Computer Security Essays (Examples)

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

… valuable insights to decision-makers looking for data points to inform their decision processes. The growth of Big Data has necessitated the development of computer algorithms and tools that can analyze the data at scale. Good analysis and interpretation of the data allow organizations to ‘co-create’ solutions alongside …
Big Data Opportunities
Traditional data management tools and models have posed several challenges to the finance industry in the past in terms of security and inefficiencies. One of the major security issues is fraudulent activity by insiders and outsiders. With the world increasingly becoming more connected, outsiders acting in bad faith such as hackers … The traditional models do not have the systems required to secure digital assets as hackers become more advanced by the day. Therefore, this security problem should be overcome as soon as possible because of the tremendously big risk it poses to the financial services sector. The……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Workplace Trends And Changes

Pages: 7 (2170 words) Sources: 5 Document Type:Term Paper Document #:67790748

...Computer security Introduction
Three big trends impacting the workplace are 1) the effects of the #MeToo Movement and the need to implement policies to protect workers against sexual harassment, 2) the role that AI is playing in the workplace and the impact it is having on issues such as worker privacy, and 3) the problem of politics and how there may be gaps between the type of culture the administration wants to cultivate and the socio-political beliefs of some of its workers. For instance, Google has recently come under fire for demonstrating bias against conservative workers whose socio-political views do not reflect that administration’s Left-leaning politics (Ghaffary). This paper will discuss these trending issues, how they might impact the role of the administrative professional and the support they provide and how the administrative professional can positively influence any of the changes required as a result of the current issues as they give……

References

Works Cited

Ghaffary, S. Political tension at Google is only getting worse. Vox, 2019.  https://www.vox.com/recode/2019/8/2/20751822/google-employee-dissent-james-damore-cernekee-conservatives-bias 

Kreager, Derek A., and Jeremy Staff. "The sexual double standard and adolescent peer acceptance." Social psychology quarterly 72.2 (2009): 143-164.

Nilsson, Warren. "Positive institutional work: Exploring institutional work through the lens of positive organizational scholarship." Academy of Management Review 40.3 (2015): 370-398.

O'Neil, Adrienne, et al. "The# MeToo movement: an opportunity in public health?." The Lancet 391.10140 (2018): 2587-2589.

PLBSH. Yes, Men Can Be Sexually Harassed In The Workplace. PLBSH, 2019.  https://www.plbsh.com/yes-men-can-be-sexually-harassed-in-the-workplace/ 

Wong, N. & Chin, Y. “Issues and Challenges Faced by Generation X While Managing Generation Y.” International Journal of Business and Social Science 7.2 (2016): 167-170.

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

… for an…[break]…latest in ID technology software so that people could not abuse the system to receive funds, for example, from welfare or Social security, that are not actually due to them. This system would enhance the existing system and reduce the scale and scope of errors and … and nurses to check up on patients without patients have to leave their homes. Doctors and patients connect over the Internet using their computer to contact one another, exchange information and so on. It can improve the quality of care that people receive in the community.
Finally, ……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Computer security Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

Natural Science Health And Nutrition

Pages: 9 (2735 words) Sources: 5 Document Type:Essay Document #:29717647

… too much candy and pre-packaged foods. I looked at my after school and work activities and they consisted of me sitting at a computer or watching television. My goals were to change up these eating and exercising habits.
I did not keep any journals, not formally speaking, ……

References

References

Bray, G. A., Nielsen, S. J., & Popkin, B. M. (2004). Consumption of high-fructose corn syrup in beverages may play a role in the epidemic of obesity. The American Journal of Clinical Nutrition, 79(4), 537-543.

Davis, B. (2008). Defeating Diabetes: Lessons from the Marshall Islands. Today’s Dietitian, 10(8), 24.

Heart. (2020). Cholesterol. Retrieved from  https://www.heart.org/en/health-topics/cholesterol/hdl-good-ldl-bad-cholesterol-and-triglyceride s

Heart Monounsaturated Fat. (2020). Retrieved from  https://www.heart.org/en/healthy-living/healthy-eating/eat-smart/fats/monounsaturated-fat s

Malik, V. S., Popkin, B. M., Bray, G. A., Després, J. P., Willett, W. C., & Hu, F. B. (2010). Sugar sweetened beverages and risk of metabolic syndrome and type 2 diabetes: a meta-analysis. Diabetes Care,  https://doi.org/10.2337/dc10-1079 

Studyspark

Study Document Study Document

Terrorist Group IRA

Pages: 8 (2476 words) Sources: 8 Document Type:Essay Document #:71228383

… and an unstructured interview approach will be used to conduct the interviews. The interviews will be recorded using video recording software on the computer and this will allow for the responses to be transcribed and examined in detail. By exploring the responses in this manner a fuller ……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Bell, J. B. (2008). The Secret Army: The IRA. London: Transaction Publishers.

IRA Green Book. (1977). Accessed 14 Dec 2015 from  https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf 

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

O’Brien, B. (1999). The Long War: The IRA and Sinn Fein. NY: Syracuse University Press.

Rooney, N. (2007). Violent nationalism in catholic communities: The Provisional IRA and ETA. Studies in Ethnicity and Nationalism, 7(3), 64-77.

Shanahan, Timothy. (2008). The Provisional IRA and the Morality of Terrorism. UK: Edinburgh University Press.

Taylor, P. (2001). Brits. UK: Bloomsbury Publishing.

Studyspark

Study Document Study Document

Electronic Health Records EHR

Pages: 8 (2498 words) Sources: 4 Document Type:Essay Document #:76313206

… among various agencies and offices (Hasanain, 2014). The role of EHRs is getting to be expanding persuasive as progressively tolerant data winds up computer and bigger quantities of customers express a need to have portable access to their health records. It is an electronic form of a … to other health frameworks, gets the standardized summary(C-CDA) and fuses the new information inside the patient's record. Furthermore, ‘Care Everywhere’ can get a computer solicitation and send the synopsis to the requesting health framework. The association that is at presents observing the patient can send the C-CDA ……

References

References

Gagnon, D., Simonyan, E.K., Ghandour, G., Godin, M., Labrecque, M., Ouimet, M.R. (2016). Factors influencing electronic health record adoption by physicians: A multilevel analysis, Int J Inform Manage, 36, pp. 258-270.

Hasanain, H. (2014). Cooper Solutions to overcome technical and social barriers to electronic health records implementation in Saudi public and private hospitals, J Health Inform Dev Ctries, pp. 46-63.

Kierkegaard, P. (2019). Electronic health record: Wiring Europe\\\\'s healthcare: Computer Law & Security Review. 27 (5): 503–515.

Murphys, E.V., & Yale, J. (2014). Clinical decision support: effectiveness in improving quality processes and clinical outcomes and factors that may influence success. Biol Med; 87, pp. 187–97.

Join thousands of other students and

"spark your studies".