Consumer’s Perception of Risk of Online Transactions

23 Mar 2015 02 Jan 2018

19 (7,408 )

Abstract The purpose of this research is to investigate whether a consumer's perception of risk in transacting on the internet (Perceived Risk) would have an influence on their trust of a bank's e-banking website (Specific Trust) and their willingness to use e-banking. Data were collected from a survey and a usable sample of 202 was obtained. Hierarchical moderated regression analysis was used to test the model. The ...

Click here to read more arrow

Reusability of Object Oriented Interfaces in UML Diagrams

23 Mar 2015 02 Jan 2018

6 (2,145 )

I. INTRODUCTION In recent years, computer software is the single most important technology in the world. Software developers have continually attempted to develop new technologies due to the growing importance of computer software. In these developments some of them focused on a technology domain i.e. object oriented system/programming [22]. Metrics are difficult to collect and may not really measure the intended quality measures of software. Empirical validation ...

Click here to read more arrow

Impact of Information Technology Outsourcing

23 Mar 2015 02 Jan 2018

8 (2,927 )

Introduction Information Technology Outsourcing (ITO) will continue to have a major impact on all organizations and will over time increasingly becomes an integral part of the organizations strategy. Various aspects within the metamorphosis of ITO will be covered but not necessarily detailed. ITO has become a global phenomenon. Globalization with some distinct drivers in technology evolution has reshaped the market place and given rise to the advent ...

Click here to read more arrow

Can Man and Machine Exist Together?

23 Mar 2015 02 Jan 2018

6 (2,053 )

In John Durkin (2003)'s article Man & Machine: I wonder if we can coexist, Durkin speculates on the ability of a possible coexistence between human and intelligent machine. The title of the essay is misleading in that Durkin talks of machines existing with humans but what he really means if whether artificial intelligence (AI) capable machines and humans can coexist. The concept of AI is enchanting and ...

Click here to read more arrow

TCP/IP Network Protocol

23 Mar 2015 02 Jan 2018

6 (2,226 )

1. SYNOPSIS This report examines TCP/IP being used all over the world as a robust transmission protocol for networks. Robust transmission protocol is a protocol or system that has an ability to withstand changes in a procedure or recover from a range of exceptional inputs and situations in a given environment. The scenario here elaborates that a company called Microwave Infotech Ltd is setting up a LAN ...

Click here to read more arrow

ICT in Private and Government Organisations

23 Mar 2015 02 Jan 2018

6 (2,271 )

The term I.C.T, otherwise known as Information and Communication Technology, encompasses quite a wide range of the scope of multi-dimensional communication infrastructures and systems employed for enhancing effective communications in business and public organisation.  As implied by the abbreviation and also the full meaning of it, the said communication occurs at different levels and for different purposes, some of which has to be secured, but all of ...

Click here to read more arrow

Features and Benefits of Skype

23 Mar 2015 02 Jan 2018

4 (1,208 )

Introduction of Skype (voice unified communication) Skype is the most popular communication tool service in the world. The skype service comes with application software and softphone which suit the application so normally many people think that skype just only provide software which outcome the well service which they provide. The service also provide free or paid service with different kinds of program which can be use in ...

Click here to read more arrow

Vision 2020 in Malaysia - An Analysis

23 Mar 2015 12 Jun 2017

10 (3,710 )

Keywords: wawasan malaysia analysis, vision malasia analysis Abstraction To achieve a vision during a long time is very difficult because it needs a lot of means and also people's consent in order to be realized. Malaysia is the best example to learn how can achieve a strategic plan by studying its vision that called (wawasan 2020). In this article our group wants to give a general view ...

Click here to read more arrow

Computer-aided learning within education

23 Mar 2015 17 May 2017

13 (5,114 )

CAL stand for Computer Aided Learning and in many cases referred to as Computer Aided Instruction as well [Bachman, 1998]. An in depth review of the literature suggests that there is no concrete definition of CAL as such. Many researchers have explained what can be achieved by CAL and how it can be done but no one has really tried to define CAL. Computer Aided Learning in ...

Click here to read more arrow

Project failure in the software industry

23 Mar 2015 05 May 2017

10 (3,698 )

Introduction: Project failure is a common thing heard in the Software Industry in recent years. It has been observed that almost 50% of the projects in the Industry fail due to many various reasons. Research shows that Project failure is not due to one particular reason but many reasons contributing to it. The Standish Group [1995], found in their survey that of all the projects only 1/6 ...

Click here to read more arrow

Round-trip time (rtt)

23 Mar 2015 01 May 2017

5 (1,856 )

RTT: Round-Trip Time (RTT) can also be called as round-trip delay. It is to calculate how much time required for sending a packet or signal pulse from one source to a specific destination and comes back to the same specific source. RTT is one of the several factors that affecting latency and the time between the request for data and also the complete return or display of ...

Click here to read more arrow

Rapid growth of technology

23 Mar 2015 21 Apr 2017

8 (3,066 )

EXECUTIVE SUMMARY In the current season, the rapid growth of technology, communication and especially the large volume of information have led many companies and organizations to use IT systems for the management and the safety of information. The main objective of this project is to implement a complete security assessment of the private hospital «Elpis». The firms which effectively allocate their resources for the better understanding of ...

Click here to read more arrow

Software piracy: An overview

23 Mar 2015 21 Apr 2017

10 (3,709 )

SOFTWARE PIRACY IN AFRICA Software piracy is a combination of two different words which are software and piracy. Software can be defined as generic term for computer programs which operate the computer itself; Also Microsoft Encarta dictionary defined the word software as programs and applications that can be run on a computer system. Piracy can simply be defined as the unauthorized reproduction, doubling and distributing or use ...

Click here to read more arrow

HP computer systems organization

23 Mar 2015 18 Apr 2017

3 (1,011 )

1. Is this the time for HP-CSO to institute more changes? Based on the customer and sales audit it was identified that considerable opportunities existed in the area of Repurchase, replacement and expansion projects as well as the Innovation projects. But, there exist many challenges Customers were moving towards consolidating their supplier base increasing pricing pressure on HP 80% of the customer sales were initiated ...

Click here to read more arrow

Assembling personal computer’s hardware and software

23 Mar 2015 19 Jun 2015

10 (3,604 )

Assembling the Personal Computer Firstly, you will assemble the case. You will need to install the power supply, the motherboard, Graphic card, Microprocessor, Main Memory, Hard disk drive, Network Interface Card and so on are stand offs to hold in the motherboard. You will also need to connect some wires to the motherboard You will need to unwrap the motherboard and microprocessor chip. The chip will ...

Click here to read more arrow

Samsung semiconductors

23 Mar 2015

8 (3,104 )

Introduction Samsung Semiconductors is a leader in semiconductor electronics worldwide. Samsung Semiconductors is a leader in electronic components like DRAM and SRAM memory chips, flash memory components, thin-film transistor liquid crystal display (TFT-LCD) panels and screens, and system LSI products (digital technologies for home and mobile applications). These components are used in a wide range of applications, including computers, consumer electronics, and industrial equipment. Samsung semiconductors is ...

Click here to read more arrow

Hacking; dangerous effects on the society

23 Mar 2015

6 (2,298 )

Abstract Hacking is just like a cancer that has very dangerous effects on the society. Today in this modern world, where measures have been taken to improve the security level in the distributed systems hackers have found a way to crack into systems and take away information. In this paper, I will explain you few aspects of hacking that has caused of its existence and few techniques ...

Click here to read more arrow

Modelling and simulation using opnet modeller 14.5

23 Mar 2015

7 (2,538 )

4.1 Overview The aim of this chapter is to illustrate the modelling and simulation, using OPNET Modeller 14.5-Education version for the autonomic wireless network management. In addition, it will explain what kind of modifications and suppositions were necessary in order to achieve the autonomic self-healing mechanism, including agents' architecture and description. 4.2 Autonomic Management Agents This section will illustrate the modelling and simulation, using OPNET ...

Click here to read more arrow

IT Essay: National ID cards Ethical issues

23 Mar 2015

6 (2,087 )

National ID cards have long been advocated as a means to enhance national security, unmask potential terrorists, and guard against illegal immigrants. They are in use in many countries around the world including most European countries, Hong Kong, Malaysia, Singapore and Thailand. Currently, the United States and the United Kingdom have continued to debate the merits of adopting national ID cards. The types of card, their functions, ...

Click here to read more arrow

Decision support systems

23 Mar 2015

17 (6,431 )

Abstract Nowadays, Decision Support Systems has a significant role in almost all areas of life. These systems go further and use new technologies like data mining and knowledge and data discovery (KDD) to improve and facilitate human decision making. First of all we provide some definitions about decision making, models and processes. Afterwards, we discuss about knowledge and data discovery and also, Intelligent decision support systems. At ...

Click here to read more arrow

E-voting system

23 Mar 2015

22 (8,746 )

CHAPTER 1: INTRODUCTION Introduction Motivation Objectives The aim of this project is to design an e-voting system that makes use of Java and Bluetooth technologies. The specific objectives of this project are: To create voting software that using Java 2 Micro Edition (J2ME) that can run on any mobile devices which will act as server and clients. To develop Java 2 Micro Edition (J2ME) based voting ...

Click here to read more arrow

Software testing

23 Mar 2015

21 (8,162 )

1.0 Software Testing Activities We start testing activities from the first phase of the software development life cycle. We may generate test cases from the SRS and SDD documents and use them during system and acceptance testing. Hence, development and testing activities are carried out simultaneously in order to produce good quality maintainable software in time and within budget. We may carry out testing at many levels ...

Click here to read more arrow

Exploratory research

23 Mar 2015

10 (3,947 )

Exploratory Exploratory research is usually carried out when problem is not well identified or it has not been visibly defined as yet, or its real scale is as yet unclear. It allows the research person to collect the information as much as possible relating to a specific problem. Exploratory research helps conclude the best research design, data collection methodtechnique and selectionchoice of subjects, and sometimes it even ...

Click here to read more arrow

System analysis

23 Mar 2015

3 (1,001 )

4.1 Introduction System analysis is a major activity which takes place when we are structure a latest system or changing one. Analysis will help us to understand about the existing system and also will know the requirements necessary for the latest system. And if there is no accessible system then system analysis will defines only the necessity. In system analysis the most important factor is to identify ...

Click here to read more arrow

Risk management in project development

23 Mar 2015

13 (5,023 )

Risk Management In Software development Abstract: Risks are always associated with any kind of project development. It is important to identify and control the risks associated with any project as important it is to develop a project. Especially with software projects there are many unexpected problems which may hinder the software development process. It is crucial to control these risks from the technical development of components for ...

Click here to read more arrow

The importance of enterprise computing to enhance business performance

23 Mar 2015

8 (3,036 )

Introduction Nowadays Information technology has a rapid growth. Almost every day there are new ideas to improve the performance of technology. It cannot be denied that people who lives today unconsciously depends on technology. Each task did by the people gets many help from technology. For an instance, a hand phone that help us to communicate with our colleagues, the internet that serve certain time information for ...

Click here to read more arrow

New century health clinic

23 Mar 2015

9 (3,326 )

Background Five years ago, cardiologists Timothy Jones and Dolores Garcia decided to combine their individual practices in Fullerton, California, to form the New Century Health Clinic. They wanted to concentrate on preventive medicine by helping patients maintain health and fitness and by providing traditional medical care. Dr. Jones recently asked you to work with him as an IT consultant. He wants you to help New Century develop ...

Click here to read more arrow

E-commerce website

23 Mar 2015

28 (11,196 )

Introduction This document consists of a project designed to construct an E-Commerce website for a mobile phone store. Using different methodologies this report will explain in depth how the website was constructed and whether this project was a success. The website allows users shop online for mobile phones and mobile phone accessories. The website consists of many features, which aid the users in locating their desired item ...

Click here to read more arrow

Software engineering principles

23 Mar 2015

8 (3,151 )

Chapter 1 "Software is a great combination between artistry and engineering. When you finally get done and get to appreciate what you have done it is like a part of yourself that you've put together. I think a lot of the people here feel that way." Introduction This report discusses Software Engineering principles in context with Service-Oriented applications. Software Engineering covers a very vast area. It encourages ...

Click here to read more arrow

Intrusion detection system for internet

23 Mar 2015

21 (8,130 )

ABSTRACT The visibility to detect the rapid growth of Internet attacks becomes an important issue in network security. Intrusion detection system (IDS) acts as necessary complement to firewall for monitoring packets on the computer network, performing analysis and incident-responses to the suspicious traffic. This report presents the design, implementation and experimentation of Network Intrusion Detection System (NIDS), which aims at providing effective network and anomaly based intrusion ...

Click here to read more arrow

Data flow diagram

23 Mar 2015

6 (2,285 )

Data Flow Diagram DFD is a system modeling tool, the most popular and important representations in data flow modeling. DFD allows us to picture a system as a network of functional processes, connected to one another by "pipelines" and "holding tanks" of data. It is a structured, diagrammatic technique representing external entities, logical storage, data sinks and data flows in the system. You can also call DFD ...

Click here to read more arrow

Tisco (tata iron and steel company limited)

23 Mar 2015

3 (1,173 )

1. Introduction TISCO (Tata Iron and Steel Company Limited) is the world's sixth largest steel company which was established by Indian businessman Jamshetji Nusserwanji Tata in 1907. It is also the largest private sector steel company in India in terms of domestic production. The company is the fifth largest steel producer in the world as it produces 18 million tons of steel in India and 52.32 million ...

Click here to read more arrow

Visual cryptography

23 Mar 2015

6 (2,369 )

Introduction One of the popular solutions for image encryption is visual cryptography. Secret sharing concepts are used to encrypt a secret image into the shares (customized versions of the original image) which can be transmitted over an undeveloped communication channel and by overlapping shares, the secret message is obtained Visual cryptographic solutions are based on binary or binaries inputs. Due to this, natural images must be ...

Click here to read more arrow

Research proposal

23 Mar 2015

14 (5,308 )

Introduction The research proposal you are about to read is constructed in order to describe the research project I will execute. I will execute this research project in order to finalize the educational program ICT in Business at Leiden University. In this proposal I will give the objective and explain the methodology of this research. First, I will start with an introduction of the topic and the ...

Click here to read more arrow

Importance of information systems

23 Mar 2015

5 (1,633 )

Abstract: The following paper explains the importance of information systems in E-business and the limitations of information systems on the E-business. The report explicates different information systems used in E-business. Also the report gives the advantages and limitations of E-business and its resultant architectures. The discussion in the paper is limited to the information systems architectures, Advantages, Limitations and does not include the strategies in it. (http://www.aeablogs.org/eakd/files/Zachman_s_Original_1987_Paper.pdf)Introduction: ...

Click here to read more arrow

Sustainable information security policy in an organization

23 Mar 2015

8 (3,091 )

Introduction The purpose of this research paper is to investigate how organizations design sustainable information security policies. Designing a sustainable information security policy is one of the most important issues facing organizations today. It should not only be the first step in an organization's information security policy program but a continuing process to ensure the policy should be maintained of high quality, it is clear, comprehensive and ...

Click here to read more arrow
ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now