Blog

10.7. 2024

Ashen Ramdhani, DBA student at LIGS University

Interview with our DBA student Ashen Ramdhani, Warranty Operations Manager for the Middle East and Africa, Ford Motor Company of Southern Africa. Ashen joined LIGS University with the vision and dream of completing his DBA studies. Starting from the enrollment process, he was swept by our mission, vision, and the quality of education offered. We...

10.7. 2024

Peter Winkler, Ph.D. student at LIGS University

Interview with our Ph.D. student Peter Winkler, District Chief of Staff for the US House of Representatives from the United States of America. Peter has joined LIGS University in September 2017. Since then, he has participated in 2 international conferences. He has also helped his fellow students by leading 2 webinars on the topic of...

10.7. 2024

We are a family, we are LIGS!

Christmas is a special time of family, friends, and gratitude, and we want to thank you all for being a part of our family! We are LIGS! As a demonstration of gratitude to our President, Pavel Makovsky, who breathed life into this university, we created a video with the collaboration of our staff, lecturers, students, and other loved ones. Over-joyed...

10.7. 2024

The Techniques, Technology, Applications, and Software for Decrypting TLS and SSL Encrypted Data

Transport Layer Security also referred to Secure Sockets Layer is considered as one of the well known public key cryptography application across the globe. The app is well known for securing the web browser. We will explore by understanding more on TLS/SSL, moving to their technique and technology. And finally, review applications and Software for...

10.7. 2024

Differences in advance data extraction methods from the mobile phone

The paper will reflect the different tool classification used for mobile forensics. Understanding the different level allows individual to know which tools will be most suitable for mobile forensics. We will also need to know the pros and cons of each level. Understanding all these will result in the most suitable tools being used. The...

10.7. 2024

Boubakar Thiombiano, Ph.D. student at LIGS University

Interview with our Ph.D. student Boubakar Thiombiano, Permanent Secretariat for the Promotion of Microfinance and Officer in the Department of Studies, Statistics, Monitoring and Evaluation, Ministry of Economy, Finance and Development of Burkina Faso. Boubakar is a keen and hard-working student that has not missed a single webinar. He also participated in the international doctoral conference organized...

10.7. 2024

Communication strategies as a basis of crisis management including the use of the internet as a delivery platform

Crisis in contemporary business organizations is one of the worst challenges facing management. The aims of the study were: to determine the communication strategies as an essential for crisis management, to examine crisis management, to identify communication strategies, and to understand the use of the internet as an effective delivery platform for crisis communication. The...

10.7. 2024

Leadership Styles and Managing Stress Towards Organizational Productivity & Sustainability

Organizational productivity is pivotal in a challenging business market. Businesses strive to be at the top and capture as much market share as possible in order to sustain in such a competitive environment. Hence, business leaders are pushed to the very edge of their strategic management to maintain the growth and move further. In light of this...

10.7. 2024

Exploration of rooting and jailbreak techniques and tools

In this publication, we will explore in detail the rooting and jailbreaking techniques and tools. Retrieved from http://www.wikihow.tech/Root-Android-Phones, due to many varieties in Android phones, there is no single rooting method that will work for every phone or version of Android. But the common starting point is to download the appropriate rooting software for the...

10.7. 2024

Misperceptions of Information Security

Information cyber is on the rise, and it is affecting the operation of the company and the decision which the top management is going to make. We will explore the misperceptions of information security. The importance of assuring the security of information assets is becoming more critical every year. However, the critical areas of information...

  • Posts category