Software Essays (Examples)

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Software Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

C Suite Executive Leadership And Ethics

Pages: 9 (2693 words) Sources: 7 Document Type:Essay Document #:16009984

… training, the human resources department participates in the process of engagement and motivation that minimizes conflict. Three years ago, Linden’s company invested in software systems for employee training and also in public speakers designed to improve the moral character and outlook of employees. Intrinsic motivation comes from ……

References

References

Bailey, C. & Shantz, A. (2018). Creating an ethically strong organization. MIT Sloan Management Review. http://ilp.mit.edu/media/news_articles/smr/2018/60101.pdf

Crossan, M., Mazutis, D. & Seijts, G. (2013). In search of virtue. Journal of Business Ethics 113(4): 567-581.

Hatcher, T. (2008). The value of values in the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Charlotte: IAP, pp. 97-122.

Hoekstra, E., Bell, A. & Peterson, S.R. (2008). Humility in Leadership: Abandoning the Pursuit of Unattainable Perfection. In S.A. Quatro & R. R. Sims (Eds.), Executive Ethics: Ethical Dilemmas and Challenges for the C-Suite. Greenwich, CT: Information Age Publishing, pp. 79-96.

MacDougall, A.E., Bagdarasov, Z. & Buckley, M.R. (2008). Applying a primary risk management model to the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Second Edition. Charlotte: IAP, pp. 211-234.

Martin, R. (2011). The CEO\\\\'s ethical dilemma in the era of earnings management. Strategy & Leadership 39(6): 43-47.

Schwartz, M.S. (2013). Developing and sustaining an ethical corporate culture: The core elements. Business Horizons 56(1): 39-50.

Studyspark

Study Document Study Document

Supply Chain Management In Canada

Pages: 11 (3384 words) Sources: 2 Document Type:Case Study Document #:46307784

… $36 million needs to be signed. It requires low-cost ready to assemble furniture like that which McCray can produce using its new CAD software. It will mean, however, reducing the footprint of Krebbler’s.
2. Environmental analysis reveals that margins are being squeezed by the low costs of ……

References

Bibliography

Channick, Robert. “Fallout from China Trade War,” Chicago Tribune, 2019.  https://www.chicagotribune.com/business/ct-biz-china-tariffs-illinois-impact-20190510-story.html 

Krebbler Furniture Case Study, Supply Chain Management Association. Digital File.

Studyspark

Study Document Study Document

Future Changes And Challenges Within The Elderly Population

Pages: 8 (2481 words) Sources: 6 Document Type:Term Paper Document #:55013992

...Software Introduction
The elderly population, like every other population in the world today, can benefit from changes that have occurred in the world thanks to technological revolutions. The Internet, for instance, has allowed a virtual world to emerge that rivals the real world in terms of social opportunities. News spreads instantly thanks to the Internet, and people can communicate with one another and retrieve information more easily today than at any point in human history. Technology can thus be used to address some of the changes and challenges within the elderly population today. Those changes and challenges include changes in environment as the population moves into assisted living and combating isolation and depression, which can occur in this population. Likewise, because of the nature of the globalized world it is more likely that this population will be more diverse than it has been in the past, which means there will be……

References

References

Aging and Disability Services. (2013). Promote Healthy Aging. Retrieved from http://www.agingkingcounty.org/healthy_aging.htm 

Baker, T. A. (2014). The importance of aging studies: Understanding the influence of diversity and culture. Age Culture Humanities: An Interdisciplinary Journal (1). Retrieved from  http://ageculturehumanities.org/WP/the-importance-of-aging-studies-understanding-the-influence-of-diversity-and-culture/ 

Banks, M. R., Willoughby, L. M., & Banks, W. A. (2008). Animal-assisted therapy and loneliness in nursing homes: use of robotic versus living dogs. Journal of the American Medical Directors Association, 9(3), 173-177.

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Cornwell, E. Y., & Waite, L. J. (2009). Measuring social isolation among older adults using multiple indicators from the NSHAP study. Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 64(suppl_1), i38-i46.

Landeiro, F., Barrows, P., Musson, E. N., Gray, A. M., & Leal, J. (2017). Reducing social isolation and loneliness in older people: a systematic review protocol. BMJ Open, 7(5), e013778.

Liu, S. J., Lin, C. J., Chen, Y. M., & Huang, X. Y. (2007). The effects of reminiscence group therapy on self-esteem, depression, loneliness and life satisfaction of elderly people living alone. Mid-Taiwan Journal of Medicine, 12(3), 133-142.

Moore, E. G., & Rosenberg, M. W. (2001). Canada's elderly population: the challenges of diversity. Canadian Geographer, 45(1), 145.

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

...Software Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS
Introduction
Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to use equipment and the importance of protecting passwords is so important (Jackson, 2018). However, the system itself should have system protections built-in that can protect against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

...Software Optimizing Merged Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, 2019). These types of problems are further compounded when there are sophisticated information systems involved that must also be merged successfully. The purpose of this paper is to explicate the responsibilities involved in implementing a health information system (HIS) that meets current Health Information Technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this end, a discussion and analysis of health information systems, a description concerning how a system will affect patient care and documentation and an explanation concerning how using a system to access information will affect the quality……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

...Software Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment processing and customer data.
The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the deployment in the ABC system. It combines traditional firewall with other network devices that filter unauthorized network protocols. In a distributed system where traffic is passed through different nodes,……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

Volkswagen Emissions Fraud

Pages: 4 (1299 words) Sources: 4 Document Type:Essay Document #:48904563

...Software Decisions Influenced by Bias
Volkswagen produced vehicles that were equipped with emissions controls that were designed to shut off once the cars had passed regulatory tests. As s result, not only did the cars pollute more in real life than in those tests, but the company benefitted from these tests financially, because they showed that diesel engines were less polluting than gasoline ones. The result was misleading the public, making the company eligible for subsidies that gave it competitive benefit, and misleading the public, as many people may have chosen to buy a Volkswagen in part based on the emissions performance of the vehicles (Parloff, 2018).
Biases at Play
There were a few different biases at play in the Volkswagen case that can be unpacked. The first of these is the bias towards the optimal motivations of executive action. The company’s senior executive at the time, Martin Winterkorn, was aware……

References

References

Ganti, A. (2019) Rationcal choice theory. Investopedia. Retrieved January 18, 2020 from  https://www.investopedia.com/terms/r/rational-choice-theory.asp 

Palmiter, A. (no date). Corporate governance as moral psychology. In possession of the author.

Parloff, R. (2018) How VW paid $25 billion for dieselgate – and got off easy. Business Ethics. Retrieved January 18, 2020 from  https://business-ethics.com/2018/02/08/1638-how-vw-paid-25-billion-for-dieselgate-and-got-off-easy/ 

Smith, A. (2018) Volkswagen ex-CEO charged with fraud in diesel emissions scandal. CNN. Retrieved January 18, 2020 from  https://money.cnn.com/2018/05/03/news/companies/winterkorn-vw-diesel-scandal/index.html 

Studyspark

Study Document Study Document

Role Of The Nurse Informaticist In Systems Development And Implementation

Pages: 3 (974 words) Sources: 3 Document Type:Essay Document #:72698912

...Software Introduction
Nurse Informaticists (NIs) are responsible for aiding computer programmers who develop nursing systems in planning and implementing computerized nursing systems. NIs ought to assist computer technocrats with analyzing issues, and put forward a computerized solution with desired results. SDLC (System Development Life Cycle) represents discrete steps followed by system developers for designing, troubleshooting and executing systems needed by clients (McGonigle and Mastrian, 2015). Within the healthcare domain, system development encompasses needs evaluation that involves doctors and other healthcare practitioners, legal aspects, environmental challenges, and technological elements impacting the domain of healthcare.
Planning and requirements definition
Planning represents the ideal instrument for guaranteeing the success of all operations. The nursing leader within the context of system development presents system developers with the intended system plan. Developers ought to then utilize the details available for planning the ideal system development strategy (Massey and Satao, 2012). Defining of requirements entails identification of……

References

References

Massey, V., & Satao, K. J. (2012). Evolving a new software development life cycle model (SDLC) incorporated with release management. International Journal of Engineering and Advanced Technology (IJEAT), 1(4).

McCormick, K., & Saba, V. (2015). Essentials of nursing informatics. McGraw-Hill Education.

McGonigle, D., & Mastrian, K. G. (2015). Nursing informatics and the foundation of knowledge (3rd ed.). Burlington, MA: Jones and Bartlett Learning.

Studyspark

Study Document Study Document

Intellectual Property Ethics

Pages: 3 (941 words) Sources: 3 Document Type:Essay Document #:57117856

Intellectual property can be described as any exceptional product of human intellect or the mind. Some common examples of intellectual properties include software, music, symbols, movies, designs, symbols, words and phrases. Similar to other properties, intellectual property is safeguarded by relevant laws that seek to protect ……

References

References

Burris, E. (n.d.). Legal and Ethical Issues with Intellectual Property. Retrieved from University of Missouri-Kansas City website: http://sce2.umkc.edu/BIT/burrise/it222/notes/ip.html

Federal Bureau of Investigation. (n.d.). Intellectual Property Theft/Piracy. Retrieved from U.S. Department of Justice website:  https://www.fbi.gov/investigate/white-collar-crime/piracy-ip-theft 

Maya, J. (2015, April 15). Music’s “Blurred Lines” Verdict Broadens Copyright Protection. Retrieved Florida International University website:  https://law.fiu.edu/blurred-lines-verdict/ 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".