Category Archives: Home

Android spyware linked to chinese sdk forces google to boot 500 apps

More than 500 Android mobile apps have been removed from Google Play after it was discovered that an embedded advertising SDK could be leveraged to quietly install spyware on devices. The SDK, called Igexin, was developed by a Chinese company … Continue reading

Posted in Home, News | Tagged , , , , , | Leave a comment

Planning & managing projects

Published on The purpose of this article is to provide a clear overview of the project planning and management processes and to see enough the importance of applying guidelines and standards for successful project management. Here is also used some … Continue reading

Posted in CIO, Home, Risk Management | Tagged , , , | Leave a comment

Is there a real need for e-services or EAs?

Published on In this analysis and special study for PCWorld and CiO Albanian are presented the solutions in providing the appropriate and efficient services at the right time for the citizens / businesses that need it, at the same … Continue reading

Posted in CIO | Tagged , , , , , | Leave a comment

Strategies for developing an Internet emergency response system

Published on Control the flow of information All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines … Continue reading

Posted in CyberSec, Personal Blogs | Tagged , , , , | Leave a comment

Cybersecurity talk with Laura Gallante

Attending and listening the experience and the stories from her work towards cyber security in particular, analysis and emphasis on the concepts of information security from an American perspective and the research of the developmental or evolution of based concept … Continue reading

Posted in CyberSec | Tagged , , , , , | 1 Comment

Metadata and Privacy: Limits of Freedom online

Published on The data collection boundary (IP, Time, User, Receiver, etc.), preserving the privacy of the citizen and observing the regulations in force are the ethical principles of the democratic system that everyone has to adhere. Metadata is information … Continue reading

Posted in CyberSec, Home, Personal Blogs | Tagged , , , | Leave a comment

Mobile technology, standards and frameworks towards solving problems

Published on One thing that should never be forgotten is that everything from Government and Business have similarities in terms of operation and functionality, because they are organizations devoted to customer or citizen services. They can not exist without … Continue reading

Posted in CaseStudy, CIO | Leave a comment