SlideShare a Scribd company logo
1 of 9
Mobile App Part 1. 15
Project summary
Project requirements
This project will have several requirements for its development.
Functional requirements
A user should be able to use the mobile application to be
developed.
Each user using the mobile application should be uniquely
identified using the registration details.
The system should have a wide scope across several mobile
operating system platforms.
Non-functional requirements
i. Ease of use
The mobile application should be easy to use by all users
ii. Reliability
The mobile application should have minimum rate of failure
iii. Portability
The mobile application should operate in various and be
integrated in various platforms.
iv. Security
Any user data sent, should be encrypted
v. Size.
The mobile application should occupy less server and mobile
space.Budget
Desktop
$250
Smartphone
$400
Transport
$60
Flash Drive 2GB
$20
Printer
$80
Internet subscription
$50
SMS gateway subscription
$60
Miscellaneous
$80
Total
$1000
Human resources
Three programmers
One database developer
Workload
Person
Task
All programmers
Analysis, design
Two programmers
coding
One programmer
Testing and debugging
Database developer
Design and develop database
Work breakdown structure is a hierarchical and an incremental
decomposition of a given project into deliverables, phases and
work packages. It is a tree structure, which shows a subdivision
of effort required to achieve an objective.
The methodology behind the construction of WBS is the system
analysis, system design, and system development. The WBS
helps in analyzing the system and the project.
References
Haugan, G. T. (2002). Effective work breakdown structures.
Vienna, Va: Management Concepts.
Harris, P. E. (2007). Planning and control using Microsoft
Project and PMBOK® guide: Updated for Microsoft Office
Project 2007. Victoria, Australia: Eastwood Harris Pty. Ltd.
Harris, P. E. (1999). Planning and control using Microsoft®
Project 2010 and PMBOK guide® fourth edition. Victoria,
Australia: Eastwood Harris.
Norman, E. S., Brotherton, S. A., & Fried, R. T. (2008). Work
breakdown structures: The foundation for project management
excellence. Hoboken, N.J: John Wiley & Sons.
Comparison between the Gantt chart and PERT
PERT (program evaluation and review technique) is one of the
statistical tool that is used in project management to analyze
and represent the tasks involved in the completion of a given
project while a Gantt chart is a horizontal tabular bar chart
which shows the project schedule that is it shows the start and
finish dates of the terminal elements of the project and summary
elements of a project.
The Gantt chart may be used in status reporting to show and
present how much of the plan has been completed by displaying
and showing the progress of an activity.
The information received from a Gantt chart is more helpful
because, the information in a Gantt chart is graphical hence
easily understood than in the PERT which just shows arrows
and nodes.
It is easier to draw and present the information in a Gantt chart
and be used in the analysis of the project because it shows both
the estimated and actual time the project takes compared to the
PERT which only shows the earliest start time and Latest end
time of an activity.
Gantt charts are simple and easy to read while PERT may not be
easily understood.
The PERT provides useful information since it can show the
critical path and the critical activities hence helpful in planning
the resources of the project compared to the Gantt chart which
only shows the activity duration and the predecessors.
When using the PERT, it shows the information on the activities
and shows the slack activities and when to start and end in case
of a dummy activity.
Application of Gantt charts and PERTS
Gantt charts are used when planning for small projects while
PERT can be used when planning for large projects. This is
because many interlinking activities are difficult to represent in
the Gantt chart and also the duration may be large to be
represented.
Importance of Critical path
i. It will display all the activities of the project and it will help
to plan on how to do the activities such that the slack activities
can be started either earlier or late.
ii. It can help to reschedule the resources of noncritical
activities to the critical activities hence accelerating the project
activities.
iii. The critical path can be used to calculate the standard
deviation of the project and the covariance to know how
correlated the activities in the project are.
iv. The critical path is what determines the duration of the
project since it shows the activities that shows takes the longest
duration between the start and the end of the project.
Gantt chart
References:
Barkley, B. (2008). Project management in new product
development. New York: McGraw-Hill.
Shelly, G. B., & Rosenblatt, H. J. (2012). Systems analysis and
design. Boston: Course Technology Cengage Learning.
Gantt and Pert charts is the main core mobile app essential
components very crucial when handling the project, it enhances
effective analysis, communication and visualization of a carried
out project. Risk is the main core limitation of this mobile app
as it can be very vulnerable to high levels of misuse.
Functionality and vulnerabilities are type mainly evident core
scope of risk according to this context.
1. Activity monitoring
2. Unauthorized dialing
3. Unauthorized network connectivity
4. UI impersonation
5. System modification
6. Logic
7. Data leakage
8. Unsafe data storage
9. Unsafe data transmission
10. Hardcoded password
Inherent schedule flaws and requirement inflations are the top
most risk each projects is ultimately exposed and subjected to.
Sending of messages, microphone recording and data storage
are the main ultimate likelihood assessment aspects of risk
ascertained under the activity monitoring risk. Technical risk is
the most appropriate impact based on the approach as
continuous changing requirement affects the timeline of the
projects accomplishment. Customers and suppliers are the main
ideal owners of the risk for need trackers. Project initiation and
project planning is the main proper methodology to control the
monitoring activity risk (Gunasekera, 2012).
Mobile payment and SMS spread rate is the main assessed
authorized dialing risk encountered under this approach. Change
in premiums and payment rates impacts on the nature of parties’
terms and conditions prompting toll fraud crime. The company
and consumers are the main appropriate owners of authorized
dialing and payment risk. Project monitoring and control is the
main ultimate strategic approach through which performances
and changes can be managed ultimately (Brown et-al, 2013).
Spyware is one of the main fundamental likelihood to
unauthorized network connectivity risk. Attacker’s benefits
through this approach send data; it is very cognizant for the
organization and customers who are the main ultimate owners to
initiate the implementation security measures strategies (Brown
et-al, 2013).
Malicious app and phishing attacks are the main UI
impersonation risk assessed. UI legitimacy is the main core
scope through which victims should be very clear and concise
over authenticity of the information and end issues with the
attackers. Proxy and bank app are the main ultimate owners,
initiation plan project strategy is the most viable approach
through which this menaces can be managed (Gunasekera,
2012).
Malicious application and configuration changes are the main
likelihood of system modification risk. Configuration changes
enhance the possibilities of attack and thus rootkit and APN
proxy are the main core owners. Planning, execution and
monitoring and control project are the main appropriate
strategic mechanism through which configuration changes and
malicious attacks can be handled significantly (Bergman et-al,
2013).
Malicious activity is one of is the ultimate assessed logic risk.
Classic technique can influences occurrences of suspicious and
malicious activity which compromise the confidentiality of the
message or data. Project monitoring and control are the
appropriate strategic mechanism through which risk mitigation
based on this level can be ascertained.
Inadvertent and legitimate apps can definitely enhances
sensitive data leakage risk. Confidential information can leak to
third party causing harmful effect to the victim as the attackers
can definitely expose. Phones and customers are the main
ultimate viable owners. Implementation of security tracking
measures is the main project execution strategic approach
through which this vice can be controlled (Hartley & Wong,
2015).
Mobile apps should definitely store data in an encrypted form;
failure to conceptualization of the viable aspect enhances unsafe
sensitive data storage risk. Pin numbers and passwords are the
main ultimate mechanism through sensitive data can be secured
from attackers. Banks and online users are the main owners and
therefore the main strategic approach to ascertain this issue is
through project monitoring and control.
Wireless communication is commonly known for higher
insecurity to data transmission risk. Mobile devices are the
main owners and thus it is very significant to that sensitive data
is perfectly encrypted in order to safeguard the data. Invalid
certificates should be ascertained appropriately in order to
fundamentally control and manage the issue (Hartley & Wong,
2015).
Additionally, password ineffective is the main likelihood assess
to hardcoded password risk. MasterCard is the main owner and
thus it is very crucial and necessary beware of reverse
engineering which can absolutely compromise the security and
authenticity of the information and data. Project monitoring and
control is the top most strategic approach through which issue
can ascertained extensively (Gonzalez, 2015).
References
Bergman, N., Stanfield, M., Rouse, J., & Scambray, J. (2013).
Hacking exposed: Mobile security secrets & solutions.
Brown, P., Roth, M. S., & Practising Law Institute,. (2013).
Information technology law institute, 2013: Privacy and
cybersecurity, mobile advertising, digital distribution, social
media and the third industrial revolution.
Gonzalez, D. (2015). Managing online risk: Apps, mobile, and
social media security.
Gunasekera, S. (2012). Android Apps Security. Dordrecht:
Springer.
Hartley, C. P., & Wong, P. (2015). The caregiver's toolbox:
Checklists, forms, resources, mobile apps, and straight talk to
help you provide compassionate care.
Mbl App 1 Prjct Sumry

More Related Content

Similar to Mbl App 1 Prjct Sumry

CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design IJECEIAES
 
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATIONSOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATIONIJCI JOURNAL
 
Mobile app development in construction industry
Mobile app development in construction industryMobile app development in construction industry
Mobile app development in construction industryJane Brewer
 
Effort Estimation Development Model for Web-based Mobile Application Using Fu...
Effort Estimation Development Model for Web-based Mobile Application Using Fu...Effort Estimation Development Model for Web-based Mobile Application Using Fu...
Effort Estimation Development Model for Web-based Mobile Application Using Fu...TELKOMNIKA JOURNAL
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET Journal
 
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET Journal
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET Journal
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)AIRCC Publishing Corporation
 
Final Project Report on Information Systems Project Management
Final Project Report on Information Systems Project ManagementFinal Project Report on Information Systems Project Management
Final Project Report on Information Systems Project ManagementAbbas Ahmed
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
 
Software Metrics for Identifying Software Size in Software Development Projects
Software Metrics for Identifying Software Size in Software Development ProjectsSoftware Metrics for Identifying Software Size in Software Development Projects
Software Metrics for Identifying Software Size in Software Development ProjectsVishvi Vidanapathirana
 
Iwsm2014 an analogy-based effort estimation approach for mobile application...
Iwsm2014   an analogy-based effort estimation approach for mobile application...Iwsm2014   an analogy-based effort estimation approach for mobile application...
Iwsm2014 an analogy-based effort estimation approach for mobile application...Nesma
 
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Gagan Bansal
 
Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxjasoninnes20
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 
4 advantages of utilizing construction management software.pdf
4 advantages of utilizing construction management software.pdf4 advantages of utilizing construction management software.pdf
4 advantages of utilizing construction management software.pdfJose thomas
 

Similar to Mbl App 1 Prjct Sumry (20)

CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design Insights on Research Techniques towards Cost Estimation in Software Design
Insights on Research Techniques towards Cost Estimation in Software Design
 
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATIONSOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
 
Mobile app development in construction industry
Mobile app development in construction industryMobile app development in construction industry
Mobile app development in construction industry
 
Effort Estimation Development Model for Web-based Mobile Application Using Fu...
Effort Estimation Development Model for Web-based Mobile Application Using Fu...Effort Estimation Development Model for Web-based Mobile Application Using Fu...
Effort Estimation Development Model for Web-based Mobile Application Using Fu...
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning Algorithm
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
105 project time management
105 project time management105 project time management
105 project time management
 
Final Project Report on Information Systems Project Management
Final Project Report on Information Systems Project ManagementFinal Project Report on Information Systems Project Management
Final Project Report on Information Systems Project Management
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
 
Software Metrics for Identifying Software Size in Software Development Projects
Software Metrics for Identifying Software Size in Software Development ProjectsSoftware Metrics for Identifying Software Size in Software Development Projects
Software Metrics for Identifying Software Size in Software Development Projects
 
Iwsm2014 an analogy-based effort estimation approach for mobile application...
Iwsm2014   an analogy-based effort estimation approach for mobile application...Iwsm2014   an analogy-based effort estimation approach for mobile application...
Iwsm2014 an analogy-based effort estimation approach for mobile application...
 
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
 
Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docx
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 
project management
project managementproject management
project management
 
4 advantages of utilizing construction management software.pdf
4 advantages of utilizing construction management software.pdf4 advantages of utilizing construction management software.pdf
4 advantages of utilizing construction management software.pdf
 

More from annandleola

CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docxCASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docxannandleola
 
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docxCASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docxannandleola
 
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docxCase 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docxannandleola
 
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docxCase 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docxannandleola
 
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxCASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxannandleola
 
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docxCase 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docxannandleola
 
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docxCase 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docxannandleola
 
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docxCase 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docxannandleola
 
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docxCASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docxannandleola
 
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docxCase 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docxannandleola
 
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docxCase 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docxannandleola
 
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docxCase 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docxannandleola
 
CASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docxCASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docxannandleola
 
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docxCase 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docxannandleola
 
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docxCase 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docxannandleola
 
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docxCase 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docxannandleola
 
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docxCASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docxannandleola
 
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docxCase 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docxannandleola
 
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docxCase 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docxannandleola
 
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docxCASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docxannandleola
 

More from annandleola (20)

CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docxCASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
 
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docxCASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
 
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docxCase 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
 
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docxCase 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
 
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxCASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
 
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docxCase 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
 
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docxCase 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
 
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docxCase 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
 
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docxCASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
 
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docxCase 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
 
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docxCase 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
 
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docxCase 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
 
CASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docxCASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docx
 
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docxCase 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
 
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docxCase 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
 
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docxCase 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
 
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docxCASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
 
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docxCase 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
 
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docxCase 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
 
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docxCASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Mbl App 1 Prjct Sumry

  • 1. Mobile App Part 1. 15 Project summary Project requirements This project will have several requirements for its development. Functional requirements A user should be able to use the mobile application to be developed. Each user using the mobile application should be uniquely identified using the registration details. The system should have a wide scope across several mobile operating system platforms. Non-functional requirements i. Ease of use The mobile application should be easy to use by all users ii. Reliability The mobile application should have minimum rate of failure iii. Portability The mobile application should operate in various and be integrated in various platforms. iv. Security Any user data sent, should be encrypted v. Size. The mobile application should occupy less server and mobile space.Budget Desktop $250 Smartphone $400 Transport $60 Flash Drive 2GB $20
  • 2. Printer $80 Internet subscription $50 SMS gateway subscription $60 Miscellaneous $80 Total $1000 Human resources Three programmers One database developer Workload Person Task All programmers Analysis, design Two programmers coding One programmer Testing and debugging Database developer Design and develop database Work breakdown structure is a hierarchical and an incremental decomposition of a given project into deliverables, phases and work packages. It is a tree structure, which shows a subdivision of effort required to achieve an objective. The methodology behind the construction of WBS is the system analysis, system design, and system development. The WBS helps in analyzing the system and the project.
  • 3. References Haugan, G. T. (2002). Effective work breakdown structures. Vienna, Va: Management Concepts. Harris, P. E. (2007). Planning and control using Microsoft Project and PMBOK® guide: Updated for Microsoft Office Project 2007. Victoria, Australia: Eastwood Harris Pty. Ltd. Harris, P. E. (1999). Planning and control using Microsoft® Project 2010 and PMBOK guide® fourth edition. Victoria, Australia: Eastwood Harris. Norman, E. S., Brotherton, S. A., & Fried, R. T. (2008). Work breakdown structures: The foundation for project management excellence. Hoboken, N.J: John Wiley & Sons. Comparison between the Gantt chart and PERT PERT (program evaluation and review technique) is one of the statistical tool that is used in project management to analyze
  • 4. and represent the tasks involved in the completion of a given project while a Gantt chart is a horizontal tabular bar chart which shows the project schedule that is it shows the start and finish dates of the terminal elements of the project and summary elements of a project. The Gantt chart may be used in status reporting to show and present how much of the plan has been completed by displaying and showing the progress of an activity. The information received from a Gantt chart is more helpful because, the information in a Gantt chart is graphical hence easily understood than in the PERT which just shows arrows and nodes. It is easier to draw and present the information in a Gantt chart and be used in the analysis of the project because it shows both the estimated and actual time the project takes compared to the PERT which only shows the earliest start time and Latest end time of an activity. Gantt charts are simple and easy to read while PERT may not be easily understood. The PERT provides useful information since it can show the critical path and the critical activities hence helpful in planning the resources of the project compared to the Gantt chart which only shows the activity duration and the predecessors. When using the PERT, it shows the information on the activities and shows the slack activities and when to start and end in case of a dummy activity. Application of Gantt charts and PERTS Gantt charts are used when planning for small projects while PERT can be used when planning for large projects. This is because many interlinking activities are difficult to represent in the Gantt chart and also the duration may be large to be represented. Importance of Critical path
  • 5. i. It will display all the activities of the project and it will help to plan on how to do the activities such that the slack activities can be started either earlier or late. ii. It can help to reschedule the resources of noncritical activities to the critical activities hence accelerating the project activities. iii. The critical path can be used to calculate the standard deviation of the project and the covariance to know how correlated the activities in the project are. iv. The critical path is what determines the duration of the project since it shows the activities that shows takes the longest duration between the start and the end of the project. Gantt chart References: Barkley, B. (2008). Project management in new product development. New York: McGraw-Hill. Shelly, G. B., & Rosenblatt, H. J. (2012). Systems analysis and design. Boston: Course Technology Cengage Learning. Gantt and Pert charts is the main core mobile app essential components very crucial when handling the project, it enhances effective analysis, communication and visualization of a carried out project. Risk is the main core limitation of this mobile app as it can be very vulnerable to high levels of misuse.
  • 6. Functionality and vulnerabilities are type mainly evident core scope of risk according to this context. 1. Activity monitoring 2. Unauthorized dialing 3. Unauthorized network connectivity 4. UI impersonation 5. System modification 6. Logic 7. Data leakage 8. Unsafe data storage 9. Unsafe data transmission 10. Hardcoded password Inherent schedule flaws and requirement inflations are the top most risk each projects is ultimately exposed and subjected to. Sending of messages, microphone recording and data storage are the main ultimate likelihood assessment aspects of risk ascertained under the activity monitoring risk. Technical risk is the most appropriate impact based on the approach as continuous changing requirement affects the timeline of the projects accomplishment. Customers and suppliers are the main ideal owners of the risk for need trackers. Project initiation and project planning is the main proper methodology to control the monitoring activity risk (Gunasekera, 2012). Mobile payment and SMS spread rate is the main assessed authorized dialing risk encountered under this approach. Change in premiums and payment rates impacts on the nature of parties’ terms and conditions prompting toll fraud crime. The company and consumers are the main appropriate owners of authorized dialing and payment risk. Project monitoring and control is the main ultimate strategic approach through which performances and changes can be managed ultimately (Brown et-al, 2013). Spyware is one of the main fundamental likelihood to unauthorized network connectivity risk. Attacker’s benefits through this approach send data; it is very cognizant for the organization and customers who are the main ultimate owners to initiate the implementation security measures strategies (Brown
  • 7. et-al, 2013). Malicious app and phishing attacks are the main UI impersonation risk assessed. UI legitimacy is the main core scope through which victims should be very clear and concise over authenticity of the information and end issues with the attackers. Proxy and bank app are the main ultimate owners, initiation plan project strategy is the most viable approach through which this menaces can be managed (Gunasekera, 2012). Malicious application and configuration changes are the main likelihood of system modification risk. Configuration changes enhance the possibilities of attack and thus rootkit and APN proxy are the main core owners. Planning, execution and monitoring and control project are the main appropriate strategic mechanism through which configuration changes and malicious attacks can be handled significantly (Bergman et-al, 2013). Malicious activity is one of is the ultimate assessed logic risk. Classic technique can influences occurrences of suspicious and malicious activity which compromise the confidentiality of the message or data. Project monitoring and control are the appropriate strategic mechanism through which risk mitigation based on this level can be ascertained. Inadvertent and legitimate apps can definitely enhances sensitive data leakage risk. Confidential information can leak to third party causing harmful effect to the victim as the attackers can definitely expose. Phones and customers are the main ultimate viable owners. Implementation of security tracking measures is the main project execution strategic approach through which this vice can be controlled (Hartley & Wong, 2015). Mobile apps should definitely store data in an encrypted form; failure to conceptualization of the viable aspect enhances unsafe sensitive data storage risk. Pin numbers and passwords are the main ultimate mechanism through sensitive data can be secured from attackers. Banks and online users are the main owners and
  • 8. therefore the main strategic approach to ascertain this issue is through project monitoring and control. Wireless communication is commonly known for higher insecurity to data transmission risk. Mobile devices are the main owners and thus it is very significant to that sensitive data is perfectly encrypted in order to safeguard the data. Invalid certificates should be ascertained appropriately in order to fundamentally control and manage the issue (Hartley & Wong, 2015). Additionally, password ineffective is the main likelihood assess to hardcoded password risk. MasterCard is the main owner and thus it is very crucial and necessary beware of reverse engineering which can absolutely compromise the security and authenticity of the information and data. Project monitoring and control is the top most strategic approach through which issue can ascertained extensively (Gonzalez, 2015). References Bergman, N., Stanfield, M., Rouse, J., & Scambray, J. (2013). Hacking exposed: Mobile security secrets & solutions. Brown, P., Roth, M. S., & Practising Law Institute,. (2013). Information technology law institute, 2013: Privacy and cybersecurity, mobile advertising, digital distribution, social media and the third industrial revolution. Gonzalez, D. (2015). Managing online risk: Apps, mobile, and social media security. Gunasekera, S. (2012). Android Apps Security. Dordrecht: Springer. Hartley, C. P., & Wong, P. (2015). The caregiver's toolbox: Checklists, forms, resources, mobile apps, and straight talk to help you provide compassionate care.