Apple and their war with Privacy

Navigating the Challenges of Data Security Introduction Apple is currently battling the war on privacy. The United Nations recognizes “privacy” as a basic human right as does Apple. The question of how much of your privacy you are giving up by obtaining a smartphone has been a hot topic in the news lately. An iPhone, … Read more

Project – dating app platform for Android, Apple & web app

Introduction 1.1 Problem Statement The following report was requested to document the design and implementation of “YUPPTY “dating app. The purpose of this cross browser and mobile app is to allow users sign up to our dating service using google or social media but to give them full control of their profile to even remain anonymous … Read more

Safeguarding the Internet of Things Fortune: Reposing “Cyber Security” at the core of IoT

Abstract: IoT world is growing at a breathtaking pace from nothing to everything. The adoption of Internet of Things technologies has certainly been on the rise and about every organization across the globe has put a step forward with IoT projects. Still IoT is not at all able to challenge the cyber attacks around the … Read more

Motivation in platform work differs between men and women

Digitalization offers a variety of opportunities for female empowerment and for a more equal female participation in labor markets, financial markets and entrepreneurship. Currently, digitization seems to favor the female labor force, since women face on average lower risk of being replaced by machines, as compared to men. Women’s often superior social skills represent a … Read more

IT Outsourcing (benefits, issues, case studies)

Introduction Outsourcing is a business practice of having a third party perform services that traditionally were performed by the company’s own employees and staff. Businesses use IT outsourcing for a wide range of ICT infrastructure, business processes and application services. The impetus behind IT outsourcing is often the perceived benefits and effectiveness that IT outsourcing … Read more

The Ethical and Social Implications of Information Technology

Information Technology (IT) concerns computer professionals who design and create information systems and devices, bringing significant benefits to society. According to Fielden (2004), IT plays a central role in commerce, industry, government, medicine, education, entertainment, and society at large. However, alongside these benefits, IT has introduced numerous social and ethical issues. It is up to … Read more

Data governance

The usage of data is a prominent goal for the digital transformation of business models. The amount of information we have to oversee is growing rapidly. Data is created from every action taken by every Internet-empowered device, and it’s only going to develop. A full 90 percent of data in the world today is only … Read more

Phantom Security Version 4.0

Cybersecurity has become a major concern in the past few years. In fact, organizations across the world are set to spend $101.6 billion on cybersecurity in 2020. Cyber threats are no longer run-of-the-mill and have become increasingly sophisticated. As the complexity of the threats increases, the tools to fight them also become smarter. Phantom Security … Read more

Hardware Requirement and Migration Plan

LSDG is a new research and development group established by Linx, LLC. LSDG’s systems will utilize the Linux operating system and all resources will be accessed using Linx LLC’s Microsoft Active Directory Domain. In order to simplify productivity with the sharing of resources and technical support, Linux LLC wants to migrate all their current operating … Read more

Systems engineering approach to transform IT services

Abstract This project focuses on systems engineering approach taken by the IBS Company to transform their IT services resulting in a tremendously improved business model that consisted of independent yet interrelated autonomous business units. The rearrangement was carried out in 2001, by the top management of the group in order to create new capabilities by … Read more

Virtual learning software proposal

Organizational Framework Our group proposes the formation of a company named InstaMeet. InstaMeet will be an all-encompassing software add-on that will provide both students and professors an organized forum to enhance virtual learning. Virtual learning currently uses a small handful of vendors that provide a portal for students and professors to interact. For example, The … Read more

Password protection scheme & authentication framework

Abstract— Security is one of the important aspects in this world. In order to protect against malicious attack, many Sofwares and secure algorithms are used. The password authentication technique is one of the commonly used despite its flaws. Several password protection techniques are used to provide security and help in remembering and recovering password soon. … Read more

Customer reviews in e-commerce and Electronic word of mouth (eWOM)

INTRODUCTION Customer reviews have always been an indispensable part of any business. Before the discovery of the internet, to know about a product or business, one had to go around asking people presuming to find someone known and trusted who had knowledge or experience with the company or product. This type of study would usually … Read more

Cyber security, cyberwarfare and cyber attacks

Cyber security consists of technologies, processes and controls designed to protect systems, networks and data from cyberattacks (ano, n.y.). And also cyber security can reduce the risk of cyber-attacks and builds safety against the unauthorised exploitation of systems, networks and technologies. Security involves two parts: cybersecurity and physical security. Assurance in cybersecurity requires coordinated efforts … Read more