This Is A Cyber Securtiy In Detroit Mi Cyber Essay

1758 words - 8 pages

1. The Purpose of the Project
In today’s busy world of technology, the last thing an individual should be concerned about is where they should park their vehicle. The purpose of this project is to develop a computerized system to manage parking usage and online reservations for a parking lot. This computer system will allow people to connect with automated parking lot attendants to reserve parking spaces before arrival therefore guaranteeing a spot. The auto attendant would provide real-time parking information, eliminate congestion and time that is wasted looking for a parking space. In addition, people will be able to pay for the spaces via phone, tablet or computer. 
According to the Smart Parking report, Smart Parking could result in 2,20,000 gallons of fuels saving till 2030 and approximately 3,00,000 gallons of fuels saved by 2050, if implemented successfully. http://www.happiestminds.com/whitepapers/smart-parking.pdf

2. The Stakeholders 
We are pleased to work with our partners to increase the overall enjoyment of our parking lots, and decrease the unnecessary illegal parking that often result in customers being ticketed or their vehicles being towed. By Streamlining the parking lot experience and adding importance to our stakeholders we can identity the driving forces of the parking problems in the city. As we recognize the key members in the stakeholder’s groups, we need to form a group meeting and welcome the public to our formal and informal meetings. This will signify the interest of the community such as the owners, service attendants, drivers and merchants. The stakeholders will be involved in a lot more than just meetings or seeking feedback from the public. Our stakeholders will provide rules for identifying public concerns and developing solution through open community involvement.  
Benefits of Involving stakeholders:
· Builds confidence and encouragement for the process and conclusion  
· Shares the duty for resolutions or actions  
· Produces resolutions more likely to be adopted  
· Leads to restored, more profitable solutions  
· Forges deeper working interactions  
· Develops communication and organization of resources  
· Helps to safeguard any environmental injustice concerns are identified at an early stage  
3. Mandated Constraints 
The system will be comprised of a lot of sensors, parking messages, control devices, wired/wireless phone systems, desktops and servers and application interfaces. One of the challenges of the computerized parking system is the exceptionally large selection of hardware and software choices, this may have a big threat on systems expansion.
When...

Find Another Essay On This is a cyber securtiy in detroit mi - cyber - essay

how cyber bulling is a problem for schools

1274 words - 5 pages student at school, things can get out of control through conflicts over many things such as a girl. This can result in the student being kicked, shoved into the lockers, or having your hair pulled. Slander is very common when bullying someone. Suicide is the third leading cause of death among young adults, resulting in about 4,400 deaths per year. According to the ABC news, close to 30% of students are either bullies or victims of bullying which

What is Cyber Relationship Addiction? Essay

1730 words - 7 pages under 19 years of age are most prone to addiction, make up 35% of the total demographic. 19-30 year olds are second, making up 30%, while those over thirty make up 25%. (Online Addiction – Who is at Risk?) There is a special interest in studying the prevalence of cyber addiction among adolescents. Kalitiala-Heino et al suggested that this is due to the fact that the adolescence is a formative period of lifestyles and health behaviours. Due to

What´s a Cyber Relationship?

1765 words - 8 pages of fame… and infamy in Singapore” 1). This helps us to contribute to a huge amount of usage on Cyber platforms, which in turn leads to Addiction to such usage. According to Mesch and Talmud, youths’ social choices are restricted with time and place. Most of them only get the chance to socialize in school, their neighborhood and in extra-curricular activities (63). In a Straits Times article published in 2012, it is stated that teenagers are

A Case Study on the cyber-attack in cloud computing

2545 words - 10 pages -attack that took place 20.9% were directed to finance and insurance domain. Majority of the attacks are caused by the outsiders and consisting of 50% of the total attackers (IBM, 2011). However, malicious insider is equally a cause of cyber-attack, and causing 20% of the overall attack. The key objectives of these attacks were to harm the ICT users in one way or the other. 4.2 Categories of cyber-attack in cloud As per the study conducted by

Cyber Security: A Necessity Nowadays

1557 words - 7 pages Cyber-attacks are not just in fiction movies, they are a reality of our world. The cost of cyber-attacks are estimated at $100 billion to $1 trillion annually (Eschelbeck, 25). The reason of this is not difficult to understand. Computers are present everywhere. People are always connected posting information about their lives on Facebook, Instagram and Twitter. On the commercial field is the same. The most part of enterprises have their bases

cyber security in the millitary

1155 words - 5 pages places the flash drive back onto the machine attached to the internet it sends some top secret information to the Russian military. While this is just a story used to illustrate the point that following policy is important it can also be used to show the lack of discipline present in cyber ops also shows that The current American cyber personnel are not disciplined enough, Agent.btz is a very real virus that was loaded onto a computer in Afghanistan

Crime in the Cyber Realm

1032 words - 5 pages , which bans websites and content that are illegal in China. According to Paul Wiseman of USA Today, “If an Internet user in China searches for the word ‘persecution,’ he or she is likely to come up with a link to a blank screen that says ‘page cannot be displayed’” (n.d.). The Code theory of cyber crime allows for a multifaceted approach to cyber security, where each involved entity maintains its own relevant level of cybersecurity. In practice

Cyber Bullying is Dangerous to Teenagers

582 words - 3 pages bullied. Due to the significant amount of children being bullied everyday, the cyber bullying hotline offers many solutions to limit online harassment such as building a fun, interactive activities online, encourage students to report cyber bullying, and increase awareness in every community (Langhorst 2012). The cyber bully hotline’s goal is to limit cyber bullying because it is especially dangerous to teenagers. Without much strict regulation

Cyber Security Controls As a Public Good

2486 words - 10 pages Overview Society today is plagued with crime that is difficult to combat, constantly changing, and has no borders; this type of crime is called cyber-crime. The United States of America is attacked on a daily basis by cyber criminals both foreign and domestic. The crimes committed involve fraud, identity theft, theft of proprietary trade secrets, and even theft of national secrets. The 2009 Internet Crime Report indicates there were 336,655

Finland Should be a Cyber Connector

912 words - 4 pages actors are also active in this new Great Game. Finland also occupies a significant position in the cyber connections of the Baltic Sea region, with its geographical location conferring certain advantages that enhance its attractiveness as a location for cyber activities. Finland is free of major tectonic activity and natural catastrophes. Its temperate climate naturally cools down cloud comput- ing farms. It can also offer relatively cheap energy

Cyber-Bullying: A Brief Research Proposal

1846 words - 7 pages . The independent variable will be participation in both traditional and cyber bully/victim activities and the dependent variable will be whether or not traditional and cyber bully/victims are the same individuals. The study will be statistically analyzed using a Pearson correlation on SPSS. In order to conduct this study, approval from the Ethics Board will be required. Provided that approval is received from the Ethics Board, consent from

Similar Essays

This Paper Describes The Crime Of Cyber Crime And How To Prevent It From Happening To You

1661 words - 7 pages records are still on file just in case the man that is committing these crimes gets arrested, the police will know that he is impersonating Kelly. This will haunt Kelly forever.Another victim John Harrison, a Connecticut salesman has spent over 2,000 hours trying to reclaim his life after having his identity stolen. Within 4 months a man named Jerry Phillips racked up about $265,000 in Lowes, Home Depot, Sears, JC Penny', two cars from Ford, a

Cyber Crime Is A Serious Problem Essay

2338 words - 9 pages their apartment in China. However, Cyber-crime is only important to a few people, but I believe it should be important to everyone. If we become aware of the dangers of being online, the dangers will slowly disappear. If everyone watches out for viruses, they will not spread nearly as far or fast as they currently do. We don’t want to all those benefits which I mentioned earlier come risks. Therefore, this is time to work everybody together to

What Is Cyber Security? Essay

1085 words - 5 pages make it that the user is less vulnerable to this form of terrorism. “Cyber terrorism is the newest of all terrorist attack methods, and it is defined as the use or destruction of computing or information technology resources aimed at harming, coercing, or intimidating others in order to achieve a greater political or ideological goal” (Bullock 284). Our government has a team of individuals that fight for our nation’s security in cyber space so

Cyber Bullying In Colleges Essay

1412 words - 6 pages Cyber bullying in Colleges Bullying in schools has always been a cause for concern, but technology seems to have taken it a notch higher. Cyber bullying is the new technology aided form of bullying, whose effects are as harsh, if not worse, than physical bullying. It is defined as the willful and repeated act to inflict harm on a person using computers, cell phones and any other electronic device (Hinduja and Patchin 6. This type of bullying is