Artificial intelligence for cybersecurity: Literature review and future research directions - Kaur, Gabrijel?i? & Klobu?ar (2023) - How Is Artificial Intelligence Contributing to Cybersecurity?
Text commentary - 2 pages - Electronics, mechanics, engineering & technology
With the propagation of digital technologies, the menacing scene in cyberspace has become progressively multifaceted, imposing innovative tactics for fortifying networks and structures. The uprise of artificial intelligence (AI) has become an auspicious key to enhancing cybersecurity...
The Threats and Strategies in Information Security Management
Dissertation - 10 pages - Business strategy
In this digital age, cyber safety is an absolute necessity for individuals, organizations, and governments worldwide. Aside from that, the continuous emergence of new technology, which is the starting point of progress and convenience, makes hackers vulnerable almost everywhere, allowing...
Final Communications Audit Report for the Department of Homeland Security (DHS)
Case study - 7 pages - Communication
The Department of Homeland Security was created after the September 11, 2001, terrorist attacks, with the primary aim of securing the U.S. from terrorism and other threats to national security. DHS is a dynamic agency that has expanded to include a variety of tasks, such as border security,...
Why Hackers Win: Power and Disruption in the Network Society - Patrick Burkart and Tom McCourt (2019) - Evolution of hacking's perception
Book review - 5 pages - Sociology & social sciences
Why Hackers Win: Power and Disruption in the Network Society, written by Patrick Burkart and Tom McCourt, looks deeply into hacking as a central factor in creating what is referred to as the Network Society. The authors break away from the older images of hacking as a wholly unjustified and...
Data Security and the Benefits for Users and Companies
Dissertation - 7 pages - Electronics, mechanics, engineering & technology
In today's interconnected digital world, data becomes the life-sustaining fluid of every part of existence, whether we are talking about individual communications or global trade. (Lopez, 2023) illustrates that, ultimately, the role of the SOC becomes a validation of the importance of...
Investigating the Cybercrimes Related with IOT Based Home Appliances
Dissertation - 16 pages - Sociology & social sciences
This paper covers four areas: introduction, literature review, results and recommendations, and conclusion. In the introduction, the paper delineates its research objective: to identify cyber threats of IoT-based home appliances and to propose actions for their reduction. The literature review...
Kotter's Change Model - Change Scenario
Summary - 4 pages - Management
Change is inevitable in the current business landscape, which is unpredictable and characterized by rapid technological advances, economic shifts, constant innovations, increased competition, and other pressures. An organization's leadership is responsible for planning for and managing change...
Can the use of EHR in healthcare settings increase patient safety and efficiency of work?
Essay - 7 pages - Electronics, mechanics, engineering & technology
Electronic health records come at a time when the hospital environment is undergoing a revolution with the idea of fully utilizing the benefits of communication technology. This is driven by the need for quality and efficiency of work in the hospital environment through improved record-keeping...
Are Social Networks the Key to Our Happiness?
Essay - 2 pages - Medias
In this day and age, the younger generation is extremely present on social media, or on the Internet in general. Studies have proven that people from 16 to 24 years old spend 7h52 on every type of screen. The Internet became crucial in our lives. You can find the best or stupidest advice on it,...
Information Systems Capstone - Giverly
Case study - 10 pages - Finance
Giverly is a new-age fintech lifestyle company that empowers the community to earn cashback for charity platforms and converts everyday transactions into meaningful donations towards India's most pressing issues (Giverly, 2024). This report includes a detailed understanding of the challenges...
The Blockchain
Tutorials/exercises - 3 pages - Computer science
First of all, the blockchain's system is the main thing to understand, everything that is going to be in this document is related and depends on the blockchain's system. So, a blockchain is a decentralized database which allows everybody to see the transaction history. Those transactions have the...
Implementation of an EDRMS at CECE Consulting Inc
Case study - 7 pages - Electronics, mechanics, engineering & technology
CECE Consulting Inc., with office locations in New York, Los Angeles, and Chicago, runs its business in the non-stop evolving consulting market. Established in September 2023, the company has already delved into some of its operations that require sound document management systems due to the...
Encryption and Cryptography: Safeguarding Data Integrity and Confidentiality
Essay - 3 pages - Computer science
The security of data that is transmitted over networks and stored in devices is very important in the current world of digital operations, and it must be protected and remain intact. Encryption and cryptography are tools to protect data and ensure the possibility of verifying its integrity. The...
The National Security Agency's Role in Counterterrorism
Essay - 3 pages - International relations
The NSA's counterterrorism operations go beyond surveillance to include information assurance. Modern communication technologies are linked and may threaten national security. Thus, the Agency aggressively protects key infrastructure and networks from criminal actors. Reveron & Savage (2020)...
Financial Analysis - Airbus
Financial analysis - 24 pages - Finance
Airbus Group is the European leader in aeronautics, space and defense. The group was founded in 2000 following the merger of three companies of German, French and Spanish origin. It is present throughout the world and, along with the American Boeing, is positioned as one of the two leaders of...
Strategic Analysis and Recommendations for Techforge Inc.
Case study - 7 pages - Business strategy
TechForge Inc. is at a critical point in its strategic journey through the ever-changing technology industry. The Board directed our group to lead a revision of a strategy aimed at enabling it to compete effectively in this dynamic marketplace. The document discusses the current situation,...
The Role of FinTech in Transforming the Landscape of Banking
Dissertation - 10 pages - Bank marketing
The rapid growth of financial technologies (FinTech) is transforming and reshaping the future of banking services. With digital platforms replacing conventional methods of providing banking services globally, Fintech has evolved the application of innovative technologies in finance to develop...
Enterprise Risk Management (ERM) Framework - Boohoo
Case study - 5 pages - Management control
Boohoo Group's ERM framework demonstrates alignment with the principles and processes outlined in ISO 31000: Year-2018. The company has formalized a structured procedure to detect, measure, treat, and supervise risks across the business, which symbolizes a remarkable risk management high...
Fintech: Between Synergy and Power Struggle in the Banking and Financial Sector
Dissertation - 38 pages - Business strategy
This thesis examines the future of fintech integration within a complex financial ecosystem. It explores the impact that these have and will have in the future on the market. Through a literature review divided into three research questions combined with a qualitative approach, we will try to...
Social Media as a Strategy for Protest Movements in an Era of Government Control - Hong Kong And Sudan Case Studies
Dissertation - 11 pages - Sociology & social sciences
By facilitating instantaneous global communication among geographically dispersed audiences, digital media has fundamentally altered information production and dissemination processes. As a result, more people are able to access information and news, which may be a powerful instrument for...
Policy Evaluation Briefing - Social Engineering
Presentation - 4 pages - Sociology & social sciences
This briefing will evaluate the current policies available to tackle social engineering. Social engineering has become a menace in the world of technology today and affects almost everyone who uses technology. Technology has evolved rapidly over the past couple of decades, causing cybercrimes to...
SWOT Analysis - Boeing
Case study - 5 pages - Automotive marketing
With its official name 'the Boeing Company', Boeing is an American company based in Chicago that operates in the aircraft and aerospace manufacturing sectors. Boeing relies mostly on the construction of civilian aeroplanes, helicopters, satellites, military aircraft, etc. In this area,...
Components of an Information System using the Five-Component Framework
Essay - 2 pages - Business strategy
The principle of the five-component framework is to present information systems systematically. It consists of both physical elements like hardware and software along with data, procedures, and people. Hardware consists of physical devices like computers, servers, networking devices, and the...
How to create an e-commerce website?
Practical guide - 21 pages - Digital & e-marketing
If an online store is to effectively acquire and retain customers, it must deliver the best possible customer experience. The key to doing this is to connect with customers at all possible touch points. The experience has to be great every time to keep customers coming back. The most important...
Green & Sustainable IT
Case study - 4 pages - Digital & e-marketing
Green computing, also known as green IT, has gained recognition and support from various stakeholders in the world, including governments, businesses, and consumers. Many governments around the world have implemented policies and regulations to encourage the adoption of green computing practices,...
E-Business - Established retailer adopting e-commerce
Case study - 10 pages - Digital & e-marketing
Nordstrom is a fashion outlet that sells clothes, shoes, and accessories for men, women and kids. It was created by John Nordstrom in 1901 with the aim of providing quality products to all its customers. Nordstrom exists in Canada and 40 states in the United States with 117 stores and 248 rack...
SWOT Analysis - Microsoft
Case study - 5 pages - ICT marketing
Microsoft is an American multinational computer company that was founded in 1975 by Bill Gates and Paul Allen. The American brand is among one of the largest manufacturers of operating systems, video games, software, phones, tablets, computers, and more. Microsoft is the creator of several...
Navigating the Hybrid Threats of the Paris 2024 Olympics: How Can Future Olympic Games Handle These Challenges?
Tutorials/exercises - 3 pages - Sports
The Olympic Games represent a major security issue. Indeed, two years before the event, French authorities are already working hard to make Paris safe for the hundreds of thousands, even millions, of people who should gather there for the Olympic Games. In 2021, the Minister of the Interior...
Anatomy of the Russian disinformation campaign: understanding the complexity of a covert network as part of state policy and a military tool against Europe
Tutorials/exercises - 73 pages - Journalism
About two decades ago, it was impossible to imagine that foreign disinformation could actually affect the policy decision making or disturb social cohesion and solidarity in European countries. Back then, media outlets such as television, radio stations and newspapers enjoyed munificent funding...
White-Collar Crimes
Case study - 2 pages - Linguistics & languages
White-collar crimes refer to non-violent crimes committed by individuals, typically in a professional or business setting, for financial gain or to obtain some form of advantage. These crimes are often carried out through deception, manipulation, or abuse of trust. Some common types of...