Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Business Intelligence, Mobile payments, Mobile advertising and Personalisation

Assume that you are the developer of mobile phone application.

A) List all the mobile payments you know (e.g. credit card, Vouchers, PayPal, fingerprint,….) and describe how each of them they work and what you need to do as an application developer to be able to use them.

B) How would you personalise the application to the individual users? And why?

C) What would be your strategy to advertise for your app? Content, where, when and why?

D) How can you include external advertising in your mobile phone app? Where do you get the ads from and under what criteria - be precise?

E) How would you use business intelligence and data mining for your application? Be precise

problem 2: Security

A) describe the terms‘physical security’, ‘information security’ and ‘security management’

B) The three (3) basic principles for security are Confidentiality, Integrity and Availability.

i) Define what Confidentiality; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

ii) Define what Integrity; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

iii) Define what Availability; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

C) Phishing and Spear Phishing:

i) Describe a scenario for each

ii) In what way(s) can phishing be reduced?

iii) How might an online company protect their customers from phishing attacks?

iv) What is a vertical handover?

v) What is a horizontal handover?

vi) Give a list (as complete as possible) of what needs to be managed during a handover.

problem 3: Ubiquitous Computing – Smart Devices

a) What is a WLAN and describe the technologiesto implement it in 2009.

b) What is a WPAN and describe the technologiesto implement it in 2009.

c) Illustrate the combined useof WLANs and WPANs (Not WAN) in a scenario where you commutefrom your home to the office in 2020. Choose the way you want to commute (walk, cycle, train, bus …) and use a smart object to have access to 3 different ‘futuristic’ services using WLAN and/or WPAN. Include at least one service that is used by several persons at the same time.

d) For each of the 3 services presented in problem C, describe how it works in technical terms and justify the technologies chosen.

e) Focus now on the smart object you used in problem C. Whatwill be the impact (positive and negative) of that smart object on your daily life and your privacy?

f) Provide possible solutions to avoid the negative impacts.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91147

Have any Question? 


Related Questions in Computer Engineering

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does HTTP have any ...

1 what was important about rand report r-6092 who decides

1. What was important about Rand Report R-609? 2. Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing that these wishes are carried out? 3. Who should lead a securit ...

Consider the signalxn deltan-2deltan-1 2deltan-2-deltan-3a

Consider the signal x[n] = δ[n]-2δ[n-1]+ 2δ[n-2]-δ[n-3]. (a) Compute and plot the 4-point DFT X[k]. (b) Using the fewest number of zeros possible, zero pad x[n] so that the DFT frequency resolution is at least Ω0 = 0.1. ...

1 a grab bag adt is similar to the bag adt with one

1. A Grab Bag ADT is similar to the Bag ADT with one difference. A grab bag does not have a remove() operation, but in place of it has a grabItem() operation, which allows for the random removal of an item from the bag. ...

1 the telnet application has no commands such as those

1. The TELNET application has no commands such as those found in FTP or HTTP to allow the user to do something such as transfer a file or access a web page. In what way can this application be useful? 2. Can a host use a ...

1 prove or disprove that state-based logging and

1. Prove or disprove that state-based logging and transition-based logging are equivalent if and only if the state of the system at the first transition is recorded. 2. Suppose a remote host begins the TCP three-way hand ...

How can us companies protect their digital assets

How Can U.S. Companies Protect their Digital Assets Overseas? Prepare a 3 to 5 paragraph briefing statement that can be used to answer the above question. Your audience will be attendees at a conference for small busines ...

Consider a directed random graph of the kind discussed in

Consider a directed random graph of the kind discussed in Section 13.11. a) If the in- and out-degrees of vertices are uncorre1ated, i.e., if the joint in/outdegree distribution P jk is a product of separate functions of ...

1 list and describe the four primary types of ups systems

1. List and describe the four primary types of UPS systems. Which is the most effective and the most expensive, and why? 2. What two critical functions are impaired when water is not available in a facility? Why are thes ...

1 visit cysecureorg and download the file

1. Visit cysecure.org and download the file LinuxDistributors.txt. a. If you can copy the content directly and paste onto your linux file, or b. Download it first into your computer. Then, copy and paste it from your com ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro