DouerWxp

Running Water never grows stale, so you gotta just keep on flowing

Flow:A Online Medcine Application

Cybersecurity Analysis for Cyber Attack at the University of Calgary

Abstract

With the increase in security problems on the Internet, people gradually realize the importance of cybersecurity (Ghorbani and Ahmadzadegan ,2017). The incident response is essential in cybersecurity strategy, efficient cyber response could reduce the loss and strengthen the business continuity (Snedaker, 2013). This paper is based on the case that happened at the University of Calgary on May 28, 2016, critically analyzing the incident response taken in terms of immediate response, communication, and business continuity. At the end of this paper, we provide an ideal solution to face ransomware attacks.

Keywords: Cybersecurity, Ransomware, Incident Response

...More

Global Sourcing and Cloud Technologies

Question 1

Compare and Contrast Outsourcing with Inhouse production (use ‘ECCO A/S Global Value Chain Management’ case as reference).

1. Introduction

Outsourcing and inhouse production have their own traits. The given case is about a Danish shoe manufacturer ECCO, which has Global Value Chain. ECCO produces 80 percent of its shoes inhouse, the remaining 20 percent outsourced as the shoes cannot benefits from ECCO’s core technology. In discussion part, I will illustrate the definitions about outsourcing and inhouse production, and identify the outsourcing activities and inhouse production based on the given case. Then, I will use ECCO case as reference to compare outsourcing with inhouse production based on the key drivers of sourcing action (McFarlan & Nolan, 1995). Besides, the risks (Aron & Singh, 2005) acts in sourcing decisions and some extra factors should be considered as well.

...More

A Comparison of FinTech and TechFin and the Future Prospects of FinTech

Abstract

“Financial Technology” or “Fintech” is becoming a global phenomenon, refers to employing the use of technological methods in bettering financial customer relationships and delivering financial services. This term can be traced back to the “Financial Services Technology Consortium”, a project initiated by Citigroup, the mission of this project is to facilitate technological cooperation efforts. “FinTech” now is referring to a large and rapidly developing industry, therein 48 fintech unicorns are now worth over US$187 billion, according to UppLabs (2018). In this study, the Fintech and TechFin business model is examined in detail, and their companies operating in the field of financial technologies depend on properly cooperating with each other to complement mutual shortcomings on the partial competition in the long term.

Keywords: Fintech, TechFin, Financial Technologies, Fintech versus TechFin

...More

Factor Investing Using Alternative Data

1. INTRODUCTION

In traditional trading algorithms, researchers trade stocks based on their fundamental and technical analysis, which is however very hard to generate excess earning in an efficient market. Especially in today’s market with tons of new information changes, alternative data and unstructured data are transforming the financial industry in crowdfunding, insurance, investment fields.

...More

Security and Privacy Problems of AI in Process of Input, Training Model, Output

Abstract

Nowadays, Artificial Intelligence (AI) has become a popular topic in the big data era. At the same time, importance should be attached to the security and privacy problems of AI with the growth of basic data and AI using population. This essay points out the security and privacy problems in the process of programming in terms of input, training model, and output with some examples and analyses the feasible solution aiming to different threats. The result reveals that the AI should pay attention to the security and privacy issues by adding a self-testing procedure and introducing the standard of input and output data to avoid relevant security and privacy issues.

Keywords: machine learning, adversarial examples, poisoning attack, artificial intelligence security, data processing

...More