Visual cryptography
Introduction One of the popular solutions for image encryption is visual cryptography. Secret sharing concepts are used to encrypt a secret image into the shares (customized versions of the original…
Read more >Software engineering principles
Chapter 1 "Software is a great combination between artistry and engineering. When you finally get done and get to appreciate what you have done it is like a part of…
Read more >Software testing
1.0 Software Testing Activities We start testing activities from the first phase of the software development life cycle. We may generate test cases from the SRS and SDD documents and…
Read more >Food Policy in Malaysia
Food Philosophy Food Policy in Malaysia Contents Introduction Food Policy in Malaysia Halal Malaysia Halal Certification The Demand of Halal Food In Malaysia Restaurant In Malaysia Conclusion Bibliography Introduction Malaysia…
Read more >Is fake news journalism?
Before we can answer the question, is fake news journalism, we must define journalism. Based on the Merriam Webster dictionary it is "the collection and editing of news for presentation…
Read more >Software piracy: An overview
SOFTWARE PIRACY IN AFRICA Software piracy is a combination of two different words which are software and piracy. Software can be defined as generic term for computer programs which operate…
Read more >Interpersonal Ethical Positions
The interpersonal ethical positions include the nature of man approach, the nature of communication approach, communication as a social contract, communication as a relationship, communication as dialogue, and the ethic…
Read more >Impact of e-commerce
E-commerce is the process of managing online financial transactions by individuals and companies. This includes business-to-business (B2B), business-to-consumer (B2C) and business-to-government (B2G) transactions. The focus of e-commerce is on the…
Read more >Sustainable information security policy in an organization
Introduction The purpose of this research paper is to investigate how organizations design sustainable information security policies. Designing a sustainable information security policy is one of the most important issues…
Read more >Journalism and Society
Journalism and Society (9303) Discussion questions for the week two tutorials For Peter Clarke’s chapter on interviewing from Australian Journalism Today, the questions are: What is it, according to Clarke,…
Read more >