Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
8 pages (2489 words)
, Download 1
, Research Paper
Free
The development of mobile health services affects many stakeholders which necessitate their participation. This study explores the issues of mobile health service using secondary data from a scholarly articles and proceeds to conduct a primary research survey in two remote locations in the UK.
10 pages (3015 words)
, Download 1
, Research Paper
Free
Organizations recognize the aspect of security as important in assuring their best interests. Security professionals have established that risks arise from the existing threat as well as the vulnerability of an asset which can result in the destruction or loss of the assets. An asset can be defined as an item of value within the organization.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
9 pages (2770 words)
, Download 0
, Research Paper
Free
Information and associated technologies play a major role in the innovations and competitive advantage generation by organizations. Organizations today face a range of security issues, especially in the information technology sector. This exposes them to vulnerabilities that would threaten the existence of the organization.
10 pages (3138 words)
, Download 0
, Research Paper
Free
The security industry engages in a multi-discipline and diverse knowledge base which involves the management of risk as the fundamental aspect to be mitigated. There is limited study on understanding and drawing the expert security knowledge to be used in a particular region. Physical security is necessary for assets such as people, information, and property.
7 pages (2302 words)
, Download 0
, Research Paper
Free
A review of the literature concerning cyberbullying and other forms of child abuses was completed. Findings showed that over the last few years, internet usage among children has been rising in steady fashion consequently resulting in cyberbullying. Cyberbullying refers to an online harassment of children through mediums such as, but not limited to, emails, text messages, Facebook, WhatsApp, Instagram among other social network platforms.
Globalization, Neoliberalism, and internet freedom have played a significant role in ensuring that there has been a shift in media regulations. Advancement of technology and apps such as Facebook has made it easier to pass information. However, it should be noted that the government is still central to media regulations.
14 pages (2771 words)
, Download 0
, Research Paper
Free
Google Cloud Platform Marketplace is dominated by a wider range of SaaS brands, which has led to simplified software processes to attract more customers. In this type of cloud computing market, there is more than three hundred SaaS software, thus giving the consumers the liberty to select the best option for their business.
There is rapid development in the personal computing and technology sector accompanied by advancements in user interfaces that seek to improve user experiences. These tools provide a form of interaction between the user and the personal computer or mobile device, considering that machines and humans use different languages.
It is disconcerting when one gets online to get substantial information only to be harassed by advertisement pop-ups that are even irrelevant to the needs of the internet user. Sometimes, I get offended because some content that comes into view on my Facebook page does not align with my ethics and beliefs.
Internet of things also known as IoT is an emerging trend of technology today. It’s high in use today as its applications are found from schools, hospitals, governments' houses, and cars. Its applications are seemingly limitless and its demand is high. However, like every good thing in technology it has, its own cons.
Founded in 1976 by Steve Jobs and Steve Wozniak, the company introduced the Apple II microcomputer way back in 1977. It was the first company developed to use the graphical user interface (GUI) in the product that it launched in 1983, the Lisa. However, its phenomenal success came with the launch of Macintosh (popularly known as Mac) in 1984.
17 pages (4336 words)
, Download 0
, Research Paper
Free
The accessibility of digital technology impacts the structure and the management of an organization in a significant way, especially in the value. Different approaches can be used for the infusion of technology provides an essential field for evaluating how the amount of information technology impacts organizational structure.
Analytics: it is key in that it will help the company come up with better analytics and storage and features that will be used for data lakes, big data analytics and internet of things. Through this, the company will be able to analyses the progress of the applications and how best the users are using it.
10 pages (2288 words)
, Download 0
, Research Paper
Free
The evolution of technology and the internet has led to the emergence of interdependence in computer systems. The complexity in the systems has led to exploitation of vulnerabilities by the hackers. The recent upsurge in cybersecurity crime statistics has alert the security engineering field to investigate the matter.
This paper will follow the systematic review process carefully, with results from over 100 research papers in different conferences and journals earmarked for analysis. The taxonomy will be constructed by conducting a “survey of various surveys” on associated taxonomies as well as performing an iterative content analysis.
This fast-growing habit has seen the profits in the video gaming sector rise to almost $21.53 billion. Recent studies in video gaming have also shown that more than 50% of video games contain an element of violence and due to this fact, violent video games are not allowed in learning institutions because they facilitate the increase in violence-related cases.
14 pages (2515 words)
, Download 1
, Research Paper
Free
Android malware has been growing in scale and complexity, making the traditional methods of scanning and stopping malware irrelevant in the anti-malware war. There are few new techniques to mitigate the threats posed by malware. A machine learning approach is prescribed as a sustainable solution to mitigating these problems.
Terrorism has become an issue of concern globally due to the technological dynamics that allow faster and efficient communications globally. Technology provides numerous platforms where terrorists can use the web to access information about viable targets that meet their maximum casualties’ mission criteria.
It is similar to the magazine app but customized to the feature of the Snapchat showing trending live stories on fashion and beauty and animated photography and texts. The strategy behind this app is to enable Vogue Magazine to reach more audiences. This is since the number of people using the Snapchat app daily has hit over 100 million individuals.
In fact, perpetrators may not be cognizant of the harm they inflict on the victim since they do not have the opportunity to see the victim's reaction. The cyberbullying instances narrated by Ellis and Kestrel McNeill demonstrate that the physical distance between the cyberbullies and the victims was a key motivating factor for the perpetrators.
The members of the team that worked on “Project X” should be interviewed to find out whether the disgruntled employee showed any interest in their work that could have at the time seemed normal, but in retrospect, could be considered to be suspicious. The people who worked on the source code project could also be interviewed.
The different email service providers such as Yahoo, Gmail, and Hotmail have taken stringent measures to promote email security. They send an email to notify you when your email is being accessed from a different IP address. That explains why you always get warnings and alerts in your inbox from the service providers.
11 pages (2841 words)
, Download 1
, Literature review
Free
It focuses on the analysis of views of various authors regarding the Internet of Things, paying specific interest to the benefits and challenges of IoT to the global market. It examines the factors favoring the emergence and expansion of this technology, the documented uses, distribution, and projected growth of IoT, and how it will impact the lives of the people.
7 pages (1790 words)
, Download 0
, Literature review
Free
It also increases the use of financial management. Businesses, especially Small Medium Enterprise’s flourish well when their business process are recorded as well as reported appropriately. Usually, ICT is considered as one of the most consistent and reliable means of giving a stable platform for an efficient system of internal control over financial reporting.
10 pages (2890 words)
, Download 0
, Research Paper
Free
This will be the most significant information to the designers in having a common policy in terms of agreed procedures, regulations, standards and measures to evaluate eBook effectiveness to the user. This has not happened, and only a few researchers are attempting to set up the evaluation tools to gather evidence of the good practice.
Various aspects and data mining techniques reveal that the desired outcomes would depend on the tradeoffs between the preservation of private data sharing and data utility in a specific database. The anonymization techniques explored are among the vital discoveries in this paper as they inculcate the dynamism of the modern world via the use of social media platforms.
The size of the home page: 529.20 kilobytes. The sizes of other linked pages vary from around 50 kilobytes to 900 kilobytes depending upon the text and image content. All Empires (AE) is a community site for world history and a leading forum on the subject. It was founded in 2001 and is run by volunteers and persons who pursue history as their hobby.
The world today is driven forward by technology and the social effects of technology have become the biggest debate. There are lots of people running behind the latest innovations of technology without even understanding what it is for. Electronic or computer automation has come in every sphere of life and the idea of functioning without a computer has been unimaginable and the process has been speeded up by the arrival of computers.
The essay will discuss one of the major inventions which have completely changed life. The invention of the Internet is one of the most impactful inventions in the history of mankind. The Internet has become an essential part of our life and it has become the best tool for being connected with the world.
The problem with inventions and innovations lies solely with the user. The good effect of the internet lies with the user. The Internet has opened a Pandora of bad effects along with good effects. The harm lies with the people using it rather than the technology.
There are still a number of issues associated with GPS and these include the various ways in which the system can be jammed, liability issues, responsibility for operating the system, funding for the base stations, how precise the positioning data should be, and what type of users should be authorized access to the most precise signals.
The general developments in technology have over the years build up new chances for criminal activities hence driving the process of the development of the latest technology. The escalating development of the vast new technologies opens the door for expanding alternatives for the inventive mind.
The origin of crowd-sourcing was during the initiation of web 2.0, and so crowdsourcing was coined by a user in an internet forum. Crowdsourcing shares its ridding principles with web-based social media, where a user gets feedback from other users on a certain topic of their own choice. It uses the philosophy of “two heads are better than one".
The user’s public information can disclose much about the organizations in which they work. This makes it possible for an attacker to create a whole personality apparently working in an organization and use the chance to gain access to private information within the organization (Herrero, 2010, p. 139).
The internet is a place where repressed societies can revive and develop and this is one of the major fears that authoritarian states harbor (Reporters without borders 2010). In the internet, economic and political issues have become intertwined and the need to protect information has become very important.
Misconfigured APs: When separate APs are independently managed, configuration errors appear as a significant security danger. Nowadays, the majority of corporate WLANs are centrally handled, by means of synchronized updates as well as periodic reviews to reduce TCO, develop dependability, and as a result minimize risk.
The Government on its part is striving hard to wipe out terrorism but the process is slow and long-drawn. The governments of countries like the USA and the UK have made a lot of amendments to their existing legislation in addition to bringing out many antiterrorism activities and policies to curb the escalating terrorism.
Management of virtual communities is not that easy a task, It requires people that are knowledgeable and skilled in the field. This is because of the impact that their decisions have on the general running of the community. A decision by the virtual manager may cause the whole system to come to a halt due to stagnation and withdrawal of members.
For the sake of IS system procurement, we need to manage and handle a number of aspects. From my personal experience, one of the initial aspects we need to take care of is our already available technology. We need to be careful regarding the application of a new technology-based system with more and compatibility with our previously available technology.
This latest development has been confronted by extensive amplification and accelerated growth which has been spearheaded by the heightened awareness and popularity of multi-user software, networked computers as well as the internet which have been subjected to the elevated investigation (Deuze, 2006, p. 63).
The article highlights the use of different concepts which has their relevance and usage. The article in a similar manner shows the manner in which technology and the growth of social networking sites can be used for reducing the cultural gaps and ensuring that the required platform is developed for better interaction.
More organizations like the Dubai Aluminum Company Limited (DUBAL) are also working towards achieving ISO/IEC 20000-1:2005 I.T Service Management certification while incorporating ITSM. The organization has implemented ITIL which is an international operating system to issue instructions for effective IT management.
The social network is arguably developing as the leading platform of getting news especially on the trending fashion and brands that rule the day. Most marketers are still struggling to find the best ways of promoting and ensuring sustainable development of their brands on social networking platforms.
Elgin (2006) observes that the internet has necessitated the growth of an online community that allows people to connect and share information on various issues through social sites and micro-blogging sites. This offers individuals to build social contacts, thereby expanding the social network of individuals (See Appendix 4).
Prior to the diversifications of the internet, people were compelled by circumstances to communicate but its spread has contributed to mute relationships. For example, it is quite possible to board a train or a plane but you will not communicate with the person seated next. This is only because that you may have a PC or tablet that you are using to surf the internet.
The transmission system is valuable in carrying the data while the receiver contributes by converting the received signals into data. In the final stage, the destination is critical in taking the incoming data. The purpose of this research is to focus on two critical communication protocols with the intention of understanding their effectiveness and efficiency in handling diverse responsibilities and obligations.
During a few decades until present, with the development of technology and science in China, it has undergone a dramatic change in culture structure and people’s lifestyle. It is acknowledged that political strategy will affect the improvement of domestic economy, and the overall development of one’s country is influenced by the economy. However, technology has gradually played an essential role in the world stage.
Cyberbullying can be described as defaming, insulting, threatening, or deliberately harassing other individuals via contemporary communication techniques. Such harassment is, in general, for protracted periods. Cyberbullying transpires on the Internet or over the telephone. In the majority of the instances, the offender, who is termed the bully, acts anonymously, and the victim fails to realize the source of such attacks.
To make any management decision, you must have the information necessary for this, usually quantitative. To do this, it is necessary to collect this data from all information systems of the enterprise, bring it to a common format and only then analyze it. For this, data warehouses are created.
Leadership is among the most important aspects that separate success from unsuccessful businesses. Although most organizations concentrate on the importance of operational success, it is impossible to realize better and efficient results through pioneering such activities under the supervision of leaders.