Tuesday, May 19, 2020

Information System Project Management Project - 1178 Words

Introduction: As we know that INFORMATION TECHNOLOGY plays an important role in organizations for their operations so organizations make generous investments on information technology projects. It is vital to minimize the different dangers identified with those tasks. According to researches held previously more than 75% of the projects are failing, most probably one out of five information system projects will succeed. Project management is a difficult process to handle result of the project depend upon the system analyst or project manager they should identify the risk factors of the project before starting the project. The main reason of failure of information system projects is the change in the requirements. Information system†¦show more content†¦Project Management is an important and tough skill for the business analyst, the target of the project management is to deliver the customer expectations with budget and in time. The project manager is the system analyst who have control all the aspects of the project to solve all the problems he should have multi skills like management, customer relationship, leadership and technical and he is responsible for initiating planning executing and closing the project and he is responsible for t he project. As a project manager should maintain the project he has to solve the different types of problem sometimes it may be technical and sometimes it may be leadership he should ready to face any type of problem in the project. In some organizations there is only one project manager who is very experienced system analyst while some organizations has two analysts senior and junior both of them involves in managing the different parts of the project and in some organization actively supporting senior employee acts as a project manager. Providing the required resources by the organization is also an important factor to succeed in the information system project without providing the resources team members or project manager can do nothing like when the project is very huge and company does not provides the required team members then ultimately the project leads to fail. Planning is the basement of the project. In planning stage they should find out the

Wednesday, May 6, 2020

The Concept of E-Commerce regarding the Economic Development and Busin Thesis

Essays on The Concept of E-Commerce regarding the Economic Development and Business to Business Relations Thesis The paper â€Å"The Concept of E-Commerce regarding the Economic Development and Business to Business Relations† is an affecting example of a thesis on e-commerce. The fiercely competitive marketplace has just got tougher with the global recession. Companies have to focus on marketing their core competencies strategically to retain existing customer loyalties and get new customers. The internet is a powerful marketing tool that can save a lot of resources if used wisely.There is always an attachment of new technology to the growth of Business and economy. There has been a lot of doubt about the role of e-commerce in the overall economic activities. The implications of e-commerce to the growth of the economy are the subject matter. The impact of e-commerce on the various segments like agriculture, labor market, transportation and other forms of the economy has to be understood in detail.  History of E-commerceThe growth of e-commerce had several steps. The development of the Electronic Data Interchange was the first step. (‘Electronic Data Interchange – EDI’ )The Electronic Data Interchange was a set of standards that were developed in the year 1960s and that was developed mainly to exchange information and do transactions in electronics. There were several Electronic data Formats that the various forms of business could use and in the year 1984. the ASC X12 standard was considered to be more stable and reliable when it came to transferring large amounts of data and transactions. The growth of electronic fund transfer was an added advantage for the growth of e-commerce.The Mosaic web browser came to existence in the year 1992. The browser specialty was that it was the first point and click browser that was released. The change made into Mosaic was that it became a fast downloadable version of Netscape that allowed faster access to e-commerce transactions and dealings. (Suijker, Frans)The development of e-commerce had an impetus when the DSL was developed. The DSL allowed quicker access to the internet and the connection was persistent of the internet. The first big sale season of e-commerce can be said of the 1998 Christmas and that season had seen American Online, AOL recording a sale of more than 1.2 billion in the 10-week shopping. ( Weisman, John)The development of free software under Red Hat Linux had given the impetus to the growth of e-commerce. Linux was an open-source platform when compared with Windows and it was considered reliable. The increased competition meant that Microsoft started investing more in e-commerce platforms. (Weisman, John, part 11)The other major step in the development of e-commerce can be said to Napster and this is a site that is used to share music for free. The increased use by consumers meant that the dictation was being forced on the industry.In early 2000, there was a major merger between AOL and Time Warner and it was worth $350 million and that bought together an online c ompany with a traditional company. This was the major push for e-commerce. Hackers were able to attack the major players of e-commerce like Yahoo, E-bay, and Amazon in February 2000. The attack by hackers stressed the need for increased security for e-commerce sites. ( Laudon, Kenneth C, Traver, Carol Guercio)

Digital Forensics Digital Evidence Storage and Preservation

Question: Discuss about theDigital Forensicsfor Digital Evidence Storage and Preservation. Answer: Introduction: Nowadays the use of the digital technology is everywhere. In the area of the evidence storage and prevention, use of the digital technology is very popular in the recent time. In the context of the digital data, two concepts, cultural data and personal data is very important. It has been observed that the most of the people consider the digital forensic as one of the primary factor of the investigation of crime (Casey et al. 224). However, the practice of the digital evidence storage and protection is used in various sectors. It is providing lots of facilities for investigating and protecting the data from the past time. Forensic computing and computer forensics are seen as similar two technologies by the users, and can be distinguished from computational forensics, which is directed at the use of computing technology in forensics generally (Ashcroft, Daniels and Hart). Digital forensics is an extension of computer forensics, incorporating not only computers but any digital electroni c technology, from mobile phones to printers. In this research project, the applications of the chosen technology will be investigated. The benefits, challenges and other important factors associated with the research area will be investigated and analyzed in this research study. Aims and Objectives: The main aim of this research study is to find out the effectiveness of the applications of the digital evidence based practices in the various areas. The objectives of the research study will be the followings: To understand the different types of applications of the digital evidence based practices To analyze the effectiveness of the different types of available uses of the digital evidence storage and protection To understand the potential challenged associated with the use of the digital evidence practices in the different areas To provide some suitable suggestion for the proper use of the digital evidence storage and protection systems Justification Behind the Selection of this Topic: The chosen topic is about an updated technology which is very popular and currently using in many sectors. The digital technology is very helpful for the evidence storing and protection, but the technical tools should be used in proper way (Loren and Mercer). The research work in this topic will help to understand the different types of uses of the technology in the concerned field. The use of digital forensic helps in the authentication of the evidence using various biometric tools and cryptographic token. The digital evidence helps in maintaining the integrity and control the access of the documents of forensic files that helps in improving the accuracy and authenticity of the information (Hosmer, Chet). Therefore, the undertake study will help in evaluating the significant process for preserving the digital evidence. "Digital Evidence: How ItS Done exclaimed that the analysis of the digital evidence needed to be conducted by a specialised person who have been trained in the particular area. It has been difficult for the local law enforcement to keep track of the number of electronic devices and technologies currently in use. The digital forensic has changed the environment of the various types of forensic investigations in a dramatic way. The research work will help to understand the different types of changes introduced in the area of the forensic investigations (John, Daniels, and Hart). The idea regarding the upcoming updates of the forensic investigations also can be analyzed by forecasting the technical facilities associated with the digital forensic. Contribution: The main areas that will be covered in the research study are application of the digital evidence storage and prevention in cultural heritage, academic research, crime investigation and storing the personal archives. The research study will be contributed in two major areas; one is the area of the academic research area and the other is the organizations that are using the technology. The results of the research study will help the future academic researchers to use these as the empirical data. In case of different crimes, the conducted study will help the investigators to evaluate to obtained the required information in right time for targeting the pre-and post crim information from the devices used during the crime. Digital Evidence: A Short Guide Irecord cited that in many cases, the evidence collected in the forensic investigation are ether lost or damaged. Evaluating the particular process for sharing and storing information in a secure manner will assist the law enforcement in preventing the break in the chain of custody. The business organizations will understand the various types of uses of the digital evidence storing and protection in efficient ways. At the end of the research study, some recommendations will also be given which will help the organizations to find out the better ways of utilizing the digital technology for string and protecting the evidences. Design: In order to use the digital evidence the design of the proper equipments is essential. Some common forms of the digital evidences are CCTV footage, text messages, emails, media files (image, audio, video), spreadsheets, message logs, history records etc. The tools of the information technology (computers and internet connections) are the essential parts of using the digital evidences in forensic investigations. In the designing step a useful database management system need to be developed for the effective level of digital evidence handling. Use of the DVD, CD, floppy disk and USB sticks are very common for the collection of the digital evidences from one computer system to another. Its just treated like a digital data. There are lots of different areas where the digital evidences are required regarding the forensic investigations. In this context, the involvement of proper expert who is well aware about the type of data needed to be handled is required. According to Marshall and Angus, there are two types of systems that can be used for the digital evidence handling. They are open system and closed system. In the open system the computer system is connected to the internet through the public network. On the other hand the closed systems are never connected to the internet. As per Loren and Mercer, connectivity with the internet converts a closed system to an open system. Implementation / Methodology: The methodology of using the digital evidence handling system can be subdivided into several sections like planning, capturing, storing and analysis. The planning stage is about the strategy of how to capture the data. As previously discussed, the digital data may have various forms. In this context, it is necessary to make the plan depending on the types and sources of the data. In this stage, the consideration of the associated legislations is also important. Depending on the data type, the devices that will be used for data capturing are also decided (Preserving And Protecting Computer Evidence). In the capturing section, proper devices are used for capturing the dat. For example, in case of crime scene investigation, the photographs are taken by using the digital camera. In some cases, some evidences are captured through the audio recorders. In this area, the uses of the modern mobile phones are very popular. In some special cases, some specific forensic toolkits are also used for capturing the digital data (Ashcroft et al. 54). After capturing the data, it is important to store those data securely in digital format. This work is done by using the security tools of the information technology. Usually, the database management systems are used for the storing and handling of the digital evidences. In the final stage, the digital evidences are analyzed by using the computerized forensic tools. Some applications of critical thinking depending on the situations are also required for the analysis of the data or digital evidences. Issues: While handling the digital evidences, it is very important to have an efficient user for handling those. The person who may handle the evidences should be well aware about the database system using of the digital evidence handling purpose. Some minor mistake may cause a great damage to the digital evidences. Another major issue is the security. In most of the cases, the forensic evidences are confidential (Digital Evidence: How Its Done). There are some security issues, especially in the open system because of the internet threats and hackers. The users also need to avoid the unauthorized access to private data as per the legislations of the service area. Conclusion: The digital technology is one of the most updated technologies across the globe which has changed the dimension of handling the data and information in many sectors. The research work in the area of the evidence collection and protection will help to understand the different types of advance use of the digital technology in the area of the important evidence storing and securing. The research work will contribute some effective information for the organizations that are using the digital technology for this purpose and the future researchers in the academic field. Future Work: The results of the research study can be used in the further research studies on future as the empirical data. At the end of the research study, some recommendations will be given in the area of the applications of the research topic. Future research works can be done to investigate the efficiencies of the given recommendations. Bibliography: "Digital Evidence: A Short Guide - Irecord". iRecord. N. p., 2015. Web. 1 Dec. 2016. "Digital Evidence: How ItS Done". Forensicsciencesimplified.org. N. p., 2016. Web. 1 Dec. 2016. "Preserving And Protecting Computer Evidence". Electronicevidenceretrieval.com. N. p., 2016. Web. 1 Dec. 2016. Al Fahdi, M., Nathan L. Clarke, and Steven M. Furnell. "Challenges to digital forensics: A survey of researchers practitioners attitudes and opinions."2013 Information Security for South Africa. IEEE, 2013. Ashcroft, John, Deborah Daniels, and Sarah Hart. "Forensic Examination Of Digital Evidence: A Guide For Law Enforcement". (2004): n. pag. Print. Breitinger, Frank, et al. "Towards a process model for hash functions in digital forensics."International Conference on Digital Forensics and Cyber Crime. Springer International Publishing, 2013. Casey, Eoghan, Andrew Blitz, and Christopher Steuart. "Digital Evidence and Computer Crime." (2014): 224. Flick, Uwe.Introducing research methodology: A beginner's guide to doing a research project. Sage, 2015. Gast, David L., and Jennifer R. Ledford.Single case research methodology: Applications in special education and behavioral sciences. Routledge, 2014. Hosmer, Chet. "Digital Evidence Bag". Communications Of The Acm 49.2 (2006): 69-70. Print. Loren, D and M.F.S Mercer,. "Computer Forensics Characteristics And Preservation Of Digital Evidence". FBI Law Enforcement Bulletin (2004): n. pag. Print. Marshall, Angus M. "Digital Forensics Digital Evidence In Criminal Investigation". A John Wiley Sons, Ltd., Publication (2008): n. pag. Print. Nance, Kara, Matt Bishop, and Amelia Phillips. "Introduction to Digital Forensics--Education, Research, and Practice Minitrack."System Sciences (HICSS), 2013 46th Hawaii International Conference on. IEEE, 2013. Roussev, Vassil, Candice Quates, and Robert Martell. "Real-time digital forensics and triage."Digital Investigation10.2 (2013): 158-167. Sang, Ting. "A log based approach to make digital forensics easier on cloud computing."Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on. IEEE, 2013. Silverman, David, ed.Qualitative research. Sage, 2016. Simon, Matthew, and Kim-Kwang Raymond Choo. "Digital forensics: challenges and future research directions."Simon M and Choo KK R(2014): 105-146. Taylor, Robert W., Eric J. Fritsch, and John Liederbach.Digital crime and digital terrorism. Prentice Hall Press, 2014. Taylor, Steven J., Robert Bogdan, and Marjorie DeVault.Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons, 2015.