Tag Archives: Poster

Socially Engineered Hacking, why the Human element poses such a large security risk?

Ellis Bagley,  BSc Forensic Computing A poorly secured password has been compared to locking a door with sellotape. This would not be an acceptable form of security and yet still acceptable within passwords. Within the study project titled “Socially Engineered … Continue reading

Posted in SC2017 | Tagged , , , | Comments Off on Socially Engineered Hacking, why the Human element poses such a large security risk?

Android Application: Portsmouth City Guide

Devraj Gurung,  BSc Computing Portsmouth is a diverse city. Without the help of a travel guide, getting lost in here can be very displeasing experience, especially for new students. There will be nerves and lot of excitement about starting university … Continue reading

Posted in SC2017 | Tagged , , , , | Comments Off on Android Application: Portsmouth City Guide

Can emerging technologies like the virtual reality headset help to recover Nepal’s tourism industry?

Susmita Giri,  BSc Business Information Systems The main aim for this project is to find out if emerging technologies like the virtual reality (VR) can help to recover or even contribute in any way to Nepal’s tourism industry. After the … Continue reading

Posted in SC2017 | Tagged , , , | Comments Off on Can emerging technologies like the virtual reality headset help to recover Nepal’s tourism industry?

Honeypots – Help or Hindrance

Ben Betts,  BSc Forensic Computing The overall aim for this project is to investigate the usefulness of honeypots in today’s cat and mouse age of cyber security, whether they can make a useful contribution to security or if they are just … Continue reading

Posted in SC2017 | Tagged , , | Comments Off on Honeypots – Help or Hindrance

Cyber security preparedness in Small and Medium Enterprises (SMEs) within the South of the UK

Emma Barclay,  BSc Business Information Systems Reports claim that 74% of Small and Medium Enterprises (SMEs) experienced a security breach during 2015; a 60% increase from 2014 (Home Office, 2015). With SMEs constituting to 99.3% of private sector businesses within … Continue reading

Posted in SC2017 | Tagged , , , | Comments Off on Cyber security preparedness in Small and Medium Enterprises (SMEs) within the South of the UK

Financial Tracker for students

Tian Chung Chee,  BSc Software Engineering The Financial Tracker is an application which allows the users to keep track on their everyday spending. The application was introduced because current similar applications in the market consist of functions which are unnecessary or … Continue reading

Posted in SC2017 | Tagged , , , | Comments Off on Financial Tracker for students

How do UK supermarkets use the loyalty scheme system to gain and maintain market share?

Kamil Wielocha, BSc Business Information Systems Research conducted in previous years, aiming to determine true effectiveness of loyalty scheme programs, provides contradicting results. For example, Taylor and Neslin (2005, p. 303) claim that loyalty programs are successful and have a … Continue reading

Posted in SC 2015 | Tagged , , , | Comments Off on How do UK supermarkets use the loyalty scheme system to gain and maintain market share?

Counselling app for genetic blood diseases

Khalid Al Tamimi, MSc Software Engineering Genetic diseases counselling application aims to utilize the features of mobile devices to create an accessible and readily available mobile genetic counselling application. It provides counselling for potential marital partners who may suffer from … Continue reading

Posted in SC 2015 | Tagged , , , | Comments Off on Counselling app for genetic blood diseases

Impact of Facebook on students’ wellbeing

Garrick Bassey, BSc Computing The study seeks to understand the effect of Facebook use on students with mental health issues and students of sound mind. The study also examines the effect of Facebook on students of varying academic level; secondary; university … Continue reading

Posted in SC 2015 | Tagged , , , , , , | Comments Off on Impact of Facebook on students’ wellbeing

Permissions Denied!

Jaypal Jeer, BSc Forensic Computing Mobile phone security has increasingly become significant in mobile computing because it affects the security of company and personal information currently stored on smartphones. These threats disrupt phone operations, transmit user data or modify the … Continue reading

Posted in SC 2015 | Tagged , , , , | Comments Off on Permissions Denied!