Monday, May 18, 2020

The Opposing case of Texas v. Johnson - 1218 Words

The Supreme Court’s decision on the case of Texas v. Johnson has been a controversial one, as it involves the burning of our national symbol, the American flag. It leads to the question: Does the desecration of the American flag a way of expressing speech that is protected by the first amendment? Shouldnt the destruction of a true American symbol be protected and preserved, as it is a symbol that represents our country? There is a great amount of criticism that Texas v. Johnson has been faced with; most of which are valid points that could contribute to possibly overriding this decision of Texas v. Johnson in the future. August 22, 1984, marked the day of the 1984 Republican National Convention in Dallas, Texas. Gregory Lee Johnson was†¦show more content†¦The flag is a symbol of freedom and prosperity, and of hope. It is also used to express patriotism for example, in which solders raise the flag to symbolize an American victory in war. The American flag is the symbo l that exemplifies our nation. Justice Stevens, who disagreed with the majority’s argument, states in his dissenting opinion that: â€Å"The ideas of liberty and equality have been an irresistible force in motivating leaders like Patrick Henry, Susan B. Anthony, and Abraham Lincoln, schoolteachers like Nathan Hale and Booker T. Washington, the Philippine Scouts who fought at Bataan, and the soldiers who scaled the bluff at Omaha Beach. If those ideas are worth fighting for -- and our history demonstrates that they are -- it cannot be true that the flag that uniquely symbolizes their power is not itself worthy of protection from unnecessary desecration.† (Texas v. Johnson, 1989, Dissenting Opinion, http://www.law.cornell.edu/supct/html/historics/USSC_CR_0491_0397_ZD1.html) The desecration of the flag is a way of expressing your feelings against the country, while showing no appreciation for what these people have done to make our country the way it is. It is a symbolic way to express hatred towards the US, and it should not be allowed, as the flag characterizes our history and who we are as a country, the fifty United States of America. Even though the first amendment allows freedom of speech, does not mean that there cannot be punishment for disrespectingShow MoreRelatedThe 1st Amendment : The Rights Of The First Amendment1572 Words   |  7 PagesHistorically, as demonstrated in cases such as Hazelwood v. Kuhlmeier, the U.S. Supreme Court, as well as the government in general, has well-upheld this amendment, but starting sometime in the second half of the 20th century, they are slowly embracing it less and less, as demonstrated in cases such as Texas v. Johnson. The recent hostility towards the First Amendment demonstrates that its rights are in danger. The 1969 ruling of Tinker v. Des Moines is an example of a historic case where the Supreme CourtRead MoreOver The Past Several Decades There Has Been Numerous Discussions991 Words   |  4 Pagessome cases the state’s legal code may constitute unlawful and infringing on one’s constitutional rights and the case can be appealed. This happened in the 1989 landmark U.S. Supreme Court case Texas v. Johnson. Gregory Lee Johnson challenged Texas state law claiming that his conviction was unconstitutional, and that his first amendment right to free speech were infringed upon. In 1984, Gregory Johnson burned the American flag outside the Republican National Convention in Dallas, Texas (U.S.Read MoreAffirmative Action and Higher Education Admissions Essay1664 Words   |  7 PagesEqual Employment Opportunity was created to ensure that hiring and employment practices are free of racial bias. Three years later, President Lyndon Johnson presented the Civil Rights Act in 1964 prohibiting discrimination of all kinds based on race, color, religion, or national origin (Wang Shulruf, 2012). Later that same year, President Johnson gave a commencement speech attempting to give an ethical response to the losses both materially and mentally to the African-Americans in slavery in theRead MoreEssay1093 Words   |  5 PagesTexas is one of the most populated regions within the United States only second to California. With such a large population, varying political ideologies convene within even the tiniest areas of the state. Because of this, Texas hosts a whopping nu mber of 36 representatives to serve for each of its congressional districts. Here in Dallas, specifically the Lancaster area, we are represented by Texas U.S. Representative Eddie Bernice Johnson, Texas State Senator Royce West, Texas State RepresentativeRead MoreEssay on Relevancy of the Voting Rights Act in Modern Times1730 Words   |  7 PagesAmericans were still being discriminated against because of the color of their skin. After the broadcast of 600 peaceful African Americans being attacked and beaten after attempting to cross the Edmund Pettus Bridge in Selma, Alabama, President Lynden Johnson decided it was time to create some legislation to prevent incidences such as this from happening in the future. The Civil Rights Act of 1964 and the Voting Rights Act of 1965 have been hailed as some of â€Å"the most far-reaching bills on civil rightsRead MoreEssay on Hate Speech is the Price We Must Pay for Freedom of Speech2302 Words   |  10 Pagesand obscene material. While i ndecent material might be frowned upon it is constitutionally protected, as where obscene material (also classified as having no social value) is not. This distinction was first made in the early 1940s in the Chaplinsky case.   Ã‚  Ã‚  Ã‚  Ã‚  Chaplinsky was a Jehovah’ s Witness, and one day while doing some face-to-face confrontations as part of his religious practices, an angry crowd formed. When an officer stepped in to break it up, Chaplinsky called him a â€Å"God-dammed racketeer†Read MoreSocial Recognition Issues of the Sioux Tribe Essay1616 Words   |  7 Pagessuspended from the school as the schoolboard of Needville Texas believed it was a distraction to other students and that no exceptions should be made. Adrials parents brought the case to federal court which fortunately had recognized Adriels strong belief in his Sioux culture and respect for his religion, and declared that Adriels hair may be worn as he wished as long as it was for religious purposes (Daniels 2). The Needville School Board of Texas is a perfect example of the harsh opposition felt byRead MoreHow The Freedom Of Speech And Its Interpretation Affects Public And Government Employees1516 Words   |  7 Pages(e xcluding real criminal intent, true social harm, or social danger) even â€Å"hate speech† is protected under the First Amendment as long as it does not present â€Å"imminent danger† as exemplified in the outcome of a supreme court decision in 1991. (R.A.V. v. City of St. Paul, 1992.) Moreover, the Freedom of speech protects not only what we say, but also omissions as well as any voluntary expression, verbal communication, written word, and participatory activity. Over the course of our nation’s historyRead MoreShould Abortion Be Legal?1482 Words   |  6 Pagesbill did not include a health exception. Several states tried to change their laws to allow it and, in 2004, a federal judge declared it unconstitutional because of the lack of a health exception. Joseph B. Tamney, Ronald Burton and Stephen D Johnson collectively wrote The Abortion Controversy: Conflicting Beliefs and Values in American Society in the Journal for the Scientific Study of Religion which said, â€Å"The public’s division over abortion begins with conflicting views on personal freedomRead MoreThe American Flag: More Than Just a Piece of Cloth3674 Words   |  15 Pagesunconstitutional during the Johnson verses Texas case. During the 1984 Republican National Convention, Johnson took part in a â€Å"political demonstration to protest the policies of the Reagan administration and some Dallas-based corporations† (Texas v Johnson). Johnson burned an American flag after he marched through the streets, while other protesters chanted. No one was physically injured or in danger of injury, although several witnesses were seriously offended by the flag burning. Johnson was convicted of

Wednesday, May 6, 2020

The Doctrine Of Double Effect - 1163 Words

Introduction to Ethics in the Healthcare Setting Doctrine of Double Effect The Doctrine of Double Effect (DDE) is utilized in the explanation of the permissibility of dealings and actions that result in impairment for example, death of a person, as a result of achieving some good at the end. This explains that it is sometimes acceptable to harm someone if the action will evoke some good at the end (Mclntyre 42). This reasoning was introduced by Thomas Aquinas but has developed and many versions of the same have erupted. Scanlon’s view of Double Effect According to Scanlon, the motives and intentions do not bear any direct consequence tote permissibility of the action. He argues that the reasoning behind the traditional Doctrine of Double†¦show more content†¦Consequently, the doctor refrains from treating the sixth patient causing death then takes the organs and treats the other five patients (Lippert- Rasmussen 543). Application of the Doctrine Double Effect All the patients have the right to equally treatment and the doctor has the responsibility of protecting all their lives. In this case Doctrine Double Effect applies in the sense that one life is lost to save five lives. The available medicine can be utilized in the treatment of one patient. This patient will be cured and be discharged. However, five patients need vital organs which are not available due to a shortage of organs. The organs the five patients need are all possessed by the sixth patient and they are in good health. If the doctor chooses to treat the sixth patient, the five will die due to the unavailability of the needed organs. As much as it painful, the doctor decides to let the sixth patient die which is a permissibility action and utilize in the salvaging of the five lives which is the intended meaning. Opinion on the scenario The sixth patient also belongs to a family and has dreams that are to be achieved. Causing preventable death to such an individual does not only cause pain to the family but it is also an injustice and an unfair way of ending life. It is logical to save five lives by eliminating one but it is morally right to save them all. There are other ways of getting organs forShow MoreRelatedThe Doctrine of Double Effect2090 Words   |  8 Pagesa moral dilemma of having to kill someone. This is where the Doctrine of Double Effect comes into play. The Doctrine of Double Effect (DDE) is a principal which aims to provide specific guidelines for determining when it is morally permissible to perform an action in the pursuit of a positive outcome with the full knowledge that the action will also bring about an evil consequence. (Solomon, 2014). Although the Doctrine of Double Effect is viewed as a positive theory by man, it is unjust in that itRead MoreThe Doctrine Of Double Effect877 Words   |  4 Pagessuppression of respirations. However, the Doctrine of Double Effect helps to determine if the act is permissible. With this particular case, Nicolas is faced with the situation of either facing unbearable pain or taking morphine to ease the pain in his last months of life. Before this case can be analyzed according to the Doctrine of Double Effect, one must first consider the act, good effect, and bad effect. In this case, the act is the use of morphine. The good effect that comes from the act is the reliefRead MoreThe Doctrine Of Double Effect2007 Words   |  9 PagesThe doctrine (or principle) of double effect is often invoked to explain the permissibility of an action that causes a serious harm, such as the death of a human being, as a side effect of promoting some good end (McIntyre, 2004) . According to the principle of double effect (DDE), there are times where it is permissible to cause harm – as a side effect of bringing about a good result, even though it would not be acceptable to cause such harm as a means to providing the same good end. I will nowRead MoreEssay on The Doc trine of Double Effect1307 Words   |  6 PagesCase Assignment: The doctrine of double effect says that the pursuit of good is not as acceptable if the harm that results is intended rather than merely foreseen (Lippert-Rasmussen, 2010). To some it is a nonabsolutist moral principle in which as long as significant good resulted from the action, it is allowable (Lippert-Ramussen, 2010). Scanlon believed that an act that leads to the death of an innocent person can never be justified by the good that results (Lippert-Ramussen, 2010). ScanlonsRead MoreProblems With The Doctrine Of Double Effect1904 Words   |  8 PagesJessie Buckler Term Paper Philosophy 3300 April 25, 2016 PROBLEMS WITH THE DOCTRINE OF DOUBLE EFFECT Defenders of the Doctrine of Double Effect argue that there is a morally significant distinction, which bears on the rightness of actions, between those consequences of our actions that are intended and those that are foreseen. Utilitarians often use this doctrine to describe their stance on the topic of harming others. This paper will look at three situations that are commonly used to defendRead MoreDoctrine of Double Effect Essay1464 Words   |  6 PagesAlecia Rhines Doctrine of Double Effect Trident University What is the Doctrine of Double Effect? The doctrine of double effect if often invoked to explain the permissibility of an action that causes a serious harm, such as the death of a human being, as a side effect of promoting good ends. It is claimed that sometimes it is permissible to cause such harm as a side effect of bringing about a good result even though it would not be permissible to cause such harm as a means to bringing aboutRead MoreThe Doctrine Of Double Effect : Writing Assignment1176 Words   |  5 PagesEvan Bakker Professor Cole Honors Ethics 6 February 2015 The Doctrine of Double Effect: Writing Assignment 1 The method of reflective equilibrium is a method that is a state in which our moral principles are in accord with our intuitive moral judgements. There are two different kinds of reflective equilibrium: narrow reflective equilibrium, which is when one’s intuitive judgements concerning a rather restricted set of cases is rendered consistent with a set of general moral principles, where asRead MoreThe Problem Of Abortion And The Doctrine Of Double Effect1775 Words   |  8 PagesIn The Problem of Abortion and the Doctrine of Double Effect , Phillipa Foot takes into account what is called the Doctrine of Double Effect (henceforth DDE), which appeals to two effects that an action causes - one intended at and desired, the other foreseen as a consequence of the action but undesired. She uses this doctrine to critically examine its application and thereby assert that My conclusion is that the distinction between direct and oblique intention (the DDE) plays only a quiteRead MoreT he Doctrine Of The Separate Legal Entity1386 Words   |  6 Pagesact is the doctrine of the separate legal entity. Section 1.5.1 of the act outlines the separate legal entity theory, legislated as a company being distinct from its owners, managers, operators, employees and agents. Though, the doctrine of separate legal entity has been argued as a double edged sword. A ‘double edged sword’ is defined by Oxford as ‘a situation or course of action having both positive and negative effects.’ The separate legal entity doctrine is evident of being a ‘double edged sword’Read MoreThe Debate Over Physician Assisted Suicide951 Words   |  4 Pagesdetermined by the doctrine of double effect. The doctrine of double effect states that an action is morally permissible if the bad effect is not intended but may be foreseen; if the act is not intrinsically wrong; and if good effect is the result of the action, not the bad effect. This doctrine can be used to determine whether or not providing the diamorphine is morally permissible. With the doctor committing to giving the diamorphine, he is satisfying all the requirements for the double effect. The intent

System Analysis and Design for World Wide Web - myassignmenthelp

Question: Discuss about theSystem Analysis and Design for World Wide Web. Answer: Introduction As the demands for faster connectivity increases, the application of cloud facilities will also increase to support the functional requirements of the end users. These facilities among many other characteristics will offer flexibility benefits owing to their availability across the World Wide Web. Moreover, they will be resilient because of the redundancy programs of the service providers who will frequently set up multiple resources in different areas(Stantchev, Colomo-Palacios, Niedermayer, 2016). In addition to this, the technology will drastically reduce the overall cost of operation as the end users (subscribers) will have minimal managerial roles. These roles in todays on-premise infrastructure will include the implementation functionalities as well as the general maintenance operations, which are eliminated after the application of the cloud facilities. Now, the project at hand requires extensive storage because of the growing demands made by the patients records. Therefore, to meet this objective, the project aims to integrate cloud resources into the proposed system. This report analyses this requirement where the various aspects of cloud solutions are outlined. Systems non-functional requirements In system design, the non-functional requirements represent the general constraint of the systems functionalities. In essence, these requirements restrict the operations of the resources as defined by the functional requirements(Chung, 2015). Furthermore, they will outline the process in which the functionalities of a system are achieved i.e. the how of operations and not the what of the systems operations. In general, there are four main groups of the non-functional requirements: Usability a group of requirements that require the system to priorities its functionalities based on the user application patterns i.e. the usage characteristics. Reliability the system ability to satisfy the user demands after a long time of operation. Performance - the systems response to the users initial specifications and commands. Security the ability to maintain the integrity of the systems resources(Terzakis, 2012). System qualities There are specific minimal services and operations that the system must perform, these services define the qualities of the system where certain distinctive attributes are highlighted. Moreover, they specify the characteristics of the system from the end users perspective(Lvy Ramdane-Cherif, 2003). In this project, the following qualities must form the basis of its functionalities: Serviceability the ease in which the system will be maintained while using a wide range of monitoring activities. Latent capacity considering the field of application, the systems ability to handle unusually high loads will facilitate its performance and usability. Availability finally, the system should have a reasonable service time when the overall resources are readily available to the end users(Gorton, 2011). System interface In the computing industry, an interface represents a general boundary area that separates several computing components while facilitating the exchange of information. In this project, the main system interface will be between the Headspace system and the cloud resources. This boundary as highlighted above will facilitate the exchange of information between the end users and the cloud storage resources(Mulo, 2007). Moreover, the system at hand will have another additional interface that will deliver results to the end users (user interface). In both instances, the following requirements will have to be met: UI and system interface requirements: Responsiveness and consistency there are two factors that will determine these requirements; first the response speed to users requests and secondly, the speed of giving a functional feedback. Now, this responsiveness will also maintain the consistency of the output functions. Familiarity to improve the systems intuitive outcomes, the interface should have familiar structures and designs. Attractive (aesthetic appeal) finally, the interfaces must be appealing to the eye to continuously engage the user(Yoder Wirfs-Brock, 2013). System constraints System constraints will occur in two main formats; the technical limitations and the business restrictions. In the technical limitations, the functionalities of the system will be limited by implementation elements and procedures such as new technologies and deployment platforms. On the other hand, business restrictions will include items such as the cost and development timelines(Terzakis, 2012). A review of the cloud solutions In this project, the cloud technology is being sorted out to increase the availability of resources. Now, cloud computing will improve the delivery of IT resources through its defining technologies that form part of wider service concept. In essence, the general technology will have several foundational elements that will include IT resources such as hardware, software and networks(Telkom, 2016). Therefore, their interoperability with the users system will dictate the benefits and weaknesses of the proposed solution. In this case, the following strengths and weaknesses will be experienced as a result of the cloud facilities. Strengths of cloud computing Cost flexibility the cost of using cloud solutions will vary from one application to another depending on the users requirements. Therefore, the Headspace project will be able to commission and thus pay for services they need. Increased mobility first, the data of the Headspace system will be readily available after being hosted online. Furthermore, the will also be able to move with their resources once they are linked with the cloud servers. Enhanced collaboration with cloud applications, the users (in this case the medical practitioners) will collaborate their activities to generate better diagnosis and treatment results(CTR, 2017). Weaknesses System downtime when the online infrastructure is disrupted the overall service of the cloud facilities are halted Security and privacy the resources face many threats because of the nature of the cyber environment where many threats are exhibited. Moreover, the resources are stored in unknown locations which exposes them to unknown vulnerabilities(Tsagklis, 2013). Protecting the projects data Patients records including their detailed stories will be hosted online which necessitates the need to implement advanced security features. Furthermore, unlike the physical data, the virtualized information will not abide by the legal stipulations of the land. Therefore, to protect the data being used, the organization must first implement a standard security plan that will detail the systems authentication and encryption standards(Telkom, 2016). Moreover, the same plan will outline the access policies for the users who will have unique access parameters. In addition to this, the organization must consult and enact legal agreements that spell out the responsibilities of data processes which will include the ownership of the data. Analysis of the SDLC Approach System or software development life cycle is a procedure of designing, developing and deploying software solutions. The overall aim of this procedure is usually to improve the quality of the systems having met the users requirements and expectations. Now, to meet this objective, the SDLC procedure follows a detailed plan that describes all the implementation stages of software development(RBT, 2010). In this case, development phases such as planning, testing, building and solution deployment are given. Furthermore, based on the defining user requirements, the SDLC process can adopt several distinctive procedures which in the end defines the types of SDLC i.e. the approaches/methods. This section highlights some of these methods, the predictive and adaptive SDLC approach. Predictive approach This method can be defined as a classical approach to system design as it uses conventional procedures to implement solutions. In essence, the approach will follow a logical and sequential plan that will have minimal operation deviations. Furthermore, it will have pre-defined elements for the systems implementation which will include the user requirements and assumptions. In all, the following features will generally characterize the method: First, it uses a predictable process to design systems where all the parameters are pre-defined. Secondly, it is associated with a consistent implementation plan that will never change after its documented(Okoli Carillo, 2012). Thirdly, the implementation phases are executed sequentially with minimal overlap incidences. Advantages of the approach The method follows a logical pattern which makes it easy and simple to understand. Furthermore, its logical structure enhances the rigidity of the implementation procedure which improves the management process. Finally, the approach is favourable for small projects which are easily managed and implemented in a short period of time. Disadvantages First, it's very inflexible lacking the ability to adapt to changes such as those of system requirements. Moreover, it contains a lot of risks and uncertainties because unknown variables easily disrupt the entire process. Finally, it is not suitable for long-term projects as they tend to have many changes(GU, 2017). Adaptive method Now, this approach evolved from the classical methods in an attempt to fulfil the limitation of their functionalities. In essence, the desire to have an agile and adaptable procedure led to its development as it was able to accommodate any system changes. Furthermore, unlike the predictive method, it does not predict and pre-define all the requirements of the system at a single instance. Instead, it defines a logical development process while considering the possibility of system variations(Okoli Carillo, 2012). Moreover, it divides the development process into several stages that are then executed simultaneously. In all, it has the following features: First, a logical plan having independent development phases is used. These phases then run concurrently based on the developers expertise. Finally, following their completion, the stage is assembled using several iterative procedures. Advantages of the approach Risks and uncertainties are drastically reduced because the method accommodates any variations or changes. Secondly, the method is time efficient as multiple stages can be implemented at the same time. Its iterative procedures also improve the quality of the final systems as they are based on the users immediate requirements. Disadvantages There is always the risk of failing to meet the implementation budget because of the continuous accommodations made to the unknown system changes. It is also difficult to establish the exact timelines of implementation(Jamsheer, 2017). Recommendation In the analysis done above, the predictive approach has been identified as a method for implementing short-term projects. This conclusion is based on its limitations that prevent it adapting to system changes, a feature that characterize long-term projects. Furthermore, with its well laid out plan, it cannot accommodate the features of the long-term project. Now, by any definition, the Headspace system is a long-term project. For one its defining attributes are very extensive and secondly, it has many user requirements. Moreover, the system requires the integration of cloud facilities. Therefore, because of the limitations of the predictive method, the adaptive approach is the best solution for the proposed project. Also, do remember that with an adaptive approach the developer risks of system uncertainties are drastically reduced which based on the nature of the exiting project will characterize the development process(Okoli Carillo, 2012). Conclusion To the Headspace project, cloud resources offer the best solution to its existing problems of managing patients records. These resources also extend the services of the organization by delivering computing resources to all the users i.e. the members of the medical staff. Furthermore, they drastically lower the expenditures of the organization by eliminating the implementation and maintenance costs of the computing resources. Finally, they improve the scalability of the storage facilities which based on the patients stories will regularly change. References Chung, L. (2015). Non-Functional Requirements. Practices and Recommendations, Retrieved 03 October, 2017, from: https://www.utdallas.edu/~chung/SYSM6309/NFR-18-4-on-1.pdf. CTR. (2017). Advantages and Disadvantages of Cloud ERP. Retrieved 03 October, 2017, from: https://www.ctrworld.com/advantages-and-disadvantages-of-cloud-erp/. Gorton, I. (2011). Quality Attributes; Software Quality Attributes. Essential Software Architecture, Retrieved 03 October, 2017, from: https://www.springer.com/cda/content/document/cda_downloaddocument/9783642191756-c3.pdf?SGWID=0-0-45-1137943-p174111059. (2017). Pros and Cons of Predictive Analysis. Online programs, Retrieved 03 October, 2017, from: https://scsonline.georgetown.edu/programs/masters-technology-management/resources/pros-cons-predictive-analysis. Jamsheer, K. (2017). 12 Best Software Development Methodologies with Pros and Cons. Acodez, Retrieved 03 October, 2017, from: https://acodez.in/12-best-software-development-methodologies-pros-cons/. Lvy, N., Ramdane-Cherif, A. (2003). Quality Characteristics for Software Architecture. JOURNAL OF OBJECT TECHNOLOGY, Retrieved 03 October, 2017, from: https://www.jot.fm/issues/issue_2003_03/article2.pdf. Mulo, E. (2007). Design for Testability in Software systems. Retrieved 03 October, 2017, from: https://www.infosys.tuwien.ac.at/staff/emulo/pdfs/emmanuel_mulo_thesis.pdf. Okoli, C., Carillo, K. (2012). The best of adaptive and predictive methodologies: Open source software development, a balance between agility and discipline. Research gate, Retrieved 03 October, 2017, from: https://www.researchgate.net/publication/220490309_The_best_of_adaptive_and_predictive_methodologies_Open_source_software_development_a_balance_between_agility_and_discipline. RBT, B. (2010). Systems Development Life Cycle: Objectives and Requirements. Retrieved 03 October, 2017, from: https://www.benderrbt.com/Bender-SDLC.pdf. Stantchev, V., Colomo-Palacios, R., Niedermayer, N. (2016). Cloud Computing Based Systems for Healthcare. The Scientific World Journal, Retrieved 03 October, 2017, from: https://downloads.hindawi.com/journals/specialissues/848162.pdf.. Telkom. (2016). Cloud Solutions: Utilising Cloud Solutions as a Technology Lever in Enterprise Business. Cloud Solutions, Retrieved 03 October, 2017, from: https://www.telkom.co.za/today/media/downloads/Cloud_SolutionsWP_V2.1_eVersion.pdf. Terzakis, J. (2012). Specifying Effective Non-Functional Requirements. Intel, Retrieved 03 October, 2017, from: https://www.iaria.org/conferences2012/filesICCGI12/Tutorial%20Specifying%20Effective%20Non-func.pdf. Tsagklis, I. (2013). Advantages and Disadvantages of Cloud Computing Cloud computing pros and cons. Retrieved 03 October, 2017, from: https://www.javacodegeeks.com/2013/04/advantages-and-disadvantages-of-cloud-computing-cloud-computing-pros-and-cons.html. Yoder, J., Wirfs-Brock, R. (2013). Agile Quality Scenarios. Agile Conference, Retrieved 03 October, 2017, from: https://www.quality-aware.com/resources/Quality%20Scenarios%20-%20Yoder%20%26%20Wirfs-Brock.pdf..