Censorship of the Internet Research Questions

Censorship of the Internet Research Questions Order Instructions: Your job is to complete one of the following research questions:

Censorship of the Internet Research Questions
Censorship of the Internet Research Questions

1) Digital divide crosses all borders, culturally and
geographically, discuss how the digital divide affects
society in 2014.

2) Now that you have a deeper understanding of society’s
relationship with IT from ISYS100 what do you think is the
biggest issue we need to address when it comes to
information technology? Discuss solutions to this issue
with supported evidence.

3) The information revolution of the last decade has
meant that there are so many more powered devices in our homes and lives. At what cost is this increase to our environment? Furthermore, are there any companies or organizations trying to offset this somehow?

4) Social networking now is about so much more than keeping up to date with your friendships. Crowdsourcing is
one such example. Discuss some of the biggest
collaborative projects that exist because of social media.

Censorship of the Internet Research Questions in Google

5) Google is a company that has created a roadmap for what IT companies should be like; explain how Google can be considered to be one of the world’s best companies and at the same time one of the world’s most secretive
organizations.

6) Throughout the world there has been an increase in discussions regarding “Censorship of the Internet”,
explain how Censorship can work in some instances but in others, it can be a detriment to society.

7) We live in a world where the internet plays a pinnacle role in our day to day lives. Discuss how the internet has caused an ethical debate on our information privacy.

Word Length: Approximately 2400 words

– 1 ½ spacing. (Paragraphs)

– 12 pt font

– SSingle-Sided Paper

– Verdana

– Referencing Style: Harvard or APA is satisfactory.

– Please remember that you will need to have at least Four (4)
varying references. For example: Journals, WebPages,
Newspaper articles and Text books
– You will need to include: Reference List and an Appendix.

Censorship of the Internet Research Questions Sample Answer

Censorship of the Internet

The Internet has over the past few years been used to suppress rising mass action calls against dictatorial nations and leaders leading to censorships all over the world. White (1997) describes censors as those who defend the predominant philosophy by which those who benefit are those who have gained status, power, wealth, and control within society; and want to legalize their prominence and the diverse societal, political and economic arrangements they govern. Article 19 of the Universal Human Rights Declaration states that everyone has the right to opinion and expression, these rights include freedom to seek opinions without interference, and to seek, receive and impart information and ideas through any media and regardless of frontiers (Universal Declaration, 1948). This is ideally what the censorship of the internet contradicts. Reinhard (2007) terms it as the government or authorities’ suppression of any public expression that it believes is a threat to its power or the societal expected code of conduct especially online through the use of the internet. Censorship is not only used to control politically divergent views, but also in the control of materials deemed obscene to people of a certain age. The motives of censorship vary and this paper will look at some of them as well as how it can work in some instances while being a detriment to the society in some.

According to Walid al-Saqaf (2012), there are various forms of internet censorship including surveillance and sever takedowns. This method is majorly used by governments to suppress groups that seem to use the internet to gain numbers in order to fight them. The governments watch then and what they post online and as a way to control them  by shutting down the servers, and cutting down such movements. Another tool used again majorly to subdue any aggression deemed dangerous by authorities is by use of slowing down of the internet speed and causing disconnections for bulk traffic. This serves to cut off or reduce the rapid movement and growth of such groups. There are, in addition to the above, the non-technical methods of surveillance, and they include the use of legal prosecution and detention. This is mainly used in the areas where ethical issues arise like cases of child pornography and some aspects of human rights violation. There are some laws that govern internet use and restrictions, when violated, the individuals in question can be arrested and prosecuted with the violations of the stated laws.

Recent research shows a growing trend in censorship majorly because of civil unrests with the Middle East and Asian countries on the lead. The Middle East and North Africa were seen to censor the social and political aspects of their population while others like Australia were keen on social content like child pornography (Al-saqaf, 2007). Others, on the other hand, have overhauled the internet and replaced the same with an intranet to control the use by the opposition and suppress any form of aggression.

Censorship of the Internet Research Questions and Benefits of Internet Censorship

Even though most of the times censorship is seen as a vice, it actually is beneficial in some circumstances. Harris (2011) argues that censorship is to some extent beneficial as it serves to watch and control some societal, ethical norms. Censorship of the internet especially where underage children are involved is by far beneficial as it does not only regulate access to materials that may harm them but some that or may hinder their proper growth and health as well as behavior. Some materials include contents with nudity, those that are vulgar and contents with various forms of violence.

Secondly, internet censorship can be said to be advantageous because, it controls the speed at which the right information gets to the intended users. The internet is empowered with speed as an advantage and if not controlled, unconfirmed information may easily flow to people; this may cause panic and unrests depending on the nature of information.  The control of the release of confirmed reports is necessary especially in wars or reports of accidents. The internet is full of materials and reports of issues that are unconfirmed that at times does not go well with a different culture, religious beliefs and are ideologically different. The internet has literally everything including information that one may need about military installations of different countries, censorship of this kind of materials and information is not only important for the safety of the nation within itself but also against its external enemies.  This not only leverages the nation’s stability, as well as protects it. There are also advantages like personal privacy protection; this is where censorship restricts the transfer of private data or information of individuals without their knowledge and permission. An example of such is when Google in Australia through street view cars collected private information through Wi-Fi (Shears, 2010).

Censorship also serves to control cyber bullying and scams. These are cases where internet users use the tool to threaten and intimidate other users racially, sexually and even use it to engage in illegal trade activities. Without such, the use of the internet would not be as intended as many unscrupulous persons will engage in illegal trade and earn a living from unfair gains. It is important for authorities to control what is posted on the internet and help ascertain how genuine they are in order to protect their citizens from online scams.

Most of the television shows are of violent nature and vulgar or contains nudity, without proper control the society will be corrupted by what they see on the screens. It can be argued that the internet has led to the increase in crime across the globe. The internet does not just teach one of how to handle a gun but where you can get one legally and illegally (Harris, 2011). Without censorship of such materials, it will soon be normal occurrences to hear of shootouts and daylight robberies with a greater threat being the minors who make up the larger population of users of the internet.

Internet censorship also serves to control and manage copyright laws infringement. Since almost all material is easily found on the internet, it would only be proper that their fair use be regulated as some of the producers earn a living from them (Mallisk, 2009). Online sites if not regulated will only print or permit access without this as a consideration. This not only hinders the growth and rise of new authors, but also squeezes the life out of the few remaining.

Gaille (2013) also suggests that the access and downloading of contents that belong to other entities without their permission or paying for the use is illegal and should not be allowed in any country. Internet censorship is equally important and can work as it helps control phishing schemes, these are schemes that are seemingly legitimate but work to steal one’s personal information for their personal use leading to identity theft.

Harmful Effects of Internet Censorship and Censorship of the Internet Research Questions

Whereas all these seem to be genuine and strong reasons to accept and implement internet censorship, it has equally far-reaching harmful effects to the society. Poland (2014) is of the opinion that, the internet has indeed become a vital component of our lives and has made the world a much smaller place. This is because through the internet, communication is now possible throughout the world and in minutes, a person can share thoughts and opinions and transmit them to the other side of the world. Limiting the use of the internet will hence, bring an interruption to this. It is not only a universal human right to share and express ones opinions.

Harris (2011) further states that internet censorship limits access to academic resources; this is because of the use of filters to block some key words normally used in search of adult contents. Although the intention is well aligned and ethical, some key words filtered will obstruct the access off relevant materials with no relation to the works that were meant to be blocked by the filters. A good example she states, is the book Moby dick, the book cannot be accessed in most schools with online filters because of the words in the title. Such resources are beneficial to students and filtering makes it impossible to access them

The internet has given the world a central meeting place (Poland, 2014). It has provided diverse cultures, religions, institutions and even people of different languages a place of common ground In that, they can all meet and share their diverse or similar views as well as, there intellectual and ideological issues, they also have through the internet been able to share their experiences in their different countries. Internet censorship comes in the way of all this progress and unity in diversity that the internet has brought about. This has even the major undoing of many nations because of the rampant sharing of ideologies, authoritarian regimes have been ruling in fear of appraisals as information from other states and how the populations in this countries managed to control or makes their grievances addressed. Limiting the usage of the internet would virtually close cut the relationships that people have worked to build and strive to maintain. This will widen the social gaps between nations and additionally hinders nations or the population from learning about others.

The financial implication of setting up a properly functional censorship and regulatory mechanism is relatively high (Harris, 2011). It is costly to put up any internet censorship remedy and the cost increases with the size of the institution, for example, the cost of putting up a firewall in a country would be far much higher that he one needed to set up the same for a school. There are the additional charges of monitoring and frequent updating and follow-ups needed. These costs are expensive and should be avoided. Developing nations have much more serious needs from their citizens than censorship and the funds used in such programs can be used to reduce and minimize if not control these urgent needs.

Poland A. (2014) points out that another detrimental effect of internet censorship is its effect on the marketing and sells of goods and services. Since censorship bars access of some information on the internet, some businesses are either partially or totally eclipsed either locally or globally, such actions prevent the growth and success of the business, which the governments depend on for tax and foreign exchange. Internet censorship does kill the competitive edge that the business would have otherwise had if it was not censored. This also limits the buyers from accessing the best available goods as they are only limited to some specific ones. This can also be abused by those in governments to only show that which they want bought and bar those that maybe of quality but will not profit them.

There is additionally the cases of media repression, journalists in certain countries are arrested tortured and jailed (Mallisk, 2009). China is said to be the world’s leader in jailing journalists according to the human rights body Amnesty International with about 30 journalists and 50 internet users said to be jailed as of 2008 (Mallisk, 2009). These actions bring fear and intimidate the internet users, frequent jailing and torture makes it hard for new writers and internet users to post issues of concern on the internet as the hawk eyes of the government are all over their virtual space. This act additionally kills creativity as even the poets cannot simply express themselves without the fear of being arrested and jailed.

Mallisk (2009) additionally states that in countries with cases of human rights violation and stringent censorship practices, it is overwhelmingly difficult to ascertain the extent of these violations. There are chances that many human rights abuses are concealed in such countries from the public through the repression of the media and internet usage. Mallisk (2009) further states that in China for example records of executions and their statistics are secrets of the states, various important events go unreported and even events in history are no taught in their schools. Additionally, those whose rights have been previously violated are threatened into silence. This is how much governments are willing and ready to go in order to control the internet and the freedom of expression. In 2007, close to 2600 blogs, websites and discussion forums were shut down (Global internet freedom consortium, 1997).

Factors that hinder Censorship Efforts for Censorship of the Internet Research Questions

In the cases of  controlling nudity and sexual content, it is evidently difficult to teach or train about HIV/AIDS and the sexually transmitted diseases without the use of at times graphic images intended to show the impact of these diseases and there effects. Withdrawing such content from the internet does not serve to help in their control and in educating the younger generation of their effects. Though graphics, these films or pictures do remain embedded in the human brain for much longer than written a material which is advantageous in education.

There is also the issue of curiosity, whenever something is hidden or kept away for any reason; it is human nature to find out why it was hidden. Internet censorship only serves to support this idea. More traffic is usually driven to sites, which governments are trying to shut down or with content that the state is trying to take down. If only the censoring organization would let them be, then no much attention would be given to them as they are. It is in our nature to try to find out why things are the way they are. This is because at times internet censorship has been used to obscure legitimate critics. Criticism that builds should be allowed and attended to as it works towards making it safe for others or for the growth of a nation or an institution.

Technological obsolesce is additionally  a factor of concern, this is because, technology is always changing and various ways to go round the installed firewalls and filters are being discovered, its increasingly becoming difficult to manage and control activities on the internet. Governments and institutional authorities thus need to equally speed up and catch up in innovation to keep them up to date. This is an expensive process as frequent replacements are needed and yet hackers simply build software at their own time and with least expenses. It is not worth fighting a war that will never end.

There is also the risk of prosecution, when a private or corporate website or blog is pulled down, the owner can and may sue the government for this. This may lead to unexpected expenses for the involved government as they may be required to pay for the losses incurred when the website or blog was shut down. This especially to the middle income countries is not worth it as they need to spend their little resources on other economically viable businesses.

Al-Saqaf (2012) explains that because of the internet’s importance to people, various ways have been discovered to circumvent the placed filtering and other censorship mechanisms, this is because more than 40 countries are filtering the internet and more than half a billion internet users are being filtered (32% of the world population). The global internet freedom consortium (2007) did a study and came up with a number of tools that have developed and are in current use to go around and access censored materials. Some of them include ultrasurf, which is the most utilized tool globally to beat internet censorship. Others include dynaweb and tor.  These are just but a few of the tools daily invented to curb governments censorship methods.

In conclusion, the internet is a tool that the world cannot live without. Our lives revolve around the internet, as well as our jobs, schooling and socio-political lives. Even though there are serious cases when and how the internet should be regulated, for example, in a bid to control access to adult materials to underage students, as well as a security function, internet censorship is far more detrimental because of its limiting factors. Pornography and violence are rampant within the current setup; this cannot, however, be blamed on the internet and its usage. Control measures can be put in place to help with such. Films with adult theme could put in place factors such as the requirement to have an access code or password meaning that one has to be a registered member to fully access such materials over the internet.

Additionally, governments and institutions should not act in contravention to universally set legislations like the freedom of expression. However much citizens push and go to extremes against the government, they should allow for opinions to be stated as some of them are helpful and will serve to improve service delivery. Nations like North Korea that have virtually and literally locked out the world and the use of the internet suffers from gross human rights violation and is an example of how much the internet is important to the world. The population should equally be responsible in reporting and posting of things over the internet, In nations that have set regulations governing the use of the internet , it would only be wise to use the internet as per the set laws failure to which one should be arrested and face the penalties of the infringement. Whereas these laws should not be hindrances to any angle of personal, social cultural or political growth, the users should be wise and not post anything that holds a different view as compared to that of the government.

Censorship of the Internet Research Questions List of References

Al-Saqaf, W. 2014, ‘Freedom of speech the battle continues 2012.’ Available from http://www.diplomacy.edu/calendar/webinar-online-freedom-speech-battle-continues(8 September 2012).

Gaille, B., 2013, ‘Pros and cons of internet censorship.’ Brandon Gaille in business. Available at http://brandongaille.com/the-pros-and-cons-internet-censorship/(december 10 2013).

Global internet freedom consortium, 1997. available from http://www.internetfreedom.org/

Harris, F., 2011, ‘Benefits of censorship.’ World Issues, 360. Available from http://www.worldissues360.com/index.php/benefits-of-censorship-4652/(december 6 2011)

Mallisk, D. 2009, ‘The internet: becoming an important communicative too media tool.’

Poland, A. 2014, ‘Disadvantage of internet censorship.’ The Houston chronicle, 2014.

Reinhard, C. 2007, ‘The ethics of censorship: should the government cover our children’s eyes?’ Ethica publishing, Colorado.

White, H. 1997, ‘The anatomy of censorship: why the censors have it wrong.’ University press of America, Illinois.

Unethical Nature of the Internet Essay

Unethical Nature of the Internet
Unethical Nature of the Internet

Unethical Nature of the Internet

Unethical Nature of the Internet – Private Information

Order Instructions:

– Word Length: Approximately 2400 words
– 1 ½ spacing. (Paragraphs)
– 12 pt font
– Single Sided Paper
– Verdana
– Referencing Style: Harvard or APA is satisfactory.
– Please remember that you will need to have at least Four (4) varying references. For example: Journals, WebPages, Newspaper articles and Text books
– You will need to include: Reference List and an Appendix.

SAMPLE ANSWER

Unethical Nature of the Internet – Private Information

The internet has been widely embraced in the society today, as it has become an indispensable tool of managing communications, interactivity, and connectivity.  The discovery of the internet has completely altered the way people live and work specifically in terms of entertainment, shopping and communication. The internet makes it possible for people to live inexpensively by making it possible for them to access news and information (Merkow & Breithaupt, 2002). However, with only a small amount of carelessness, individuals could misappropriate their private information and thereby compromising their security and privacy. This paper analyses the ethical aspects that have been brought about by the internet. First, there is an introduction to the concepts of privacy and ethics. Second, there is a discussion on the ethical issues that surround the internet in the form of privacy in areas of e-commerce, internet search engines, and social networking. Finally, measure to resolve the ethical issues are highlighted for use by the government, internet users and professionals.

Ethical issues on the internet

Ethical actions are those practices that may be termed as acceptable by the general public. One behavior that is regarded as ethical is that of ensuring that the privacy of others is observed (Carroll, 2006). Privacy is the right of doing own things without interference. With the rapid growth of the internet, the gathering, storage, retrieval, and dissemination of personal information has become more inexpensive and efficient. There have been issues that have been raised in regard to the accessibility, and manipulation of private information. If an individual’s private information in uncontrolled in terms of usage, circulation and release, then their privacy has been compromised. The public generally dislikes all actions that would lead to the misappropriation of information of private information. The presence of such possibilities on the internet raises the concerns of internet users with regard to the safety of their private information while they are online. During online shopping, using search engines and logging into social networking websites, private information may be leaked unknowingly.

E-Commerce Websites

In an attempt to offer more personalized services e-commerce websites have increasingly included more personalized features. This has served to create more steadfast relationships with customers. It has also increased online sales significantly on a per-customer basis. Survey data indicates a tendency of individuals to appreciate personalization. On the other hand, it has raised privacy concerns, which range from discomfort especially about search engines offering information about their most frequent purchases to concerns about who may get access to this information, with more specific fears of identity thieves, co-workers and government (Merkow & Breithaupt, 2002). Users are also required to offer their personal data at a website if they need to get personalized services. This raises concerns about the information. Sometimes users may turn down such offers on the basis of their privacy. There are various forms of personalization in e-commerce that are regarded a threat to the privacy of individuals.

Implicit and explicit data collection

Implicit data collection refers to that data, which is inferred based on the user’s habits on the internet (Merkow & Breithaupt, 2002). It is collected based on the queries placed by a user on the internet, browsing history and purchase history and may be used to offer further information to the user.

Explicit data collection, on the other hand, is based on the information that is obtained directly from the user (Merkow & Breithaupt, 2002). The user provides information about his demographics, ratings and preferences. Recommender personalization involves the user by requiring them to rate certain items in the order in which they interest them. Other sites require users to customize their pages according to their personal preferences.

Duration

Session or task focused personalization – This method places adverts on sites that relate to them. Adverts may also be provided based on previous actions. If a user buys items that relate to tennis, more items in the tennis category are presented.

Profile-based personalization – Some personalization systems create user profiles and continually add information that is provided either explicitly or inferentially every time the user visits the website (Merkow & Breithaupt, 2002). Cookies or login details may be used to access the website and to recognize returning users.

User involvement

User initiated-some websites require visitors to select customizations in the form of weather forecasts for their region, stock tickers, or news of interest. Users may also provide information about page layout that best suits them or the bandwidth constraints and require that their web pages are accordingly optimized.

System initiated-Every user has their content customized according to the information they provide either explicitly or inferentially. Users may be allowed to opt out of such customizations (Riedl, 2001).

Reliance on predictions

Prediction based – User’s inferred or explicit ratings may be used by the websites to generate interest based on the profiles of other users. Once the system discovers users with similar profiles, such information may be used to offer recommendation to both users interchangeably (Riedl, 2001). While not all recommendations end up as sales, they make the user get the feeling of being understood.

Content based – If a user expresses interest in one item or makes a request, they may get further recommendations based on such requests (Scassa, 2014). The request is used as a basis for determining other related likes so that the retailer attempts to satisfy them.

Privacy Risks

Some sites use a variety of these methods to maximize user experience. A good example of such sites is Amazon. There are various ways that e-commerce poses risk to user privacy (Carroll, 2006).

First, there is unsolicited marketing on the internet. While unsolicited market may be one of the less severe risks on the internet, it is still among one of the most mentioned risks on the internet (Fritsch, 2013). The risk therefore amounts to a sufficient concern for users who do not want unwarranted marketing. It has even led to the decision by some users not to engage in e-commerce. Users are also concerned that the information provided by them during purchases may be used to make targeted communication or may be made to other companies to make use of on targeted marketing campaigns. Furthermore, users fear that as a company gets access to more of their private information, it may get more interested in advertising to them.

Individuals are also uncomfortable about the automated nature of customization on the internet. Sometimes as websites try to figure out the needs of their users, they figure out needs that are completely uninformed (Levmore & Nussbaum, 2010). In some cases, individuals are not comfortable with the possibility of the information of such advertisements getting into the wrong hands and drawing wrong conclusions. Regardless of whether the company makes such wrong inferences, some people are simply uncomfortable with the possibility of being ‘watched’.

Secondly, price discrimination is another problem that arises from information given online. While there are possibilities that both the company and the consumer benefit from price discrimination, the response of consumers to price discrimination is more often negative (Jakubiak, 2010). Consumers are often concerned about both the aspect of being treated differently from other people and that of being charged more highly. Price discrimination also involves the diversion of more private information.

Thirdly, there is risk that user information is accessed by other users on the same computer (Riedl, 2001). Once a computer user accesses a website using login details, the computer is able to keep the private information in the form of cookies such that other users may be use the computer to access the website unheeded.

There is also the risk of the information in the phone being used against them in a court of law. Internet records are increasingly being used as evidence in a wide variety of cases. In cases where the character of the user is questionable, the information in user profiles, the content of their posts and their purchases may be used against them.

Information Privacy in Social Networking

Social networking is another great invention that is associated with the internet. Social networking sites allow individuals to create personal profiles and share such information publicly (Levmore & Nussbaum, 2010). While considering putting such information online, the user must consider the level of privacy that the user is diverging. If the individual fails to utilize the privacy settings when posting such information, their privacy is compromised. In such cases, any internet user is able to access their information without restrictions. The user is however able to use the privacy settings to limit the number of people who have access to every part of their profiles.

The real concern starts when individuals allow strangers or people who would not be trusted with their private information to access it (Levmore & Nussbaum, 2010). If there is no proper control of private information, there may be unethical attempts to use it. The risks may include blackmailing, price discrimination, embarrassment, physical stalking, and identity theft (Solove, 2007).

As noted above, one of the risks associated with social networking is stalking. A social networking profile contains information about the home location as well as the location of individual posts (Jakubiak, 2010). Users may also opt to share their location and hence expose themselves to burglary, robbery or even harassment. The possibilities that such information may be used to the advantage of criminals makes social media an ethical issue.

Information Privacy in Search Engines

Social networking sites are required to provide users with links to websites that contain information that is relevant to them. The topics vary with the interests of the user in regard to what information they need (Jakubiak, 2010). Search engines also make it possible for one to access private information that is placed on any platform online. People however are uninformed that their private information is contained on the database. Even in situations where the user is aware of such information being available on the database, their privacy is compromised when their information is obtained for unethical reasons.

The use of search engines further gets complicated as it even makes available some information whose privacy is limited. Such information includes membership of certain groups on social media even in cases where membership is limited (Levmore & Nussbaum, 2010). If the user was unwilling to share that information, then their information is compromised. Furthermore, such information may be used against them in different scenarios.

Measures to counter the ethical implications on the internet

As shown above, the internet has many ethical implications. While it may be used to do activities that are valuable to individuals and to the society at large, it also comes with a variety of challenges in information privacy (Levmore & Nussbaum, 2010). There are three major parties that must get involved in the process of controlling the problem of information privacy on the internet.

First, the government should create legislations intended for the management of various aspects of the internet. Governments should create legislations that limit the manner in which private information may be obtained and shared without their permission (Levmore & Nussbaum, 2010). Legislations will also aid to mend the damage done by carelessness at personal levels. If a global privacy policy is generated (probably with the assistance of the UN) the public will stand better protected from information privacy issues.

Self-protection by users

Users cannot rely solely on government legislations to deal with the issue of information privacy. It is also important that users participate in the process of self-protection by taking a variety of measures:

  1. Private information should only be provided consciously to websites. Users should explore the purpose for which their information is required on a website and whether such information will be shared with other entities.
  2. It is important that users use privacy settings to limit the accessibility of their private information. Furthermore, users should limit the information shared on these websites to limit their vulnerability on the internet.
  • Apply complex and varied passwords to protect personal information on websites on the internet. This will limit access of personal profile information and associated elements. It will also limit the number of profiles a hacker is able to hack.
  1. Enhance security measures by using firewalls and browsers to limit accessibility of privacy information.

Professionals

Professionals can also aid in minimizing the impact of information privacy on the internet.  They should minimize the amount of information provided as well as the ways in which they use the personal information so obtained (Jakubiak, 2010).  They should ensure that they do not get into the middle of privacy conflicts, as this is capable of limiting the deliverability and even removal from their job positions for being either unethical or controversial.

Professionals should also practice various measures to ensure that user information is secured:

  1. Enable collection of specific information that is important for them
  2. Ensure that information is updated by users every once in a while to eliminate to ensure that the information in their possession is accurate
  • Ensure proper communication about the use of the collected information and then only ensure that information is only used for the intended intentions.

In conclusion, the internet is an important tool in our everyday lives. It should, therefore, be managed and controlled to ensure that it will be in use for a long time. The information presented by internet users should also be managed to ensure that user data is always fully secured. The internet has become a threat to information privacy. This has become an ethical issue in that some private information may be misappropriated. Various platforms pose a risk to privacy on the internet. These include e-commerce, search engines and social media. To resolve the issue, various parties should be involved. The government should create regulations to govern the internet and the way the information is collected and shared online. Individuals should increase their awareness of internet risks so as to avoid them. Finally, professionals should promote ethical practice to avoid conflict with their employers, the law and the public.

References

Carroll, J. (2006). Privacy. Detroit: Greenhaven Press.

Fritsch, L. (2013). The Clean Privacy Ecosystem of the Future Internet. Future Internet, 5(1), 34-45. doi:10.3390/fi5010034

Jakubiak, D. (2010). A smart kid’s guide to Internet privacy. New York, NY: PowerKids Press.

Levmore, S., & Nussbaum, M. (2010). The offensive Internet. Cambridge, Mass.: Harvard University Press.

Merkow, M., & Breithaupt, J. (2002). The E-Privacy imperative. New York: AMACOM.

Nazario, J., & Kristoff, J. (2012). Internet Infrastructure Security. IEEE Security & Privacy Magazine, 10(4), 24-25. doi:10.1109/msp.2012.99

Riedl, J. (2001). Personalization and privacy. IEEE Internet Comput., 5(6), 29-31. doi:10.1109/4236.968828

Scassa, T. (2014). Privacy and Open Government. Future Internet, 6(2), 397-413. doi:10.3390/fi6020397

Solove, D. (2007). The future of reputation. New Haven: Yale University Press.

We can write this or a similar paper for you! Simply fill the order form!

A technology solution to a business problem

 

A technology solution to a business problem
A technology solution to a business problem

A technology solution to a business problem

A technology solution to a business problem in a specific company or organization that adds value

Order Instructions:

Objective

Back to Top

Provide an opportunity for students to apply a technology solution to a business problem in a specific company or organization that adds value to the organization.

Guidelines

Back to Top

Week 1: Begin thinking of a business problem that could be solved with a technology solution for a company or organization you are familiar with. Use the Q&A Forum to ask questions and discuss your ideas about the project. See the Course Project Technical Areas for ideas.

Week 2: Complete the Course Project Proposal using this format:

Course Project Proposal (1-2 pages, 75 points, due week 2, properly cite any external sources used)

Cover page

1.Subject of Course Project
2.Business problem statement
3.Name of the company or organization
4.Brief description of proposed solution
5.General benefits it will provide the organization
6.Audience to whom you are presenting the recommendation

SAMPLE ANSWER

Introduction about the company

Apple Inc. is an American multinational corporation dealing in designing, developing and selling of various consumer electronics such as personal computers, online services and computer software. The company well known products include ipod media player, Mac line of computers, iphone Smartphone among many others (Linzmayer,  1999).   The company was founded in 1976 by 1976 and has evolved over the years to become the world second largest company in information technology after Samsung Electronics (Carr, 2013). It is as well credited as the largest world mobile phone maker. To regain this position, the company must make its decisions well by considering different options. The supply channel is a very critical problem that requires insightful thinking before reaching a solution.

Business problem statement

Apple Inc. increased supply channel conflict with its B2B supply channel is a matter of great concern. The company keeps terminating its distribution agreements with its distributors’ which is unfavorable for business (Apple Inc., 2010).  The company has adopted a strategy which is meant to actively edge out it distributors by establishing self-owned stores. This is a strategy seen as strange by many since it is virtually impossible to build or establish stores globally (Muneesh & Sareen, 2012). As matter of fact its sales would drastically decrease before it covers any substantial ground in constructing the stores. Constructing its stores in various regions across the globe is an expensive affair that will cost the company lots of money. This strategy as well would take quite long time before completion, as the processes may be lengthy. Using already established distributors seems to be the most essential opportunity as the infrastructure is already in place. This option will as well take short period and the company will continue to enjoy large market share increasing its revenue. Since Apple Inc. is a company involved in provisions of technological solutions it can do better than avoid solving the supply channel conflict by building stores.

Proposed solution

  • The proposed solution for Apple Inc. in solving its B2B supply channel conflict is through e-commerce rather than the mechanical solution they have adopted.
  • E-commerce has shown great potential in solving B2B channel conflict.
  • E-commerce will reestablish harmony between the company and its distributors (Muneesh & Sareen, 2012).
  • This strategy involves carefully and in consultation with the channel partners resolving issues causing conflict such as pricing, promotion, distribution, communication and coordination.
  • A high-level solution involves ensuring that Apple Inc. increases its sales significantly through e-commerce adoption in conflict resolving.

General benefits to Apple Inc.

To start with, to Apple supply channel conflict will be a thing of the past, which will translate to more sales. The company’s sales will increase significantly, since its products will be offered through more than one channel that is self-owned stores, distributor’s stores and online (Muneesh & Sareen, 2012).  Thirdly, the company will have opportunity to focus on the clients’ needs through product development.

Audience

These recommendations are directed to company’s top management who make decisions that affect the company’s entire operations. The top management have been unable to generate a solution that will eradicate conflict on the supply channel thus these recommendations will go a long way towards assisting them rethink the earlier strategies.

Preliminary analysis of leadership and organizational behavior concepts

Leadership and organizational behavior play a critical role when making certain decisions. The leadership of the company must be flexible and accommodate other people advice on this important undertaking. The leadership is required to evaluate the options putting in mind the kind of results they want to achieve in future.  Organizational behaviors as well are important in reaching an amicable solution. The organization has a positive public image as one of the company that meets the interests and needs of the audience when producing its products. Therefore, the decision should as well consider   the organization behaviors and perception.

References

Carr, A. (2013). What you don’t know about apple. Fast Company, 174:35-38.

Apple Inc. (2010). Annual Report Pursuant To Section 13 15(D) of the Securities Exchange Act of 1934.  Retrieved from http://files.shareholder.com/downloads/AAPL/13890 19466×0 xS1193 125-10-238044/320193/filing.pdf

Linzmayer, O. (1999). Apple Confidential: The Real Story of Apple Computer, Inc.. No Starch       Press.

Muneesh, K., & Sareen, M. (2012). Trust and technology in B2B e-commerce: Practices and strategies for assurance. Hershey, PA: Business Science Reference.

We can write this or a similar paper for you! Simply fill the order form!

Software development project Assignment

Software development project
Software development project

Software development project

Order Instructions:

Please read this assignment 4 instruction.

Problems:

1. Prepare a small scale project. Use as your model one of the following:

a. Remodel project
b. Software development project
c. Events management project ( an awards banquet, or events at your choice)

Develop a statement of work for the project, using the format of: (1) background, (2) task, (3) objectives, (4) approach, (5) input source. Next, create a Work Breakdown Structure for the project.

What are the key steps, including work packages, tasks, and any related subtasks for the project?

2. Using the project you have identified in Problem 1, create a Responsibility Assignment Matrix (RAM) for it, identifying at lease six fictitious project team members.

3. Research a real project resources and develop a brief scope statement for the project, a general WBS, and any other information pertaining to the scope management for that project.

There are a total of 25 points for Assignment 4.
Grading rubrics for this assignment:

Criterion
Points
Quality and depth of analysis 20
Quality of Presentation
Effective presentation of information
Timeliness of submission

SAMPLE ANSWER

Background Information

This project provides a template to be used in software development. It includes a simple workflow accompanied with its statuses representing the tasks that go through the development project. Most software projects fail though. According to the Standish group reports, over 80% of the software development projects do not succeed. This is simply because they may be late, over budgeted, have some missing functions or a combination. The records also show that about 30% of the software projects are canceled before they are completed simply because of their poor execution. The projects that use the modern technologies such as the J2EE, XML, Java and Web Services are also no exception to this rule (Subramanyam, Weisstein, & Krishnan, 2010).

Task

It is important to carry out best practices during the project in order to run a successful software development project. It is important to put into consideration the development process and choose the most appropriate development lifecycle process because all other activities during the project will be derived from that process. Most software development projects however use some kind of spiral based methodology over a waterfall process.  The choices include the IBM Global services method, Rational Unified Process (RUP) and the eXtreme Programming (XP). What process to use in the project does not matter rather how well the process will be executed.

Gathering and agreeing on the requirements of the project is essential to a successful software project. The development team should understand what needs to be built not necessarily to all the requirements before any design and coding are done. Quality requirements could be divided into functional and non-functional requirements. The use of the use cases documents the functional requirements. Non-functional requirements on the other hand describe the characteristics of the system and performance of the application. They are important because of the major impact they have on the application architecture, performance and design.

The application architecture should also be chosen appropriately. This contributes majorly to projects failure if not chosen well. Tried and true architectural practices are known as patterns and they range from the java patterns, to EJB design patterns (Subramanyam, Weisstein, & Krishnan, 2010). The concept of antipatterns however is brought about by the projects that fail and they are valuable because of the knowledge they provide about what works and what does not.

A good design is mandatory despite having a good architecture. Most project managers either under design or overdesign their applications. Performing object oriented analysis and design using the UML is important for software projects. Code construction is the most visible task for a total project effort. It is equally important to the architecture, analysis, design and test.

Testing is an integral task in the software development project. It is not an afterthought when the schedule becomes tough. Instead, it should be done proactively meaning that the test cases are planned before coding is done and are developed while the application is under design and coding. Lastly, a successful project must be under project management. A good project manager is aware of the existence of the above mentioned tasks and applies the lessons learnt from the previous projects.

Objectives of a Software Development Project

The objectives are what give a project a clear direction and thus the most important thing that one can do in a project. Project objectives provide a measuring stick to make the project more effective. One only qualifies the venture as a success only if the project objectives are met. It is a practical way that enables the project manager to keep track of the progress made during the project and it does not matter whether what was to be done was actually done.

The project objectives should be done during the initial and planning processes of the project management. During the initial stage, the objectives are defined of what the project expects to accomplish. During the planning stage, they are just narrowly defined and they become part of the process in determining how the project will be accomplished.

The objectives should be clear and concise to communicate succinctly what the project should accomplish. Muddled objectives could show that the project was not necessary. The smaller objectives designed to help achieve a greater objective makes the task seem more manageable. However, its main importance is to ensure that members are able to make measurable processes.

The software development project is helpful in keeping the objectives in mind as it gives space for the objectives to be listed thus ensuring that the project manager is on track. By getting ideas from various stakeholders and team members, a project manager puts together a list of objectives that he or she believes will guide the project to a successful outcome.  Examples of these objectives are: Control on Project Lifecycle, standards and methodology, metrics, transparency, stakeholders’ rights among others.

Approach

The overall goal of the software development project approach is to allow clients to have total visibility all throughout the project. If the project is broken down into logical iterations, the project manager and the team are able to focus on all the aspects of business in detail without feeling overwhelmed. Examples of the software approach include: the document initial scope, draft statement of work with fixed price and schedule, among others.

Input Source

Inputs and preconditions in the initial stage of the software testing are not feasible not even with a simple product. This is the most fundamental problem in the software testing. The number of defects in a software product can be extremely large and the infrequently occurring defects could be difficult to find during the software testing. Software developer however can test everything. However, they can at the same time use a combinatorial test design to identify the minimum test number for the required coverage (Di Tullio & Staples, 2013).

Work Breakdown Structure

The analysis phase in the project has two tasks: the Glossary and the Requirements Specifications. The Requirements Specification is the divided into three sub-tasks: the Use cases, Supplementary Specification and the Reporting requirements. The sub-tasks however can be broken down further into components that could be estimated for the time, cost or the resources required (Lee & Xia, 2010).

Responsibility Assignment Matrix

OBS Units

WBS Activities

1.1.1 1.1.2 1.1.3 1.1.4 1.1.5
Project management R
Analysis P RP
Design RP
Construction RP
Testing P RP

 

R=Responsible Organizational Matrix

P=Performing Organizational matrix

Software Project Management Resources

Resources are always limited all over projects. The human and software resources are always limited since they service multiple projects. Thus, the onus on a software project manager is to organize his project management resources carefully and use them in the right way to achieve the set objectives for the ongoing project. The feasibility to deploy more resources so as to reduce the calendar time is applicably limited in the software development projects. Thus the available resources need to be managed effectively. Example of resources used in the software development project is: time, the human resources, computer resources and money (Di Tullio & Staples, 2013).

The resources are majorly classified into four standpoints: Availability, place of availability, elasticity, and shared and dedicated. Availability could be recurring or depleting. An example of recurring is the human resources that are equally available day-after-day. Depleting resources are like time and money whereby their use depletes them. The place of availability could be classified as movable or immovable. An immovable place of availability is only available in the situated place and cannot be moved from one place to another. For example, the computer resources are not moved from one place to another during the project. A movable place of availability like the human resources and even money can be moved from one place to another.

Elasticity is further classified into elastic and plastic resources. The elastic resources are those that can have their supply either increased or decreased such as the human resources and money. Plastic resources, however, cannot have their supply extended. A good example for this is time. Lastly, the shared resources are those that are needed for only a short time such as the database Administrators. Dedicated resources are those assigned fully to the project such as the programmers.

References

Di Tullio, D., & Staples, D. (2013). The Governance and Control of Open Source Software Projects. Journal Of Management Information Systems, 30(3), 49-80.

Lee, G., & Xia, W. (2010). Toward agile: An integrated analysis of quantitative and qualitative field data on software development agility. MIS Quarterly, 34(1), 87-114.

Subramanyam, R., Weisstein, F., & Krishnan, M. S. (2010). User Participation in Software Development Projects. Communications Of The ACM, 53(3), 137-141.

We can write this or a similar paper for you! Simply fill the order form!

The Impact of Complex Adaptive Systems Discussion

The Impact of Complex Adaptive Systems Discussion
The Impact of Complex Adaptive Systems                                  Discussion

The Impact of Complex Adaptive Systems Discussion

Order Instructions:

The Impact of Complex Adaptive Systems
As a teenager beginning a new school, you likely searched for other students who were similar to you to befriend. You may have looked for students with similar backgrounds, interests, hobbies, and academic abilities. It is likely that no one explicitly told you to do this but that you did it naturally. Others did likewise, and groups began to form. As your group began to interact with other groups, rules governing these relationships may also have formed. Again, these relationships were likely not instituted by anyone in formal authority but passed informally among members and between groups. However, some members may have deviated from these informal relationship rules. If the influence of these individuals were strong enough, they could permanently alter the relationships within and between groups.

Those who apply complexity theories suggest that organizations and even entire industries develop in much the same way as individuals or entire organizations pursue individual goals, react to the actions of others, and form relationships. Scholar-practitioners must ask themselves what implications these theories have for those attempting to develop strategy for modern organizations.

To prepare, review this Week’s Learning Resources on complexity theory. Consider the potential impact of a complex adaptive system for the organization you chose for your SSP.

By Day 5 of Week 5, read all of your colleagues’ posts and respond to two colleague’s individually in one of the following ways:

•Critique your colleagues’ analyses of how a small change in a system may lead to large or radical organizational transformation, and offer additional insight from your personal experience or the literature.
•Refute or support your colleagues’ analyses of the potential impact of complex adaptive systems on leadership using an example from your own experience or support from the literature.
•Refute or support your colleagues’ analyses of the potential impact of complex adaptive systems on innovation using an example from your own experience or support from the literature.
•Answer one of the questions posed by your colleagues in their posts.

Colleague post 1 (Geraldine)
The Impact of the Complex Adaptive Systems

Organizational strategic goals is set up by executing the traditional strategic thinking (“Strategy,” 2005). Many attributes exist within the organization that causes the inconsistent, unlink processes, and business units key relation disconnections. CAS acronyms stand for complex adaptive system. CAS defines how corporation classifies innovation, complex as living machine, and growing organization (Lucas, 2004) and describes as organizations compete with other and compete with other organizations in the same trade is a form as a complex system (Stacey, 2011). Scholars describe combination of a number; populations of entities called as agents, each behaves according to the define set of rules (Laureate Education, 2013; as cited by Stacey).

The Impact of Changes within a CAS

Organization carried out many changes by the force of the changing environment and advanced technology. Internal business units within CAS transform due to the communication and collaboration with other business units (Stacey). IBM has undergone many changes and transformed over the past 100 years. For example, the business focus transformed from a hardware product offering to product and services offering. IBM today has been committed as service oriented.

During the revolution, the organizational culture depends on their CM known as changes management to ensure the success of the project deliverables, while the IT industry will make significant transformations over time as well. IBM cultures innovative thinking, with that a great collaboration and communication, this attributes is one key for the technology enhancement and advancement, procedural and processes improvement.

Potential Impact of CAS on Leadership and Innovation

The organization creates innovative thinking culture; leader encourages employees on innovation and management uses technology and skills to advance processes and competitiveness (McCarthy, 2003). New product and services offering is a key differentiating themselves from another industry. IBM and Apple were the major company during the personal computers (PC) era. The product serves the same deliverables, although serves different types of entities. For instance, Apple was more focus with a graphical interface, whereas IBM focuses with a command line interface system. Microsoft dominated the PC operating system and transformed the PC by incorporating IBM, Apple, and other ideas.

Communicating with the agents within the CAS is the key, because if communication does not exist, then innovative thinking and technology advancement would not stimulate for driving the technological growth. Still true today, a greater collaboration and communication is still the key and continuously exercise. CAS more significant today than ever value, an innovation and flexibility must exist to be sustainable.

The question remains on whether the organization measure the results of these interactions attribute aligned with the leadership expectations (Laureate Education). What is the leadership perspective about the system complexity? What is the next big thing for PC? How quickly consumer adapt the advancement of PC? Any advice for IBM, Microsoft, or Apple?

References

Baran, M. (2010). Teaching multi-methodology research courses to doctoral students. International Journal of Multiple Research Approaches, 4(1), 19-27. doi:10.5172/mra.2010.4.1.019

Fleming, L., & Sorenson, O. (2001). Technology as a complex adaptive system: evidence from patent data. Research Policy, 30(7), 1019-1039. Retrieved from https://www.funginstitute.berkeley.edu/sites/default/files/Technology

Harvard Business School Press. (2005). Strategy: Create and implement the best strategy for your business. Boston, MA: Author

Hill, A., & Brown, S. (2007). Strategic profiling: a visual representation of internal strategic fit in service organisations.

International Journal of Operations & Production Management, 27(12), 1333-1361. doi:10.1108/01443570710835642.

IBM. (2014). About IBM. Retrieved from http://www.ibm.com

IBM Human Ability and Accessibility Center | Industries … (n.d.). Retrieved from http://www-03.ibm.com/able/industries/government/execbrief_beyond.html

Laureate Education (Producer). (2013). Analyzing complex adaptive systems [Video file]. Retrieved from https://class.waldenu.edu.

McCarthy, I. P. (2003). Technology management–a complex adaptive systems approach. International Journal of Technology Management, 25(8), 728-745. Retrieved from http://beedie.sfu.ca/profiles/IanMcCarthy

Colleague #2 post(Quintin)
The Impact of Complex Adaptive Systems

The field of complex adaptive systems theory (complexity) seeks to understand how order emerges in complex, markets, and social systems. High smith (2013) stated “complex adaptive systems provides an alternative to the linear, reductionist thinking that has ruled scientific thought since the time of Newton.” Complex adaptive systems theory maintains that the structure emerges from the interaction of individuals or a group. Successful business transformation has proven to be a complex issue. Cumming and Norberg (2013) stated, “In Darwin’s theory, it is commonly held that the evolution is a gradual process in which all species go through changes at regular intervals.”

Semetsky (2013) described CAS as a living system, which has several recurring conditions. The critical starting point from which the system enters into a presence at the edge of chaos is Disequilibrium. Semetsky described disequilibrium as being fluidity. Merriam-Webster defined fluidity as “the quality or state of being fluid and the physical property of a substance that enables it to flow.” Keyhani, Lévesque, and Madhok (2013) described disequilibrium as a “state in which old processes and strategies are disrupted.” Presence at the edge is an active state, which is a condition that allows old processes, structures, and customer to yield or try new approaches. Highsmith (2013) explained cultivation of self-organization and emergence are results of distributed intelligence. Systems achieve order because multiple local agents interact and those interactions produce unintended outcomes without the intervention of a central controller. Organizations take on properties and structures that are unexpected because people and groups. The most one can do to change and improve themselves is relative to what the other agents are doing (Bolman & Deal, 2013).

Highsmith (2013) described CAS’s as being characterized by perpetual novelty. In an economy, the agent may be an individual or household. Control of the CAS tends to be highly dispersed. A CAS has many levels of an organization with agents at levels servings as building blocks for agents at a higher level. A group of individual workers will produce a department; a group of departments will form a division, and will continue to build throughout the company and world economy. The systems processes are learning and adapting to changes in the system. The agents continuously throughout the process are exchanging information.

Alcock, Burgess, and Hasan (2013) described CAS’s as fluidly changing collections of distributed interacting components that react to both environmental and to one another. Examples of CAS’s include power grids, the internet, social groups, and human society. Power grid refers to the electrical grid that delivers electricity from suppliers to the consumers. The grid has stations that supply electricity to different areas and equipment. Power travels from the plant to the consumer to use for heating, lighting, sound, and refrigeration. Power failure can cripple plants, firms, airports and many other locations that require power. Power grids that cease to operate can cause broad hardships. Devices that need power can stop operating until powers restored. People can die from extreme cold or excessive heat, and the economy could suffer billions of dollars in damage.

Bullock et al. (2014) described how leaders of organizations expect to achieve stability by reducing complexity through codification, solving problems using reductionist rather than holistic thinking, understanding critical cause and linkages, and engaging in complex planning for a world they believe is predictable. Thus, leaders cannot control the future because, in complex systems such as organizations, unpredictable internal dynamics will determine future conditions. Heylighen (2013) described how leaders have learned the importance of interactions, correlation, and unpredictability among individuals. Leaders facilitate communications, but they do not direct communication. The leader allows communication to emerge through linear processes. Involved leaders facilitate development by becoming catalysts for actions, and function as “tags” Tags help speed up specific behaviors by directing attention to what is important and providing meaning to events.

Collins, Fizzanty, and Russell (2013) described that collaboration with other leaders in other areas is important to reduce problems within the organization. Collaborative members suggest that a shift in power relates to change and emergence of new patterns of interactions. Leaders can have available a list of occurrences that can happen and ways to solve the problems. Each leader or agent can have control of their station during any problems within the system. Leaders have to be flexible and recognize change has to occur. The fix used yesterday may not work with the same issue today. Schneider (2012) described leadership as an indirect, catalytic process that facilitates productive self-organization, a movement in which activity reformulates around a common cause.

Examples of CAS include the ecosystems and the biosphere. At the global level, the homeostatic nature of processes crucial to the maintenance of life, especially atmospheric processes which treat the biosphere. Another example of CAS is power companies. Power companies provide power to millions of customer all over the US. When part of the grid goes bad, if not properly corrected, power loss could affect millions of customers. The dispersed and local nature of an autonomous selection process assures continual adaptation.

Leaders cannot predict the future; can leaders use models to give them an idea of what could happen in the complex adaptive systems related to their organization?

A complex system has the ability “to switch between different modes of behavior as the environmental conditions are varied.” It is adaptive. What would be the outcome of a complex adaptive system that makes the incorrect decision/malfunction. Example: Medical equipment used to sustain life.

References:

Alcock, C., Burgess, L., & Hasan, H. (2013). Information systems for the social well-being of

senior Australians in building sustainable information systems (pp. 89-100). New York,

NY: Springer.

Bolman, L., & Deal, T. (2013). Reframing organizations: Artistry, choice, and leadership. Hoboken, NJ: John Wiley & Sons.

Bullock, J., Colombo, D., Linkov, I., Seager, T., Sweet, D., Tylock, S., & Unrath, U. (2014). Sustainability awareness and expertise: Structuring the cognitive processes for solving wicked problems and achieving an adaptive state. Retrieved from doi: 10.1007/978-94- 007-7161-1_5

Please answer each colleague post individually with three references each !!!!!

SAMPLE ANSWER

The Impact of Complex Adaptive Systems

Colleague One

In response to the post made by the first colleague, Geraldine, I agree with him that each and every organization has strategic goals, which are executed through strategic thinking. Nonetheless, there arises the need to specify that modern organizations have fostered the application of complex adaptive systems by reinforcing their operations. Given the definition of the term Complex Adaptive Systems, which Geraldine notes as being the process of classifying complex living machines and innovations so as to stimulate growth in organizations, the example given on the PC industry adds a different perspective to the argument. This is because even though the industry was shaped by the existence of competitors who impacted on the micro environment through innovations, research and development, it is still appreciated that the slotting in of strategic managers, market researchers and public relation officers facilitated the integration of CAS (Hill & Brown, 2007). In the end, the complexity of the relationship between Apple, IBM and other companies led to a transformation of the industry where currently, companies that were previously specialized in software programming such as Microsoft have ventured into hardware production through mergers and takeovers while hardware producing companies such as IBM have vertically integrated into software programming.

From this example, the impact of CAS is seen as having a neutralizing impact on the growth of the PC industry as all the companies have vertically integrated. This critique moves the argument closer to answering the questions posed by Geraldine asking whether organizations have a way of measuring the results accrued from an interaction of the adaptive systems. The answer to this question is yes. This is because the inauguration of various departments into modern organizations facilitate the identification of key parameters that cause an impact on the adaptive systems (Solvit, 2012). Additionally, the leadership perspective has increased thus necessitating the creation of specific departments to monitor the efficiency of the system. As a result, the next big thing for PC is further vertical integration where companies will be self-sufficient by creating their own software and hardware respectively (Hobbs & Scheepers, 2010). The consumer are very adaptive because the increased competition courtesy of CAS has led to more sophisticated innovations at a relatively low cost. I would advise Apple, Microsoft and IBM to invest more in research and development so as to create more user friendly PCs.

References

Hill, A. & Brown, S. (2007). Strategic profiling: a visual representation of internal strategic fit in service organizations. International Journal of Operations and Production Management, 27(12), 1333-1361.

Hobbs, G. & Scheepers, R. (2010). Agility in Information Systems: Enabling Capabilities for the IT Function. Pacific Asia Journal of the Association for Information Systems, 2 (4).

Solvit, S. (2012). Dimensions of War: Understanding War as a Complex Adaptive System. Paris, France: L’Harmattan Press.

Colleague Two

The second colleague (Quintin) acknowledges that the complex adaptive system theory defines the process of attaining order in complex markets and social systems. I support the definition of the theory since it seconds the ideas by Alcock, Burgess & Hasan (2013), who identified that CAS is pertinent in integrating complex business ideas. A critique of this note is that the author identifies more with many disciplines that skip the main logic behind the application of the theory in modern business scenarios. In spite of the scattered ideas, the author acknowledges that CAS is likely to result into distributed intelligence. By so doing, the systems attain order by interacting with the agents and this results into unintended outcome. In my opinion, which is seconded by Bronder and Pritzi, (2012) the central controller guides the reaction of the various stakeholders thus their outcome becomes focused towards using the integrated system to maximize on profitability and returns realized from a business. The process of gaining from applying the CAS theory is advanced by the institution of a learning organization where the employees are motivated into learning new skills that will help in shaping the company into adapting to the new systems. An example of this complex adaptations is seen in the technological advancement of medical equipment and machinery which rises the need for hospitals to create learning environments where their medics can interact with the macro environment through social networks and communication (Holland, 2006). By so doing, a cohesive system is created by borrowing knowledge from other better performing systems.

References

Alcock, C., Burgess, L., & Hasan, H. (2013). Information systems for the social well-being of senior Australians in building sustainable information systems (pp. 89-100). New York: Springer Press.

Bronder, C. & Pritzi, R. (2012). Developing Strategic Alliances: A Conceptual Framework for Successful Co-operation. European Management Journal, 10 (4), pp. 412-421.

Holland, H. (2006). Studying Complex Adaptive Systems. Journal of Systems Science and Complexity, 19 (1), 1-8. http://hdl.handle.net/2027.42/41486

We can write this or a similar paper for you! Simply fill the order form!

Internet information privacy Essay Paper

Internet information privacy
Internet information privacy

Internet information privacy

Order Instructions:

We live in a world where the internet plays a pinnacle role in our day to day lives. Discuss how the internet has caused an ethical debate on our information privacy.

SAMPLE ANSWER

Internet information privacy

Internet has become a common feature that affects every individual in the world in one way or the other. The use of internet services has been utilized in several activities ranging from the commercial to non-commercial activities. According to the Google report released in October 2012, more than 2.5 million people are online in every minute (Chung & Paynter, 2002). This is a remarkably high number of internet utilizers’ compared to the early years that the internet was introduced. The ranges of activities that are conducted online have also increased greatly. The internet has basically been utilized in the sharing and transferring of information between individuals all over the world who are set apart geographically. The increased numeracy of the internet users has led to the use of the internet services unethically (Chung & Paynter, 2002). Other people have utilized the internet for criminal gain. There are several websites that the individuals are asked to enter their details before they start using the services of those websites. The privacy and security of personal information is very questionable when conducting transactions and communications online. This paper focuses to address the degree of information privacy over the internet. The information security threats especially in money transactions have led to lack of trust among internet users especially in the commercial sector (Domingo, 1999). Businesses are faced with a very great challenge of securing customers information or users of their websites confidential information. Hackers have been recorded in the recent past as being responsible for accessing user’s information and using it for malicious purposes. Needless to say there is a dire need for websites and internet users to protect and keep their information private to avoid so many inconveniences.

Beckett (2004) identified the advantages of utilizing internet as a means of information transfer than any other media as follows; the internet is global, the use of internet in the transfer and exchange of information and data is not limited by geography. People who are utilizing the internet can be able to send and receive data or information from one point to another irrespective of the distance and geographical barriers between them.

The internet information exchange is very interactive. Human relation with the machines is very interactive and people are able to exchange information over the internet without any much difficult. just like in human-human interaction the machines once they are able to connect to the internet then the individuals can use their machines either phones, computers or any other digital device that is internet enabled to communicate with each other effectively.

Several websites have enabled the use of dialog in the communication. Skype recorded 12% of internet use according to the Google report 2012. The softwares that are used in this website are able to enable dialog between the individuals that are communication online. Video conferencing are some of the other services that are provided over the internet which have enabled live dialogues between individuals who are geographically set apart from each other. Organization conducting transactions online are able to reach and negotiate with the customers online and this leads to better customer relations.

One of the most outstanding advantages of utilizing the internet is that information transfer is almost instantaneous. When transferring information over the internet as long as the sender and receiver are available online then the transfer of the message is very fast irrespective of the distance between the users.

The cost of communication is also very minimal over the internet. Unlike communication over other media, the internet provides the cheapest type of communication that can be utilized by individuals to carry out communication. However, the cost varies depending on the gadget that is used in accessing the information. The size of screen used to display the information matters a lot and corresponds to the cost that is used in accessing the internet. For instance, large screen uses large amount of data in displaying the information over the Google search engine.

Yeshwantrao & Jadhav (2014) argue that huge numbers of internet attacks happening nowadays are focused on the exploitation of individuals, financial organizations and institutions in order to earn money. This has seen several institutions that are poorly protected loss millions of money over the internet transactions. according to the two one of the most serious threats to the internet is the presence of large number of infected computers in which either the owners are unaware of their computer infections or they are aware of it but do not know how to deal with those threats to get them out of their computers.

Yeshwantrao & Jadhav (2014) Botnets are the most dangerous threats to the internet security. The botnet problem is very global in nature. The authors have defined a botnet as a network of computers that are infected with malicious programs that allows cybercriminals to control the infected machines remotely without the knowledge of the users. Other authors refer a botnet as a zombie network. Zombie network is a network of infected computers (zombies) that allows cybercriminals to control the infected machines remotely without the owner’s knowledge (Ahmad, 2009).

Botnet refer to the computer networks using the distributed computing software by the botnet controller giving instructions directly to the small number of machines that are infected within the network. These smaller machines take the responsibility of passing the instructions to other computers in the same networks usually through the Internet Relay Chat. In this order the instructions are passed in a hierarchical order just like in administration in an organization. We have the botnet master which is the point of origin of all the instructions; this is like the CEO of an organization. Then we have the small machines, just like the supervisors in an organization they take the instructions from the CEO. Then the computers (zombies) are the ones on the ground to perform the tasks.

Bots enter into a person’s computer in many ways. One of the ways that they enter is through searching along the network for those computers that are highly vulnerable and unprotected computers to infect them. When they find any machine along the network that is unprotected they quickly infect the machine and report back to the bot master that they have infected a specific machine along the network. After reporting to the master then they have to keep hidden until they are instructed to perform a specific function by their master. The image below adopted from Yeshwantrao & Jadhav (2014, p.123) shows the working of a botnet using DDoS attack.

After understanding the working of a botnet we need to understand how the botnet attack threatens the privacy and security of information over the internet.

Distributed Denial-of-Service (DDoS) attack on a network basically causes the loss of service provision to the computer users. This entails loss of internet connectivity when actually the internet is stable and should be available to the computer. To launch a DDoS attack using Botnet has several advantages that include multiplying impact of the attack without the requirement of any IP address spoofing. Attackers have spent a lot of time and effort on improving such attacks.

Spamming is also another information security threat. A spam is basically a range of messages that are similar to each other that are sent to a series of receivers who have actually not requested for them services of the emails or who have not subscribed to receive the emails that are sent to them. A person involved in spamming is called a spammer. Blogs, forums, social networking sites and any other form of online sharing are very vulnerable to this type of attacks. Individuals should be very careful on the type of messages that they receive in their inboxes on either facebook or the emails. In addition, commenting and sending messages anyhow without understanding the intention of the message receiver can also be vulnerable to these attacks. Some of them are designed in such a way that the moment you respond to the emails or messages then an automated software crates rubbish posts with links that are usually unnecessary and unwanted. Spamming has advanced and nowadays it has gone over to undesirable adverts on wireless devices such as phones.

Phishing and Identity Theft (ID Theft) is an information security threat. The term phishing relates to the term fishing. Fraudsters and attackers behave like fishermen. They send out a lot of deceptive messages over emails (the bait) to mostly random addresses over the internet. These emails are very deceptive in nature and they appear very promising in terms of finances. For instance, they can come in form of engaging in a competition, which the email receiver never participated in the real sense. At the end, they deceive the receivers to reveal their personal information in terms of things like the social security number, financial account details and other identity information.

Ahmad (2009) classifies phishing into three types. The first one is bonk- an attack on the Microsoft TCP/IP that can crash the attacked computer because it hinders data communication in the stacks of the computer. The second one is the RDS shell- this is a method of exploiting the Remote Data Services components of the Microsoft Data Access Components that lets remote attackers run commands with system privileges. The third one is Win Nuke- an exploit that can cause NetBIOS to crash older Windows computers.

A malware is a malicious software designed d to cause damage to the computer without the owners prior consent. Viruses and worms are the mostly used malwares. According to Ahmad (2009), a computer virus is a program written to alter the way the computer operates without the permission of the user. a worm on the other hand are viruses that replicates and executes themselves spreading all the computer causing damage to the way the computer functions.

`Another form of attack is installing of advertisement add-ons and browser helper objects (BHO’s).In advertising, the Botnets are used to spread new bots through the use of adwares (used in placing adverts on the internet).this one normally becomes very easy as all bots can implement mechanisms to download and execute a file through HTTP or FTP. Some bots may cat as HTTP or FTP servers for malware. Fake websites are set up through which companies p[lace adverts by signing up and registering for what they believe is true advertising of their products. with the help of a botnet automatic clicks can be enabled which are meant to deceive the company that there are a thousands of people who clicked to view their products when in the real sense nobody clicked.

Sniffing Traffic (Traffic Monitoring) is a very sensitive botnet attack. Bots can also be used as a packet data top watch for certain specific information that is used by individuals over the internet. This information entails the passwords and log in details that individuals use in logging in to specific sites. When the attackers get this information then they can use it to log in to the site and get access to other useful information. In this case, the individual assumes the responsibility of the original owner of the details. Then they can alter the details for their own personal gain.

Attacking IRC Chat Networks is a security threat. The victim network is flooded by service requests from thousands of bots or by thousands of channel-joins by bots. In this way, the victim IRC network is brought down similar to a DDoS attack.

Recently mobile Botnets was brought in notice as viruses, worms, Trojans, spyware and adware targeting the mobile platform. Mobile phones seem overtake desktop and laptop computers as the preferred way of connecting to the internet. Android Botnets (such as Spam Soldier) have now been discovered. Spam Soldier Botnet steals money by sending an SMS to selected numbers without the Android user knowledge. The malware spreads by sending SMSs from the infected device to other mobile phones, attracting the user to install the malware. Android Botnets can be used for identical attacks that personal computer based. Botnets have been used, such as DDoS attacks, identity theft, etc.  The surface area of devices is thus rapidly growing, making Botnets a much greater threat – along with the complementary increase in the threat of malware, DDoS, identity theft, phishing

Al-Fadhli (2008) recommends the actions that should be taken by the network administrators in order to prevent the attack by bots. The first one is the usage of the Intrusion Preventive Systems. These are systems which are designed to monitor network activities in order to detect undesirable activities in real time with the task to block them from acting. Undesirable activities include activities that usually come in form of malicious inputs to target application or computer in order to gain control of the machine. General awareness of the security threats for all online users is very important .Set the operating system to download and install security patches automatically and the activation of antivirus software. Use firewall to prevent the system from attacks while online. Downloading software from websites, that one knows and which have good reputation in the software market. Use antivirus, antispyware and anti-Trojan tools and regularly update them. Use CAPTCHA texts as tests against websites that are not genuine.

In detecting botnet the following should be used to detect the botnet attack. Signature-based Detection:  this technique entails identifying the Botnet commands and storing them on the computer so that when the system comes into the commands which are similar to the one stored it gives an alert. Anomaly-based Detection: in this method it requires observation of the system for unexpected behaviors of the system. This includes traffic jams that are unnecessary and an abnormal behavior of the computer system. DNS-based Detection: DNS-based Botnet detection based on the DNS information because bots normally begin connections at the with the C&C server to get commands. Data mining-based Detection: Data mining aims at detecting patterns of data in order to discover regularities and irregularities in large packets of data.

In responding to botnet attacks the following can be applied; The user should disconnect from both the internet and any other local network connections immediately they discover a virus infection. Secondly scan the entire computer system with fully updated anti-virus software and anti-spyware. Inform appropriate organization or institution if the user had stored some confidential information on the system. This includes banking details. Change passwords and other usernames with immediate effect. Network administrators should isolate the attacked machine from the network. Report unauthorized access actions to the authorities.

From the discussion above network information security is indeed a threat to internet users. Information security is everybody’s responsibility as long as they are utilizing a network and accessing the internet. In order to ensure that the organization takes care of its information it is necessary to educate the internet users on the various security threats that come with internet transactions.

 Appendix

How to use usage of the Intrusion Preventive Systems in botnet prevention

 References

Ahmad, A., 2009. Type of security threats and its prevention. Ateeq Ahmad, International Journal Computer Technology & Applications vol. 3(2), 750-752. Northern Border University: Saudi Arabia.

Al-Fadhli, M., 2008. internet and privacy. Information Systems and Information Society, research training programme, 2007-2008.The university of Sheffield.

Beckett, R., 2004.  Communication ethics and the internet: intercultural and localizing influencers. International Journal of Information Ethics, Vol. 2 (11/2004). Communication Ethics Limited: United Kingdom

Chung, W. & Paynter, J. 2002. Privacy Issues on the Internet. Proceedings of the 35th Hawaii International Conference on System Sciences – 2002. The University of Auckland: New Zealand

Domingo R. Tan, 1999.  Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and European Union, 21 Loy. L.A. Int’l & Comp. L. Rev. 661 (1999). Available at: http://digitalcommons.lmu.edu/ilr/vol21/iss4/5

Yeshwantrao, S. &  Jadhav, J. 2014. Threats of Botnet to internet security and respective defense strategies. International Journal of Emerging Technology and Advanced Engineering l, Volume 4, Issue 1, January 2014.

 We can write this or a similar paper for you! Simply fill the order form!

Effects of Computer Technology Essay

Effects of Computer Technology
Effects of Computer Technology

Effects of Computer Technology

Order Instructions:

This is a discussion essay .it must use formal academic language and conventions, write in full sentences in logical paragraphs, and in the Discussion Essay format as outlined in your study guide.

You will need a minimum of 5 sources in your Reference .You must have in-text referencing and a Reference list using correct formatting for database resources, which are explained in the Referencing Style Guide.
DO NOT USE ANY FOREIGN LANGUAGE INTERNET SITES or Wikipedia, ehow, or answers.

SAMPLE ANSWER

Effects of Computer Technology

Computer technology happens to be a significant part of the modern lifestyle as it drives various aspect or dimensions in the society. Currently, many social and economic aspects depend on computer technology for their success. Computer technology has become a principle factor that drives the economies of nations across the world. Various industrial processes rely on computer technology for their successful operation (Rivard, 2012). Besides, computer technology has dominated work places as many activities that are performed in such places are computer-related. Governments have also been noted to depend on computer technology to execute their political operations, maintain the safety of their citizens and interact with other countries. As such, computer technology happens to be a significant element in the modern lifestyle. However, despite having several benefits, computer technology has also been associated with other disadvantages, which have impacted people’s lives in a negative way. Some of these disadvantages include poor personal lifestyles, unethical behavior among youths and some adults, break-ups and separations, health problems and new forms of crime.

Computer technology has had a significant effect on the personal lifestyle of individuals, especially the younger generation. In the present time, the younger generation prefers communicating to each other or to other people via computer to communicating physically with these individuals. Many young people are attracted to events that are considered fashionable or trendy as in the case of computer technology (Balog et al, 2013). Thus, the use of conventional mechanisms of communication has been overshadowed with the emergence of new technologies of communication. For instance, the emergence of social networks has attracted many young individuals who use these sites in creating new relationships and connecting with people from different parts of the world. Taking this aspect into consideration, many youths have been noted to be addicted to social networks in that they spend much of their time chatting with their friends and making new relationships. As a result, the social lives of these youths have been adversely affected. One of the major effects of social networking is that it affects the social skills of an individual. In relation this, most of the young individuals that are addicted to communicating with people or friend on the social sites experience problems relating with people physically. This problem arises from the fact that most of these youths are used to interacting with their colleagues via virtual means such as the internet. Research has revealed that majority of the youth prefer to communicating via the internet with individuals at far distances to communicating physically with individuals close to them (Balog et al, 2013).

In this manner, computer technology has contributed significantly to the disruption of social ties as it does not promote the formation of relationships among individuals who are close to each other. On the other side, the emergence of social networks, which are products of computer technology, has helped in hastening the process of making relationships in relation to the conventional method that was based on physical interaction. The presence of the internet and social sites has provided a suitable platform on which people can develop relationships with people from various backgrounds. Social networks such as Facebook have pages or groups, which individuals can join share with members of such groups. Once a person has joined a group he or she becomes a family or friends with persons from such a group. As such, computer technology has helped in shortening the time required for people to form relationships. Thus, it is clear that the unions that are formed via computer technology are not as strong, and can be broken easily at any moment. In addition, such unions lack a sense of closeness as they are formed between individuals who know little about each other, and have never met physically (Balog et al, 2013). In relation to the aspect of social skills, despite computer technology contributing to the diminishing of social skills of individuals via social networks, it also contributes to the development of such skills as the internet contain adequate information on how people can develop appropriate social skills. Therefore, a person can use the information obtained from the internet in developing or strengthening his or her social skills. In contrast, the information that one has acquired theoretically has been noted to be less effective in relation to the information that an individual has acquired practically. As such, the information that is contained in the internet cannot be effective in the creation of social skills. People can manage to develop appropriate social skills when they interact with one another physically, which is not facilitated by computer technology.

Computer technology has also contributed to the development of bad behavior among many youths and adults. The internet acts a site where information can be posted and retrieved. As a result, many people often go the internet to find information, which can helps in accomplishing certain tasks in their lives (Dey et al, 2012). On the contrary, many individuals with malicious intentions have opted to use the internet an avenue of spreading ill behaviors. For instance, people have been noted to pornographic images and videos on the internet. Such videos and images can be accessed by the youths who visit these sites, thereby making them develop ill manners. In relation to this, the youth may be tempted to practice what they view on the internet (Dey et al, 2012). Many instances of sexual harassments among the youth or even adults have been associated with the internet. These youths often interact with individuals from various backgrounds when they join social networks. As such, being that these youths are vulnerable, they may be influenced by other individuals to practice certain behaviors that may not be considered appropriate.

Moreover, the internet has also contributed to issues of violence and poor dressing habits in the society. Being that many youths often tend to embrace events that are considered fashionable, they always tend to imitate anything that they encounter in their life. For example, the aspect of sagging or pulling the trouser slightly below the waste has been noted to be common among many youths. Such forms of dressing are not considered appropriate in the society as they demonstrate lack of manner or upright behaviors. The internet, which is associated with computer technology, has been associated with the spreading of such behaviors among the youth. Furthermore, it is a pity that some adults embrace such forms of dressing, which are considered unethical. As such, computer technology has contributed to the development of a new generation, which tends to embrace issues that are termed inappropriate in the society.

On the other side, computer technology has also contributed to the promotion of dressing habits that are considered appropriate. Events from fashion shows that are often posted on the internet have helped in updating many people on the suitable forms of dressings. Besides, the internet has sites people can access information on the suitable dressing codes. Many people that have been interviewed on the suitable means of developing good dressing habits have pointed out the internet an appropriate avenue, which can be exploited to help in instilling suitable dressing habits in individuals. In addition, computer technology has contributed to the eradication of violence in the society as seen in the peace conventions or concerts that are posted on the internet (Dey et al, 2012). These conventions and concerts have been vital in emphasizing the significance of peace and harms that are brought by violence. As a result, many people have managed to experience a transformation of attitude and character from negative to positive in relation to being violet.

Some cases of health problems and family break ups or separations have are associated with computer technology. It has been proven that a greater percentage of individuals that handle computers activities often spend much time sitting. As such, this habit always makes these individuals to lose touch with the reality of life in relation to social activities and social skills. Being that physical activities contribute to the development of good health, individuals that are not involved in physical activities are always vulnerable to chronic illnesses such as diabetes and high blood pretension. Research has shown that chronic illnesses such as diabetes and high blood pressure are linked to occupational activities that involves much time of sitting such as use of computers in handling operations (Diedericks, 2014). In relation to this, more time of sitting without being involved in physical activities leads to the packing of weight, which is associated with the development of obese that leads to chronic illnesses such as diabetes.

On the contrary, computer technology has also contributed to the reduction of cases of chronic illnesses in several ways. New techniques of handling or regulating chronic diseases have been developed as a result of computer technology. These technologies have helped in determining the level or state of these illnesses in individuals, which has helped in developing suitable ways of regulating such illnesses. These technologies also help in the detection of the onset of such conditions, which has helped in preventing them from developing further. Furthermore, the presence of entertainment activities such as music and sports that can be accessed via computer technology help in reducing stress, which is associated with the development of chronic illnesses.  Computer technology has also contributed to separations or breaks-ups of many families. When people spend much time on their computers, they often fail to attend to their responsibilities. Such people often face problems having enough time to interact with their spouses or partners (Diedericks, 2014). As a result, these individuals usually end up being separated from their loved one who may develop a feeling of being ignored or not appreciated.

In contrast, computer technology has helped in the development of marital relationships. The presence of dating sites has helped many individuals find spouses and partner to who they have ended up being married. Besides, computer technology has assisted in maintaining relationships event when partners are far from each other. People can use technologies such as mobile phones and the internet to connect to their partners in different regions. The internet also has social sites where people can discuss issues concerning their marriages and how to build or strengthen their marriages. In this manner, computer technology has assisted in building and maintaining marital relationships.

In conclusion, computer technology has impacted human life both negatively and positively. Computer technology has led to the emergence of poor personal lifestyles among youths and some adults, health problems and separations. On the other hand, computer technology has helped in forming relationships, detection and regulation of chronic illnesses and eradication of violence. As such, computer technology has been accompanied by harms and benefits, which affect the society in different ways.

References

Balog et al. (2013). A Multidimensional Model for the Exploration of Negative Effects of Social Networking Websites as Perceived by Students. Journal of Baltic Science Education, 12(3) 378-388

Dey et al. (2014). Quality Competition and Market Segmentation in the Security Software Market. MIS Quarterly, 38(589

Dey et al. (2012). Hacker Behavior, Network Effects, and the Security Software Market. Journal of Management Information Systems, 29(2) 77-108

Diedericks E. (2014). Flourishing Information Technology Professionals: Effects on Individual and Organizational Outcomes. South African Journal of Business Management, 45(1) 27-41.

Rivard, S. (2012). Information Technology Implementers’ Responses to User Resistance: Nature and Effects. MIS Quarterly, 36(3) 757-897.

We can write this or a similar paper for you! Simply fill the order form!

Electronic Health Record Communication Technologies

Electronic Health Record Communication Technologies
Electronic Health Record Communication Technologies

Electronic Health Record Communication Technologies

Order Instructions:

Instructions

Read the Real World Case (at the end of Chapter 16) in course text book Health Information Management Technology: An Applied Approach (Fourth Edition) and answer the following questions using the knowledge you gained from the chapter. Your responses should be written in paragraph format:
1. What are the physicians trying to accomplish through buying the same EHR product at their hospital? What are the pros and cons? 2. Why cannot the physicians send a medication order to the hospital from their e- prescribing device? 3. What is the difference between scanning, COLD feeding, and point-of-care (POC) data entry? 4. How could the hospital improve upon its data quality? 5. Use the information that you gathered so far for your previous PowerPoint assignments and consider the real world case study and what the physicians are trying to accomplish by purchasing these products. When you think about the system development life cycle, use what you learned to determine how this could help in accomplishing the goals associated with this case study.

Requirements

The Assignment should be four to five pages in length, prepared in a Microsoft Word
document, and APA-formatted.
This Assignment should follow the conventions of Standard American English (correct
grammar, punctuation, etc.). Your writing should be well ordered, logical, and unified, as well
as original and insightful. The resources used (including your text) should be properly cited.
Your work should display superior content, organization, style, and mechanics.
This Assignment must have a title page and a reference page.

SAMPLE ANSWER

Electronic Health Record Communication Technologies

Physicians have adopted a new move of trying to improve and support users through making available complete and accurate data, practitioner reminders and alerts, links to bodies of medical knowledge, clinical decision support systems, and other aids when buying the same EHR product at hospital (Merida, 2012). Therefore, the physicians were propelled to improve quality and continuity of health care at the hospital. The advantage of buying the same EHR is that back-up of information is integrated into the hospital system (Merida, 2012). Another advantage is that no interfaces are required or a few of them are to be employed to perfect the process. The disadvantage of purchasing the same EHR at the hospital is that the hospital had a greater need meeting regulatory and financial requirements. Billing and accounting packages are costly to acquire and install (Merida, 2012). The reason why the physicians cannot send a medication order to the hospital from their e-prescribing device is that they feared of patient not accepting electronic prescription and ought for mediation to be written on paper form.

The difference between scanning, COLD feeding, and Point-of Care (POC) data entry is that POC is used to input information to mobile phones, PDA, and tablets. Scanning is the method used to get information from papers through use of lens. COLD feeding is the process of storing large mass of data on a laser disk (Merida, 2012). Meanwhile, the hospital could have improved on its quality data by successful implementation of HER, which calls for strong leadership, mandatory staff training, strict adherence to time and budget and overall involvement of clinical staff in the design of EHR (Merida, 2012). When the physicians address the cons from EHR and improve on its quality data, it will effect faster retrieval of hospital data, and this will consequently enhance realization of its goal to improve health care.Reference

Merida, J. (2012).Health Information Management Technology. An Applied Approach (Fourth Edition). Chicago; AHIMA.

We can write this or a similar paper for you! Simply fill the order form!

Trends in MIS Research Assignment Available

Trends in MIS
Trends in MIS

Trends in MIS

Order Instructions:

For this paper you will look through the resources section, then choose an article that you feel comfortable with read it and then respond to the two main questions , but you should not just limit to the two main questions asked , you show also show your understanding of the topic by elaborating on the two responses. Pay attention to proper grammar and also the use of 3rd person in this paper.

Trends in MIS
With the pace of technological innovation rapidly accelerating, thousands of potential new technologies are waiting to be developed. Organizations must be able to discern which of these are likely to flourish and have the greatest impact on their market space.

For this paper, you will read one article listed on the Resources below related to a topic that interests you, then research that topic further on your own and online. Based upon your research, answer the following questions:

• Identify several major trends in IT. What are the impacts of these trends on the organization and the consumer?

• Which emerging technology did you choose to investigate? In what ways do you expect this technology to alter or enhance business strategy and organization? Which types of businesses or commerce might it impact?

Resources to be use for the paper.

Articles

The following articles discuss various information technology applications and trends. For this week’s Discussion, you will choose the one topic that interests you most and read the article cited here that relates to that topic. See the Discussion area for further instructions.

Radio Frequency Identification
• Symonds, J. A., & Parry, D. (2008). Using RFID to track and trace high value products. Journal of Cases on Information Technology, 10(1). Retrieved from ProQuest Central database.

This article examines the benefits of using RFID in tracking products.

Virtual Networking
• Kotlarsky, J., Oshri, I., & Willcocks, L. (2007) Social ties in globally distributed software teams: Beyond face to face meetings. Journal of Global Information Technology Management, 10(7). Retrieved from ABI/INFORM Global database.

This article discusses social/community software.
Digital Repositories
• King, M. A. (2008). The implementation of DSpace at the Intercontinental Hotels Group. Journal of Cases on Information Technology, 10(2). Retrieved from ProQuest Central database.

This article is a case study of DSpace deployment.
Global IT Sourcing
• Rao, M. T., Poole, W., Raven, P. V., & Lockwood, D. L. (2006). Trends, implications and responses to global IT sourcing: A field study. Journal of Global Information Technology Management, 9(3). Retrieved from ABI/INFORM Global database.

This article discusses global IT sourcing, its trends and problems.

Health Care
• Chaudhry, B.,Wang, J., Wu, S., Maglione, M., Mojica, W., Roth, E., Morton, S. C., & Shekelle, P. G. (2006). Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care. Annals of Internal Medicine, 144(10). Retrieved from Academic Search Premier database.

This article discusses the impact of technology on medical care.
Human Resource Management
• Ngai, E. W. T., & Wat, F. K. T. (2006). Human resource information systems: A review and empirical analysis. Personnel Review, 35(3). Retrieved from ABI/INFORM Global database.

An empirical look at the use of information systems in the human resource field.
Education
Sourin, A., Sourina, O., & Prasolova-Førland, E. (2006) Cyber-learning in cyber worlds. Journal of Cases in Information Technology, 8(4). Retrieved from ProQuest Central database.

This article takes up an analysis of trends in education, particularly the use of virtual worlds.

SAMPLE ANSWER

Trends in MIS

There are several major trends in IT, and these trends have impacts not only on the organization, but also the consumer. Some of these trends include (i) the development of new technologies in various sectors and industries, for instance the much hyped Radio Frequency Identification networks and its adoption across dissimilar end-user sectors. (ii) Embracing electronic payment methods including web-based payments and phone-initiated bill payment; and (iii) Improved and more secure payment processing as a result of advances in technology. These trends have substantial impacts on the organization and the consumer alike. On the organization, these trends promise many benefits such as improved operational efficiency, enhanced inventory control, improved customer experiences, and decrease in costs. The impact on the consumer include improved customer experiences, improved customer satisfaction, and superior products and services in the market place for the consumer (Symonds & Parry, 2008).

The emerging technology that I selected to investigate is Radio Frequency Identification (RFID) technology. Symonds and Parry (2008) pointed out that RFID devices are, in essence, small memory storage devices which could be read and at times written to from a distance with the use of radio waves through an apt interrogation device. RFID is essentially a smart label. Radio frequency identification tags are intelligent bar codes which are able to talk to a networked system in tracking all products that the shopper puts in his/her shopping cart. RFID uses a small chip which is embedded in a tag. The chip could record and store data, for instance a purchase record, price, or a serial number. The tag could be appended on many things such as vehicles, shipping containers, or merchandise. An electronic scanner will then be able to utilize radio signals in reading or tracking the ID tag (RFID Journal, 2013). Devices that use RFID have been flaunted and hyped as a replacement for barcodes in supply-chain applications.

RFID technology may alter or enhance business strategy and organization in that businesses may adopt RFID technology to solve the many problems which are associated with the use of barcodes (RFID Journal, 2013). For instance, with the use of bar codes, a scanner must see the bar code in order to read it, meaning that the bar code has to be oriented toward a scanner so that it can be read. By contrast, RFID does not necessitate line-of-sight given that RFID tags could be read provided they are within a range of a reader (Symonds & Parry, 2008). However, the RFID technology is more expensive than barcodes. RFID will not replace bar codes. They will coexist side by side for many years. Both have their respective cons and pros, and a business organization will choose the one that will suit its specific needs.

The types of businesses or commerce that would be impacted by this new technology include retailers, pharmaceutical companies, and airports. Retailers could obtain real-time comprehensive information on their stock by using an on-going automatic scan system in their stores and warehouses. This could be much more efficient compared to having a worker check inventory on the shelves manually, and may ultimately reduce costs and improve experiences of customers in stores through better supplies and stocking (Industry Canada, 2014). Retailers can also use it to ensure one shot scanning of products at the cash whereby every item in the consumer’s cart could be scanned at the same time whilst they are still inside the cart without having to remove the goods for checkout, thereby speeding things up at the store. Besides retailers, businesses in the pharmaceutical industry can use RFID tags to help in identifying potentially harmful and fake medicines. Airports could also use RFID tags to detect luggage loading errors automatically before bags get lost (Industry Canada, 2014).

References

Industry Canada. (2014). Radio-Frequency Identification (RFID) in the Retail Marketplace. Available at http://www.ic.gc.ca/eic/site/oca-bc.nsf/eng/ca02320.html (Accessed August 18, 2014).

RFID Journal. (2013). Frequently Asked Questions. Available at http://www.rfidjournal.com/site/faqs (Accessed August 18, 2014).

Symonds, J. A., & Parry, D. (2008). Using RFID to track and trace high value products. Journal of Cases on Information Technology, 10(1). Retrieved from ProQuest

We can write this or a similar paper for you! Simply fill the order form!