are secured from all types of attacks. In order to protect all the information assets, data and people the organization explore the idea of IAM for protecting its IT systems and people. Analysis Description and importance of IAM Identity and Access Management (IAM) is a security and governance solution that offers provisioning, compliance and enforcement capabilities for organizations in securing their IT systems. IAM also offers to strengthen access control, user management, and compliance for businesses to overcome their security risks. IAM solutions offer good IT practices by answering questions (Bruhn et al, 2003) like, Is the user authorized to use IT services and data? Is the user authentic and whether he/she involved in Healthscope services? Is the user permitted to access the information? Is user privacy ensured in the organization? IAM systems help organizations to streamline and automate IT activities along with delivering business value. IAM is responsible for the entire user/device lifecycle in the organization starting with creating a new user, provisioning access to resources, modifying or providing appropriate access rights according to their position/role in the organization and finally terminating their access at the end of their association with the organization. IAM solutions offer security and risk related management by enforcing access policies, user administration and provide access to users for portals based on a set of associated approvals (EMC, 2015). The importance of an IAM solution in organizations can be understood for its functions and scope that includes, Data collection for identity: This function in IAM will contain user account details, their roles, entitlements, and unifies them centrally as an identity store. Identity analytics: This function will provide visibility across the identity store for all identities and groups in Healthscope. The CISO can generate reports, dashboards and analyze identity-related status and trends. Access Review: In this function, the supervisors of different departments in Healthscope will review IT access for their team members and ratify their access levels if found alright. Different users in the organization will have different access levels and information or data available to them will depend on their role and responsibility in a particular function. Policy management: IAM solutions provide features to define policies (segregation of duties for users) to identify violations and initiate remedial measures. Management of roles: The role of each user for his/her access to the system is maintained to consolidate their entitlements. Access request management: Users can also request for changed access to the system due to their functional change. For example, a user can request for password reset. Similarly, a user recently promoted can request for a different access level (Faraji et al. 2014). Access requests are always subject to approvals by his/her supervisor. From the above scope, it can be understood that IAM solutions in Healthscope are essential because this gives better control for users in a remote location. The trends or developments in IAM are explored. Developments/Trends of IAM The recent trends and developments in IAM can be found in the following technology areas: Mobile computing: As the workforce of Healthscope is mobile, users tend to bring their own devices (BYOD) for accessing applications like product data, email, patient reports, etc (Kunz et al. 2014). The market trends indicate mobile computing is on the rise and increasingly allowed by organizations for their users. For instance, if a mobile device having access to important data in Healthscope system is stolen or lost, that is a big risk if it falls into wrong hands. IAM can help Healthscope by securing their mobile user access mobile computing program. This is done by strengthening applications, databases and securing user and device authentication. Identity as a Service (IDaaS) is a cloud-based solution to support authentication, authorization, and provisioning (Lonea et al. 2013). IAM in the cloud is an extension to an on-premise solution to have secure integration of their internal IT with the cloud infrastructure. Normally IDaaS is provided by the cloud service provider. IAM in the cloud computing area provides a scenario where applications deployed on the cloud is secured. The advantage here is that cloud computing systems already provide robust user authentication and access controls, and hence there is not much need for protecting applications in the cloud, especially if the deployment model is a private cloud. In such environments, Federation Role-based access (RBAC) (Mazumdar et al. 2015) and cloud IAM solutions are available to ensure high levels of security. Data loss prevention (DLP): DLP is another important area for many organizations like Healthscope. The first step in DLP is to protect data and ensure the identity of the user (Schoffner et al. 2015). DLP is another information security information discipline which can enhance security in the organization when integrated with IAM capabilities. Social networks: Social network is another public domain area where systems are vulnerable to all type of attacks. Since in social media, a lot of people post different messages, IAM implementations must protect user accounts from compromised (Hu et al. 2013). Normally this is done by ensuring a second level of authentication, noting failed login attempt and monitoring for geographic regions which are known for gaining control of user accounts. Healthscope when planning to have a social media presence as a marketing strategy must ensure to look into these aspects to avoid harm to their systems. Users in Healthscope must be trained on the importance practicing discretion in social media interactions (Andersen et al. 2012). In addition to the trends indicated, users in Healthscope must be educated on maintaining their privacy and importance of following security principles according to IAM implementation. When IAM is correctly implemented it can mitigate unforeseen threats and ensure protection. Recommendations, Justification, and Benefits Based on the scope of IAM and the trends, users in Healthscope are mobile and are allowed access to their systems from a variety of devices. Looking into the large network infrastructure of Healthscope, the importance of data and information in the organization, all IT components including information must be ensured with high levels of protection. Therefore, cloud-based IAM is recommended due to the following reasons: IAM solutions in cloud offer high protection of user data and information assets. The cloud-based solution is preferred because security systems and user authentication processes are already available in the cloud. IDaaS is a cloud service offers modular identity management for access, provisioning, policies and entitlements. IDaaS can be integrated easily with IAM in existing IT infrastructure and applications, this is important for Healthscope because multiple users use a variety of devices to access data from different locations. IAM with IDaaS provides improved controls and ensures regulatory compliance (Sudha Vishwanathan, 2013). Cloud-based IDaaS also improves IT agility by automating security processes (Bowen et al. 20140). Therefore, IAM solutions are highly desired by Helthscope because it offers techniques such as review of user privileges, password management, identity-enabled networking (Torres et al. 2013), authentication and access control, and integration with IDaaS and efficiency. Conclusion In this report, the importance of IAM for a large enterprise organization is highlighted. The description for IAM for its importance in the chosen organization is briefly provided. It can be seen that IAM is important for most of the recent technological developments such as mobile computing, social networks, etc. Looking into the operations of the chosen organization, a cloud-based solution is preferred and integrated with IAM because it offers more robust security for protecting information assets and IT systems in the organization. The report also briefly provides the benefits, advantages, and justification for the recommended IAM solution. References Amigorena, F 2015 Does your C-suite really understand the benefits of IT security? Computer Fraud Security, November 2015. Andersen, K.N., Medaglia, R. and Henriksen, H.Z 2012 Social media in public health care: Impact domain propositions,Government Information Quarterly,vol. 29, no.4, pp.462-469. Bowen, J.P., Hinchey, M., Janicke, H., Ward, M.P. and Zedan, H 2014 Formality, Agility, Security, and Evolution in Software Development,IEEE Computer,vol.47, no.10, pp.86-89. Bruhn, M., Gettes, M. and West, A 2003 Identity and Access Management and Security in higher education. It's 9.30 am. Do you know who your users are?, Educase Quarterly, November 4, 2003. EMC 2015 The business value of identity and access management, An RSA Whitepaper. EMC Corporation. EY 2013 Identity and access management. Beyond compliance, Insights on governance, risk, and compliance, Ernest Young. Faraji, M., Kang, J.-M., Bannazadeh, H. and Leon-Garcia, A 2014 Identity Access Management for Multi-tier cloud infrastructures, IEEE. pp.1-4 Hu, H., Ahn, G.J. and Jorgensen, J 2013 Multiparty access control for online social networks: model and mechanisms,IEEE Transactions on Knowledge and Data Engineering,vol.25, no.7, pp.1614-1627 Kunz, M., Hummer, M., Fuchs, L., Netter, M. and Pernul, G 2014 Analyzing Recent Trends in Enterprise Identity management, Department of Information Systems, University of Regensburg, Germany. pp.1-4 Lonea, A.M., Tianfield, H., and Popescu, D.E 2013 Identity management for cloud computing, InNew concepts and applications in soft computing. pp. 175-199. Springer Berlin Heidelberg Majumdar, S., Madi, T., Wang, Y., Jarraya, Y., Pourzandi, M., Wang, L. and Debbabi, M 2015 Security Compliance Auditing of identity and Access Management in the Cloud: Application to OpenStack, In2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 58-65. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt, S.C 2013 The secure medical research workspace: an IT infrastructure to enable secure research on clinical data,Clinical and translational science. vol. 6, no.3, pp.222-225 Sudha, S. and Viswanathan, V.M 2013 Addressing security and privacy issues in cloud computing,Journal of Theoretical and Applied Information Technology,vol.48,no.2, pp.708-719 Torres, J., Nogueira, M. and Pujolle, G 2013 A survey on identity management for the future network,IEEE Communications Surveys Tutorials. Vol.1, no.2, pp.787-802.