BCO6185 Mobile & Executive Computing: Management Report on Solutions

Verified

Added on  2023/06/12

|9
|2745
|365
Report
AI Summary
This management report assesses the implementation of mobile business solutions, focusing on technologies, platforms, success factors, and enablers. It examines cost factors, including improved materials and skill sets, and key components like secure payment methods. The report discusses technologies such as cloud protection, remote browsers, and container security, highlighting the importance of well-defined policies, clear processes, and employee training for success. It concludes that mobile business solutions enhance business operations by improving technology and processing speed, with secure payment methods ensuring client security. The report emphasizes the need for a comprehensive approach to mobile solution implementation to maximize benefits and minimize risks. Desklib provides this report and many other resources for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: MANAGEMENT REPORT
Management Report
Name of the Student:
Student ID:
Date:
24/05/18
Unit Name/Code:
Mobile and Executive Computing (BCO6185)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MANAGEMENT REPORT
1. Introduction
The mobile business solution has been largely employed for forming the utilization of the
activities and forming the implication of activities favouring the smart development of the
operations (Pathan 2016). The utilization of the effective implication model would be helpful for
listing the development of the profound system development and utilizing the smart innovation
for the development of the effective project development methods. The mobile business solution
can be deployed for improving the existing technology and supporting the development of faster
processing in the organization. The implication of the operations would align for the utilisation
of the improved factors for forming the improvement of the activities.
2. Implication of Secure Payment Method for Customers
The implication of the secure payment methods would be helpful for ensuring that the
project would be aligned for forming the implication of the activities. The deployment of the
operations had supported the implication of the activities for ensuring that the deployment would
be aligned for the utilization of the operations (Aizatulin 2015). The secure payment would be
aligned for forming the deployment of the improved activity development. The secure payment
methods would be aligned for forming the development of the activities and listing effective
operations. The secure payment methods would be helpful for deploying the effective utilization
of the activities and it would also be helpful for forming the payment process secure for the
clients.
2.1 Cost Factors
The cost plays a vital role for the implication of the improved development models for
forming the alignment of the successive development methods (Perez, Branch and Kuofie 2014).
The alignment of the activities would also be helpful for forming the utilization of the improved
activity development. The overall cost of the development of the operations would be implied for
securing the development of the improved activities. The cots factor would enable the utilization
of the factors for listing the alignment of the security factors. The impact of cost on the payment
process can be identified as,
Document Page
2MANAGEMENT REPORT
Improved Materials: The high cost budget would provide scope for buying better
quality of materials for developing the system (Diamanti and Leverrier 2015). The system,
software, and other equipments required for the project development can be eased with the
implication of the improved activity development. The quality of materials would be directly
affected by the implication of the operations and alignment of the effective development model.
The implication of the security platform would be supported by the implication of the activities
for forming the implication of the activities.
Improved Skill Sets: The alignment of the new systems would also form the implication
of the improved processing and development for the client based on the fixed amount for the
services (Kirlappos and Sasse 2014). The high budget for the project would result in recruiting
more skilful people in the organization. The developed skill set for the activities would align for
the forming the implication of the operations and listing the alignment of the activities for listing
the formation of the effective acquisition.
2.2 Key Components
The mobile payment platform would be helpful for listing the alignment of the operations
and formation of the remote payment processing for the clients. The customers would be
benefitted by the implication of the online payment activities for forming the alignment of the
activities favouring the implication of the operations forming the deployment of the successive
project development operations (Almeida et al. 2016). The key components of the mobile
payment platform are deployed for listing the alignment of the security functions. The key
components of the system development would be formed for listing the implication of the
improved activities.
The key components of security are the aligned for forming the implication of the
effective operations. The security tools, programs, functions, and other useful implications would
be helpful for the development of the proper and final project deliverable (De Cnudde et al.
2017). The security considerations and factors for supporting the effective implication of security
are security policies, security guidelines, and security tools. The integration of all these key
components would result in forming the implication of the activities forming the alignment of the
improved operational development. The secure payment would be aligned for forming the
Document Page
3MANAGEMENT REPORT
deployment of the improved activity development. The secure payment methods would be
aligned for forming the development of the activities and listing effective operations. The secure
payment methods would be helpful for deploying the effective utilization of the activities and it
would also be helpful for forming the payment process secure for the clients.
2.3 Technologies
The technologies supporting the development of the improved functional and operational
activities would be aligned for forming the implicational development of the final project
deliverable (ElFgee and Arara 2014). The utilization of the effective implication model would be
helpful for listing the development of the profound system development and utilizing the smart
innovation for the development of the effective project development methods. The mobile
business solution can be deployed for improving the existing technology and supporting the
development of faster processing in the organization. The innovation is technologies had
supported the growth and development of the final project deliverance. The implication of the
activities would be aligned for forming the deployment of the activities. The technology
development would be supported by the formation of the activities favouring the alignment of
the activities to overcome the significant technology implication.
Cloud Protection: The Cloud workload protection can be deployed for protecting the
database over the cloud network (Hu 2016). The protection for the platforms would enable the
alignment of the smart functional development. The implication of the cloud protection is
required as most of the current activities are supported by the deployment of the activities. The
cloud based protection would enable the alignment of the protection via virtual machines and
physical machines. The cloud workload protection would enable the protection of the data and
information via security policies.
Remote browser: The remote browser for the deployment of the effective and innovative
technology integration would help in easing the installation of the security. The remote browser
has been widely used in various operations (Almeida et al. 2016). The establishment of the
remote browser that is virtually aloof from all the end connections would be supported by the
alignment of the smart actions. The remote browser would allow the utilization of the endpoint
security so that no malware can attack the end user system. It would allow the decrease of the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MANAGEMENT REPORT
surface area for attack and even helps in shifting the server sessions. The mobile business
solution can be deployed for improving the existing technology and supporting the development
of faster processing in the organization. The secure payment would be aligned for forming the
deployment of the improved activity development.
Container Security: The security for the OS protection is a must as OS model would be
shared for aligning the implication of the activities (Shahzad, Musa and Irfan 2014). The security
for the container would mark the implication of security for the compromise of the activities
forming the safety of the data. The analysis of the secured loss for the organization had resulted
in causing the major issues for the alignment of the security. The security of the container would
allow the implication of the profound system development. The security of the container would
support the deployment of the effective alignment models. The utilization of the effective
implication model would be helpful for listing the development of the profound system
development and utilizing the smart innovation for the development of the effective project
development methods.
2.4 Success Factors
The success factors would be formed for taking care of the activities and formation of the
effective alignment of the operations forming the implication of the successive development of
the operations. The success factors for the implication of the operations would be formed for
listing the alignment of the operations for listing the development of the successive integration
factor (De Ruiter and Poll 2015). The implementation of the activities would be formed for
listing the alignment of the operations. The success factors would be formed for listing the
development of the operations. The success factors for the implication of the security functions
are,
Well Defined Policies: It is important for defining the security of the organization in an
integrated secured platform (Langley, Modadugu and Moeller 2016). The well defined policies
of the organization would help in carrying out the implication of the operations for listing the
deployment of the activities also. The policies would allow the implication of the activities for
forming the alignment of the supportive development factors. The well defined policies would
help in listing the implication of the improved development factors.
Document Page
5MANAGEMENT REPORT
Clear Processes: The clear processes for the security functions would allow the
modification of the allocation and formation of the operations. The processes for the deployment
of the activities would align with the management of the security policies (Sheffer, Holz and
Saint-Andre 2015). The effective processes would help in ceasing the formation of the improved
security implication. The security of the container would support the deployment of the effective
alignment models. The utilization of the effective implication model would be helpful for listing
the development of the profound system development and utilizing the smart innovation for the
development of the effective project development methods.
Training: The training to the various employees and operands would be helpful for
forming the alignment of the development models. The training would help in taking care that
the employees can effectively use the security policies (Kirlappos, Parkin and Sasse 2015). The
lack of knowledge would serve as the major hindrance for the organizational development issues.
The alignment of the improved functional development would also be helpful for forming the
alignment of the activities supporting the utilization of the activities. The training to the
employees would help in forming the supportive utilization of improved activity development.
2.5 Platforms
The online cloud platform would be helpful for forming the development of the activities
in listing the alignment of the security functions for forming the listing of the activities. The
platform development would be helpful for listing the alignment of the activities forming the
utilization of the operations. The deployment of the online security functions would be supported
by the deployment of the improved activities.
2.6 Enablers
The enablers would be helpful for listing the development of the alignment of the
activities for forming the deployment activities. The implication would be formed in marking the
development for listing the activities forming the alignment of the successive development
model.
3. Conclusion
Document Page
6MANAGEMENT REPORT
The mobile business solution had been largely employed for forming the utilization of the
activities and forming the implication of activities favouring the smart development of the
operations. The mobile business solution had been deployed for improving the existing
technology and supporting the development of faster processing in the organization. The
implication of the operations had aligned for the utilisation of the improved factors for forming
the improvement of the activities. The secure payment methods had aligned for forming the
development of the activities and listing effective operations. The secure payment methods were
helpful for deploying the effective utilization of the activities and it had assisted in forming the
payment process secure for the clients. The impact of cost on the payment process was Improved
Materials and Improved Skill Sets. The security tools, programs, functions, and other useful
implications had been helpful for the development of the proper and final project deliverable.
The security considerations and factors for supporting the effective implication of security were
security policies, security guidelines, and security tools. The high cost budget would provide
scope for buying better quality of materials for developing the system. The system, software, and
other equipments required for the project development eased with the implication of the
improved activity development. The alignment of the new systems formed the implication of the
improved processing and development for the client based on the fixed amount for the services.
The high budget for the project resulted in recruiting more skilful people in the organization.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7MANAGEMENT REPORT
References
Aizatulin, M., 2015. Verifying cryptographic security implementations in C using automated
model extraction (Doctoral dissertation, Open University).
Almeida, J.B., Barbosa, M., Barthe, G. and Dupressoir, F., 2016, March. Verifiable side-channel
security of cryptographic implementations: constant-time MEE-CBC. In International
Conference on Fast Software Encryption (pp. 163-184). Springer, Berlin, Heidelberg.
Almeida, J.B., Barbosa, M., Barthe, G. and Dupressoir, F., 2016. Verifiable Side-Channel
Security of Cryptographic Implementations: Constant-Time MEE-CBC.
De Cnudde, T., Bilgin, B., Gierlichs, B., Nikov, V., Nikova, S. and Rijmen, V., 2017, April.
Does Coupling Affect the Security of Masked Implementations?. In International Workshop on
Constructive Side-Channel Analysis and Secure Design (pp. 1-18). Springer, Cham.
De Ruiter, J. and Poll, E., 2015, August. Protocol State Fuzzing of TLS Implementations. In
USENIX Security Symposium (pp. 193-206).
Diamanti, E. and Leverrier, A., 2015. Distributing secret keys with quantum continuous
variables: principle, security and implementations. Entropy, 17(9), pp.6072-6092.
ElFgee, E. and Arara, A., 2014. Technical Requirements of New Framework for GPRS Security
Protocol Mobile Banking Application. Procedia Computer Science, 37, pp.451-456.
Hu, F., 2016. Security and privacy in Internet of things (IoTs): Models, Algorithms, and
Implementations. CRC Press.
Document Page
8MANAGEMENT REPORT
Kirlappos, I. and Sasse, M.A., 2014, June. What usable security really means: Trusting and
engaging users. In International Conference on Human Aspects of Information Security, Privacy,
and Trust (pp. 69-78). Springer, Cham.
Kirlappos, I., Parkin, S. and Sasse, M.A., 2015. Shadow security as a tool for the learning
organization. ACM SIGCAS Computers and Society, 45(1), pp.29-37.
Langley, A., Modadugu, N. and Moeller, B., 2016. Transport layer security (TLS) false start
(No. RFC 7918).
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET.
CRC press.
Perez, R.G., Branch, R. and Kuofie, M., 2014. EOFISI Model as a Predictive Tool to Favor
Smaller Gaps on the Information Security Implementations. Journal of Information Technology
& Economic Development, 5(1).
Shahzad, A., Musa, S. and Irfan, M., 2014. N-secure cryptography solution for SCADA security
enhancement. Trends Appl. Sci. Res, 9, pp.381-395.
Sheffer, Y., Holz, R. and Saint-Andre, P., 2015. Summarizing known attacks on transport layer
security (tls) and datagram tls (dtls) (No. RFC 7457).
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]