Cumberlands Implementation of the Security Compliance Goals Discussion Paper

User Generated


Computer Science

University of the Cumberlands



discussing security compliance goals and why they are used.


From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store. That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps. When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?

  • When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?
  • Compare and contrast native mobile app design versus standard desktop app design. Discuss considerations for choosing one over the other. Elaborate on main advantages vs disadvantages.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hey buddy, kindly let me know in case of any revision 😇


Discussion Questions

Student Name
Institution Affiliation




Task 1:
Security Compliance Goals
Information security compliance is vital for the operational and legal concerns of
organizations today. The modern world has become increasingly reliant on information
technology as more people get interconnected thanks to technologies like AI, big data, and the
internet of things. Simultaneously, threats are always evolving to undermine the security
networks and put the danger of the organization and the consumer at risk. Organizations seek to
develop a competitive advantage by meeting industry standards on data security through
adopting security compliance standards. Security compliance goals are larger measures that help
organizations meet specific standards and ensure their consumers' safety and business reputation
(Humphreys, 2008). The value of information assets is high, with standardized operations being
required to have robust control and compliance frameworks. For example, companies are now
required to move away from basic authentication to more secure systems that use multi-factor
authentication to ensure higher protection against data breaches and eliminate less reliable
applications that come with more vulnerability.
Today's regulatory standards have prescribed recommendations that seek to enhance data
protection and information security management for organizatio...

Very useful material for studying!


Related Tags