Augmented Reality (AR) – Meaning, Operation and Benefits

Augmented reality refers to the utilization of computers to modify reality, usually in order to provide additional assistance when a human user is interacting with the real environment. The real world around humans provides a wealth of information which the human user must absorb and process through their senses. The most useful and informative of all human senses is the sense of vision and a huge amount of information about the ambiance is required to be sensed as well as processed by the human visual system. Computers are useful because they can provide an overlay of information to assist with the human processing of the information which they perceive through their senses, mostly the visual sense.… Read the rest

Fraud and Forensic Auditing

Overview of Fraud – The Fraud Triangle

Fraud has become an important topic in today’s business environment, especially in the light of scandals such as Enron (Read: Enron Accounting Scandal) and WorldCom (Read: WorldCom Accounting Scandal). While many think of top corporate executives committing fraudulent acts, especially those considering financial reporting, it is important to note that lower level employees also add to the risk of fraud within a company. The fraud triangle shows the three main elements necessary in order to create fraud: pressure, rationalization, and opportunity.

Financial pressure is often the first reason someone within a corporation would want to commit fraud.… Read the rest

Social Engineering – Meaning, Types and Defenses

Living at the height of the Information Age means information security has never mattered more. With a greater amount of people and businesses going paperless, there is an ever-increasing need and demand to keep digital information secure. The CIA triad or the Confidentiality, Integrity, and Availability of a company’s data is a general model designed to guide security policies for information security inside an organization.  Confidentiality refers to the privacy of data – making sure that only people who are allowed to access data are able to access it.  Integrity refers to maintaining a data’s accuracy and trustworthiness – making sure that data cannot be altered by an unauthorized person.… Read the rest

Cloud Computing – Models, Architecture and Characteristics

Cloud Computing, often referred to as simply “the cloud”, is a distributed architecture that centralizes server resources on a scalable platform, enabling ubiquitous access to configurable resources and services. It provides storage and access for data over the internet instead of our computer’s hard drive. Leveraging the Internet, it provides unparalleled and distributed services based on virtualization and service-oriented architecture. Cloud is not another recent technology, but rather it can be described as a delivery model for information services using existing technologies. It does an excellent job of reducing the time spent on IT infrastructure and maintenance. Cloud presents itself as a ubiquitous, dynamically scalable, and on-demand model, that can be purchased on a ‘pay-as-you-go’ basis without any prior subscription or under/overprovisioning.… Read the rest

An Introduction to Computer Forensics

Forensic auditing deals with an extensive range of analytical work that is performed by expert accountants. This line of work typically involves an examination of the financial affairs of a company and is frequently connected with scrutinizing fraudulent activity. Forensic auditing consists of the entire investigation process, including having the investigator serve as an expert witness in a trial. Forensic accountants are even qualified to look into situations that are not fraud-related. These might include the settling of fiscal issues of a business or disputes between insurance claims.

The forensic investigation encompasses the necessary steps taken to collect evidence in a suspected fraud case.… Read the rest

A Holistic Approach to Technology Management

Management of technology links engineering, science, and management disciplines to address the planning, development, and implementation of technological capabilities to shape and accomplish the strategic and operational objectives of an organization. Refer to the definition of technology management, it requires collaboration of the R&D, manufacturing, service and operation function, marketing, finance, and HR function in the company. Thus a holistic approach needs to be taken to manage technology in the company. It will be divided to several reasons to explain in below paragraph and what are the benefits.

Firstly, technology management involves multi-functions within the organization. In a company, not only engineering department or R&D department is responsible for technology management, all the functions within the organization are more or less related to technology.… Read the rest