Drupal Ladder

Last week I attended my first Drupal ’learn sprint’. For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal. ...

March 18, 2013 · 2 min · 321 words · icarnaghan

Health Services and Challenges facing the Low-Literacy Population

In the United States, a large proportion of the population falls into the category of having low literacy skills. “A long-awaited federal study finds that an estimated 32 million adults in the USA — about one in seven — are saddled with such low literacy skills that it would be tough for them to read anything more challenging than a children’s picture book or to understand a medication’s side effects listed on a pill bottle.” Toppo (2009). This poses challenges for these individuals seeking services and assistance online using websites that have traditionally not catered for this segment of the population. Services including health information for vaccinations, information on the availability of free clinics in the area, and advice and support from organizations such as Planned Parenthood, simply aren’t as easily accessible to this group of the general population. ...

March 15, 2013 · 15 min · 3066 words · icarnaghan

Will the Mandiant Report Raise Public Awareness?

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks. The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the United States. ...

March 8, 2013 · 2 min · 356 words · icarnaghan

Mobile Security

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches. In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications. ...

March 7, 2013 · 2 min · 391 words · icarnaghan

One audit standard fits all?

Computer applications are constantly evolving; while web based systems continue to grow in complexity. It is essential that these systems are properly secured both at the server level as well as at the code or application level, therefore Information Systems audit standards, more specifically focused on application and development measures provide some of the most useful valuable information at an organizations disposal. ...

March 6, 2013 · 2 min · 406 words · icarnaghan

Illuminate

Illuminate is the code name for a curriculum mapping project I am currently developing as part of my Doctoral thesis. I will be using this part of the blog to document my progress as development progresses. My plan is to have a version 1 of Illuminate completed by the spring of 2014. ...

March 3, 2013 · 1 min · 141 words · icarnaghan

Cultural Values and Moral Legitimacy

In a paper that discussed various cyber-crimes throughout the years carried out by juveniles, Radnofsky (2006) points us to the seriousness of these types of threats. The paper discusses the importance of changing cyber-culture through education and points to education through safety, security and ethics. ...

February 19, 2013 · 2 min · 384 words · icarnaghan

Cost and Challenges with E-Government

There is no doubt that E-Government provides conveniences today that many take for granted, however there is an underlying cost for these services. First of all, government sites are attractive targets for malicious activities, whether or not this involves deliberate disruption of service, or the stealing of sensitive information for profit. ...

February 18, 2013 · 3 min · 495 words · icarnaghan

Cybercrime: Law Enforcement and E-Government Transnational Issues

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that duped credit-rating agencies” by using stolen identities of individual victims to steal $200 million. ...

February 18, 2013 · 16 min · 3215 words · icarnaghan

Security Policies

Bosworth et al (2009) stress the importance of formality that should be adopted when creating an ethics policy. They emphasize that clear documentation, clear motivation, clear sanctions, and clear management support at every level, including the top, are all important pieces of an effective policy. ...

February 17, 2013 · 2 min · 321 words · icarnaghan