BSc Business Information Systems
The healthcare sector of today is vastly different to when it was originally developed. An aging population, underfunding and lack of resources are just some of the issues that the healthcare sector is facing today and it needs to adapt to the changing times in order to continue to provide a quality service. This paper will explore Soft Systems Methodology and its alternatives in order to find out whether or not Soft Systems is popular within healthcare and whether there is evidence of its use or whether alternative business methodologies are what Soft Systems could learn from them in order to be more successful. This paper will also explore topic of IT project failure within the healthcare sector to see whether business methodologies should be employed instead of (or in some cases before) an IT project is commissioned for the healthcare sector.
BSc Forensic Computing
This topic involves identifying cybersecurity investments governments have explored to protect their critical national infrastructure. It involves looking at national strategies produced by the British, American and Singapore governments to establish stability to cybersecurity within their sphere of influence; looking primarily at their work within education, business and international relations.
Over the past decade cybersecurity has experienced exponential growth. Yet, the market is still trying to catch up with technology and those manipulating the technology to cause immense damage. Distinctively, governments have taken a keen interest into this topic, with the vast majority of governments producing national cybersecurity strategies to bring stability to an unprecedented topic. However, due to the uniqueness of cybersecurity the same methods of government intervention cannot be applied – yet there is a willingness of governments to implement initiatives and policies that can exert control over cybersecurity. This project is concerned with government investment into cybersecurity whilst seeking to define what good cybersecurity investment is. This will help maximise efforts to produce greater results across three key sectors; Education, Business and International Action. Through this, the overriding goal is to develop an evaluation framework for future investment that can appropriately define good cybersecurity.
Currently, some new students attending the University of Portsmouth go through an induction task which consists of a treasure-hunt with a map of the campus and, for each point of interest, there is a question for the students to answer via a paper-based format. This helps them get a feel of the campus and important surrounding locations such as the train station, the social area of the Student Union, and the gym.
My application replaces this induction task with a mobile version where QR codes can be scanned at different campus buildings, train station, gym, Union etc. and points earned for each location. Points can be redeemed for rewards such as coffee, meal deal and book vouchers. The application will have built-in Maps functionality which students can use to navigate around campus. The aim is to provide an interesting, interactive experience for the students which provides them with tangible incentives to complete the task.
Assessment constitutes a fundamental part of an academic learning process due to its importance in measuring students gaining knowledge and finalising their grades. This study aims to develop a data mining based framework for analysing students’ assessment feedback that will be obtained from students’ text feedback or social media site.
The study consists of three stages: The first stage is to find the polarity of student feedback using sentiment analysis methods. The second stage is to detect issues of assessment and classify them (from negative instances). And finally, test the correlation between issue(s) and students’ performance (marks, attendance).
BSc Business Information Systems
Research efforts are now being directed in the Artificial Intelligence (AI) domain for the purposes of enhanced decision-making and automation. As such, we are witnessing the emergence of a new age; the Augmented Age. It is believed that this era in our history will entail a human workforce augmented by computational intelligence. In anticipation of this, experts have offered a discourse of views pertaining to the impact of AI on employment; some believe AI will induce an increase in employment, whilst others predict a decrease in employment. However, these views may be necessitated by job polarisation, the displacement of workers into non-routine low and high skilled jobs without a middle ground for partially routine jobs (Benedikt Frey et al., 2013).
This paper determines that the impact AI may have on employment within organisations is reliant on stakeholder perceptions of the balance between complexity and social ambiguity with routine-ness within jobs. This provides a pathway towards understanding whether AI will play an assistive or displacing role in the future of employment.
BSc Software Engineering
With Estonia introducing a successful e-voting method, used for their General Elections, the question arises if a similar system can be used in the United Kingdom. Taking into consideration the changes within the United Kingdom due to its exit from the European Union, this project will be highlighting the factors of mobile voting. With the aim to investigate the convenience and benefits mobile voting could have for both the Government and the members of public. This project will be analysing both the possible security and the durability of a prototype application which could help change the way voting could take place in the United Kingdom, for future referendums and elections. This project aims to build a functioning prototype, which can be presented to Government officials, which can be considered for further development.
Students have an invaluable advantage in getting discounts at a variety of stores in the UK,
both online and the high street. These discounts are often advertised in different forms,
from posters around the stores or on their websites. Most of these discounts are also
advertised, in third-party applications that compile all discounts in one place, such as
UNIDAYS & NUS apps.
A key drawback to these applications is the lack of a notification feature, for when students
are walking past a nearby store. This formed the question, could a notification-based
application fit into the market and be a success.
This project looks into answering that question, by reviewing the lifecycle of the
development of a proof of concept application. The potential success is judged by a group of test participants from the target population.
BSc Web Technologies
ImagineMemory is a website application that prioritizes accessibility for people with Dementia and Mild Cognitive Impairment to train their minds.
BSc Forensic Computing
Usage of darknet technologies is a controversial topic with the majority viewing them in a negative light, yet some perspectives identify that they provide a haven of free communication. The most well-known of these darknets is Tor, which has been vastly researched with the resulting view that it is utilised for nefarious activity, being supported by a relatively recent study classifying 80% of traffic accessing indecent pornographic material that makes up just 4% of the network content (Owen & Savage, 2015).
With the large quantity of research on Tor, this study focuses its attention on the lesser known, but next most popular darknet technology, the Invisible Internet Project (I2P). This study initially assesses the notoriety of I2P by those studying or working in a cybersecurity area, and compares to that of the Tor network. The respondent’s perception as to the main usage of the dark web is further examined. A targeted web crawler is developed to follow hyperlinks within the I2P network, primarily intending to classify and index its content from the compiled data. Monitoring traffic to and from floodfill nodes (I2P key concept) is explored with an alteration of the I2P source code, and an exploitation of the I2P network composition, to reveal network data that can be used in a deanonymisation attack. Attack methods are further explored, and their effectiveness gauged with past research and current alterations to strengthen the network.