Archives For admin

In any kind of work or study, we always bring a certain set of beliefs as well as philosophical assumptions.  Qualitative researchers understand the importance of beliefs and theories that inform their work and also actively write about them in their research.  Continue Reading…

Hacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary.  There are other forms of hacking which are driven by other factors such as political reasons.  Continue Reading…

Just over a decade ago I began learning about web technologies and found myself learning basic HTML.  I was excited when I managed to publish my first website, which was no more than a basic homepage with some external links.  Continue Reading…

In 2007 I graduated from the University of Ulster’s new E-Learning masters program.  For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College. Continue Reading…

In their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification hackers have been placed into by different authors over the years. Continue Reading…

Drupal Ladder

Ian Carnaghan —  March 18, 2013 — Leave a comment

Last week I attended my first Drupal ‘learn sprint’.  For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal. Continue Reading…

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks.  The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the United States.  Continue Reading…

Mobile Security

Ian Carnaghan —  March 7, 2013 — Leave a comment

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications. Continue Reading…

Computer applications are constantly evolving; while web based systems continue to grow in complexity.  It is essential that these systems are properly secured both at the server level as well as at the code or application level, therefore Information Systems audits, more specifically focused on application and development measures provide some of the most useful valuable information at an organizations disposal. Continue Reading…

Illuminate

Ian Carnaghan —  March 3, 2013 — Leave a comment

Illuminate is the code name for a curriculum mapping project I am currently developing as part of my Doctoral thesis.  I will be using this part of the blog to document my progress as development progresses.  My plan is to have a version 1 of Illuminate completed by the spring of 2014. Continue Reading…