All Stories

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur...
Ian Carnaghan
9 min read

Mobile Cybersecurity Policies in the Private and Public Sector

“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones...
Ian Carnaghan
10 min read

Philosophical Assumptions for Qualitative Research

In any kind of work or study, we always bring a certain set of beliefs as well as philosophical assumptions.  Qualitative researchers understand the...
Ian Carnaghan
1 min read

Hacking as an Addiction

Hacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary.  There are other...
Ian Carnaghan
1 min read

Motivation and Intent of Hackers

Just over a decade ago I began learning about web technologies and found myself learning basic HTML.  I was excited when I managed to...
Ian Carnaghan
1 min read

Online Teaching and Learning Experiences in Higher Education

In 2007 I graduated from the University of Ulster’s new E-Learning masters program.  For my thesis, I developed a research study on collaborative learning...
Ian Carnaghan
1 min read

Ethical vs Non-Ethical Hackers

In their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification hackers have been placed into...
Ian Carnaghan
2 min read

Drupal Ladder

Last week I attended my first Drupal ‘learn sprint’.  For anyone interested in contributing to the Drupal community, learn sprints are a great way...
Ian Carnaghan
1 min read

Health Services and Challenges facing the Low-Literacy Population

In the United States, a large proportion of the population falls into the category of having low literacy skills.  “A long-awaited federal study finds...
Ian Carnaghan
11 min read

Will the Mandiant Report Raise Public Awareness?

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks.  The report...
Ian Carnaghan
1 min read

Mobile Security

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article describing mobile application security flaws,...
Ian Carnaghan
1 min read

One audit standard fits all?

Computer applications are constantly evolving; while web based systems continue to grow in complexity.  It is essential that these systems are properly secured both...
Ian Carnaghan
1 min read