Edudorm Facebook

Information in Cyberspace

Discussion I - Cybersecurity

 The technological advances have given rise to cyberspace identity theft where identity thieves use someone's information to commit crimes. There is a time I was in this situation and my information was stolen without my knowledge.  Before learning about identity theft, I felt safe and I had no worries since I could not imagine being in a situation where my personal information is stolen. One day, I received a call from an unknown person who claimed to be from a collection agency and he wanted me to clear the energy bill. After doing some research, I discovered that my credit history was not good and my credit scores were low.  Little did I know that the criminals had accessed my Social Security Number and committed financial fraud.  In specific, they borrowed power tokens and failed to pay a bill that amounted to $3,000.  This was a terrible incident and I felt frustrated since the financial fraud caused damage to my credit report and my ability to apply for a loan. However, I reported the matter to the necessary agency and I was connected with the right person who helped in reviewing my paperwork and cleared the fraudulent credit. I also learned that to prevent identity theft, it is important to lock the  Social Security Number, avoid sharing personal information,  review the credit report and billing cycles regularly,  review bank account statements regularly and report identity theft to receive a recovery plan.

Response A

 It is true that social networking sites can allow people to access other people’s private information such as hobbies, personalities, activities and more. Social networking sites also cause cybercrimes where criminals get access to one's Social Security Number to open financial accounts, get medical treatment, and steal social security benefits among other crimes (Lynch, 2005). This is an indication that cyberspace is important as it provides informational resources and social networking but people should also be aware of risks such as theft of personal information, credit card numbers,  and other online risks. However, one can minimize the risk through securing personal information, avoid phishing scams, protect all the device using unique passwords, and avoid sharing personal information (Lynch, 2005).

 Response B

A large number of internet users are complaining about the cybersecurity issue and your situation show that you are one of the victims of cybercrime.  Even though the internet is widely interconnecting people, users are experiencing cyber-security breach where a person data is accessed by other people without authority (Lynch, 2005).  As an Instagram user, it is important to be aware of ‘connected account' and cross-posting and by having this knowledge, it will be easy to unlink the account. In addition, it is important to agree or disagree with the terms and condition and this will help prevent abuses, limit liability, protect your private information, prevent third-party access and promote authentication.

 

 

 

 

 

Discussion II- Accessibility

 

The Massachusetts Institute of Technology violate the laws on Web accessibility as stated by the Americans with Disabilities Act. The university has failed to provide Web accessibility such as presentation videos and recorded lecturers to 48 million deaf people. The federal law states that all students should have access to the emerging technology such internet and websites and they should have an equal educational opportunity regardless of disability (Lazar & Stein, 2017).  In addition, web accessibility helps students navigate and understand learning, and people with disability get the opportunity to gain the education, employment and participate in society.  However, the university discriminates the deaf by failing to provide them with online connection such as audio tracks, educational videos, self-help talks, and podcasts (Lazar & Stein, 2017).  To meet the standards for Web accessibility, the university management should develop a comprehensive policy that states the standards of web accessibility, it should appoint a staff member who should coordinate the information technology, and provide role-based training to the information developers (Lazar & Stein, 2017).

 

 Response A

University of Houston's is also among the universities that do not provide web accessibility to students with physical barriers despite the federal effort to establish a law that states disabled students should  have access to information technology (Lazar & Stein, 2017). As a big education institution, it should ensure that all students get access to the internet to seek online content as it is a legal requirement. The university should consider the federal anti-discrimination law and stop excluding disabled students from web accessibility.  To make the website accessible, the university should ensure cooperation with participants to develop auxiliary aids and provide disabled with equal opportunities.

 

Response B

Unlike other universities, Texas Christian University is committed to offering diversity and inclusion to all students. It complies with the American with Disability Act and ensures that all students get equal access to online education.  It is able to achieve this through coordination with peer groups and vendors to identify problems and take appropriate actions to eliminate the barriers (Lazar & Stein, 2017). To make it more accessible, it should establish a correction plan that aims to avoid online barriers,  establish  policies and procedures that make it possible to access the web and appoint an auditor to audit content.

 

Discussion III- User Experience and Usability

 One thing that I think is a bad design is parking signs in Los Angeles.  The purpose of these signs is to warn drivers on restrictions, time limit parking, no stopping signs, permit parking, and other rules.  However, despite its intended purpose, the parking signs is a bad design and confusing.  People do not understand the rules because and the confusion is causing traffic problems. The sign has information overload and complex traffic rules that are concentrated in a small area. When designing a product, it is important to consider its usability and ensure ease-of-use.  Great usability makes product quality through learnability, user satisfaction, memorability and more (Marcus, 2011).  Thus, the State regulators should create a new design which is easier to interpret and a design that is user-centered in order to meet the special need of the multicultural audiences. The design should have common guidelines, users should have the ability to control, it should have technical clarity, fulfillment, flexibility,   and consistent.

 Response A

I agree with the idea that some products like ceiling fan are a bad design because it lacks visibility, users do not have control, it lacks recognition, users do not recognize errors and it is not flexible. In other words, when using the ceiling fun, users do not understand the mechanism, users do not have the freedom to control or perform an action, and it is not possible to prevent error since users do not recognize the errors (Marcus, 2011). Thus, in making products, it is important to consider Heuristics guidelines and these will help design great products that can change the world.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Lynch, J. (2005). Identity theft in cyberspace: Crime control methods and their effectiveness in

Combating phishing attacks. Berkeley Tech. LJ20, 259.

 

Piet Alberts. (2019). Heuristic Evaluation in UX Design. Retrieved from: https://pietalberts.com/heuristic-evaluation-in-ux-design/

 

In Lazar, J., & In Stein, M. A. (2017). Disability, human rights, and information technology.

Philadelphia: University of Pennsylvania Press.

 

Marcus Aaron. (2011). Design, User Experience, and Usability: Interactive Experience Design:

4th International Conference, DUXU 2015, Held as Part of HCI International 2015, Los

Angeles, CA, USA, August 2-7, 2015, Proceedings, Part 3.  Springer.

1228 Words  4 Pages

Cyber-attack Disrupts Printing of Major Newspapers

The attack was a computer malware attack that targeted the infrastructure of Los Angeles Times. The focus of the malware was the organization’s network, specifically the one that Tribune Publishing uses for printing purpose.  Tribune publishing and Los Angeles Times share the same printing networks owned by the former. The malware might have been a kind of ransom-ware that normally scrambles the files and programs of a computer before the attackers demand for a payment from the victim in order to unscramble them.

 The attackers somehow managed to penetrate the system of the organization, to the extent that each market across the firm was affected. However, the attackers did not manage to access or get data from the company. In addition, the news organizations for online editions were not affected, while no subscriber data was compromised by the attack.  However, the attack was preventing the transmission of information from various offices in Southern California to the respective printing presses. The attack hampered the entire process of the organization, in that the some copies of newspapers were delivered late from the Los Angeles printing plant.

The attack on the organization brings to light two important issues that can be learnt. Firstly, successful or unsuccessful attacks come with risks that may include infrastructure damage, disruptions of system operations, and lose of resources. Secondly, the security in the system may prevent attackers from intruding but fail to raise alarm that an attack has occurred or has been attempted. In order to prevent such an attack, it is important to have a network security that has complete awareness, and thus, it can ferret out any attacker. The system exercise of network awareness ability needs time, resources and expertise and the capacity to intelligently evade information overload (Monte, 2015). The implementation of the system will ensure awareness of any attack is raised.

References

Monte, M. (2015). Network attacks and exploitation: A framework. John Wiley & Son. 67-69

Sanger, D.E., Perlroth, N., (2018, December 30).Cyber-attack Disrupts Printing of Major Newspapers. New York Times. Retrieved from: https://www.nytimes.com/2018/12/30/business/media/los-angeles-times-cyberattack.html  

 

351 Words  1 Pages

 

                                                Information technology services

            In any business organization, human resource management system (HRMS) takes into consideration the interactions which exists between human resource and information technology (IT) through the aid of human resource (HR) technology). In return, it means that it allows various human resource processes and activities to occur electronically (Dennis et al., 2015). It then implies that it can be regarded as a means, through software, for various business organizations to take care of its day-to-day operating activities, including those that are related to management, accounting, human resources, and payroll.

            Nevertheless, it becomes possible for the company’s change team to be in the position of planning its human resource expenses more efficiently, as well as to control and manage them. This in return minimizes the quantity of resources which are to be allocated towards them. As a result of that, it is evident that IT will enable the organization’s change team to have the capacity of increasing its operational efficiency when it comes to decision-making in human resource (Nandish, 2014). Often the decisions that are made are aimed at increasing quality as well as the productivity of the managers and employees.

            Typically, with regard to the Logical Process Modeling with Data Flow Diagrams and Physical Design Choice, there are several solutions which are provided to a business organization that have the potential adopting IT solutions. These include things like HR, solutions in training, recruiting, and compliance. A large percentage of quality IT systems take into consideration flexible design feature databases which are incorporated with other features available. Preferably, the ability to generate reports and analyze data accurately and quickly is paramount (Zhou et al., 2010). The reason for that is because it is the one which will assist the management authority of the enterprise to manage its workforce easily.

                                                IT Security to protect cyber threats

            Considering the efficiency advantage that is conferred by human resource and information systems, it becomes possible for the IT administrator and workers to exchange valuable information with ease (Dennis et al., 2015). It means that this allocation is intended to be centralized as well as to be accessed easily from anywhere within the enterprise. The following diagram illustrates the flow of data within the system.

       
   
 
     

 

 

 

 

 

 

 

 

 

 

 

 

            From the above flow diagram, it means the importance of this is that it serves as a means of reducing redundancy within the enterprise. For instance, when workers desire to accomplish frequently recurring activities, for example, requests for electronic pay stubs or requests for time off, such a protocol can be taken care off in an automated fashion without the need of seeking human intervention or supervision (Nandish, 2014). It then implies that when properly designed, less paperwork and approvals occur hence limiting the waste of time which could have been dedicated to other tasks.

             Basically, within the HR and the IT system, the operational IT is aimed at providing the manager or the management authority with the required information which will aid in supporting repetitive and routine decisions. The reason for that is because a large percentage of the operational level IT vendor systems have the responsibility of collecting and reporting human resource information or data (Sikha & Richard, 2011). It then means that these systems usually incorporate data concerning employees’ position within the organization and other governmental regulations. This takes into consideration workers information system, performance management information system, and position-control system (Kavanagh et al., 2012).

            The aim of this protocol just within the HR and IT system entails providing the management authority with skills for enhancing decision-making process that mainly lays emphasis on the equitable allocation of resources (Ravi, 2017). From the perspectives of IT, this protocol incorporates job analysis, employment decisions training and development, design decisions, and workers’ compensations plans.

            The main focus of this system in the IT protocol entails offering support to matters concerning labor negations, employee negations, as well as to certain issues dealing with specialized IT software (Ravi, 2017). Generally, one of the main reasons why this system is vital is because it aid in providing a good image or ideas regarding how workforce and labor resources ought to be planned.

            Examples of the HRIS and IT vendors available include comprehensive HRIS, HCM Solutions, and HRMS Solutions. With regard to the capabilities of these vendors, the truth is that all of them for the purpose of managing employees as well as to engage them in productive activities. As much as they are considered as being valuable resources to the human resource department, they have the propensity of assisting in managing costs, streamlining processes, and providing flexible solutions aimed at enhancing employee performance (Dennis et al., 2015). Usually, all of these IT vendors have a wide range of features. For instance, they have the capacity of providing benefits to the human resource team through tracking recruitment applicants, managing workers benefits, as well as training staff members. With these vendors, it is easier for the organization to generate HR reports that can in reviewing employee reports as well as serving as a resource for promotion. Likewise, they provide immense benefits to the organization in terms of self-service options such as remote schedule management, biometric keeping, and so on (Zhou et al., 2010).

            Nevertheless, the computerization of HRIS and IT  is the one which have assisted in the integration database of workers files, design files and job analysis, affirmative action files, skills inventory files, position, occupational health and safety files and so on (Kavanagh et al.,  2012). Being constructed in a coordinated manner using the aid of the database management systems software, it implies that it is possible for this program to produce from any file. The intent of these systems is to aid in employment and employee retention throughout their employment lifecycle.  They have the capacity of including anything ranging from on-boarding and recruitment tools to budgeting, performance evaluation, salary planning, and goal setting (Battaglio, 2015).

            Considering the IT solutions to be utilized, the various systems available mainly contains similar elements as the human capital management solutions. Despite that, the IT Solutions have several tools which are used for employees to increase the level of their work output (Colomo-Palacios, 2013). The subsystems of this protocols usually incorporates flexible and efficient ways of employees to clock in and out, efficiently manage their schedule, as well as communicate easily with their team members regardless of their location.

            Regardless of the effectiveness of each IT vendor, there is the need of reducing the oversights and mistakes made in the daily basis whilst using the manual processes.  The HRIS and the IT Vendor that is appropriate for my client is the HCM (human capital management) Solutions. The importance of this is that it has the potential of assisting the organization owner and the human resource team in guiding their team towards achieving the goals of its establishment (Battaglio, 2015). Moreover, the reason for selecting this vendor for my client is because its analytics are regarded as being the integral part of the human capital management solutions. These solutions can be used for the purpose of tracking worker red flag as well as predicting their growth potential. Human capital management solutions are also more detailed as compared to other HRIS and IT vendors and they are frequently used in some of the executive-type white collar environments (Siau, 2002).

 

                                                           

 

 

                                                            References                             

Battaglio, R. P. (2015). Public human resource management: Strategies and practices in the 21st century. SAGE Press

Colomo-Palacios, R. (2013). Enhancing the modern organization through information technology professionals: Research, studies, and techniques. Hershey, PA: Business Science Reference.

Dennis, A., Wixom, B. H., & Roth, R. M. (2015). Systems analysis and design. Hoboken (NJ: John Wiley & Sons.

Kavanagh, M. J., Thite, M., & Johnson, R. D. (2012). Human resource information systems: Basics, applications, and future directions. Thousand Oaks, Calif: SAGE.

Nandish, P. (2014). Critical Systems Analysis and Design: A Personal Framework Approach. Routledge Press

Ravi, A. (2017). HUMAN RESOURCE MANAGEMENT: NEW HORIZONS. Zenon Academic Publishing

Siau, K. (2002). Advanced topics in database research. Hershey: Idea Group Pub.

Sikha, B & Richard, E, (2011). Database Design Using Entity-Relationship Diagrams, Second Edition. CRC Press

Zhou, Z., Wang, H., Lou, P., & IGI Global. (2010). Manufacturing intelligence for industrial engineering: Methods for system self-organization, learning, and adaptation. Hershey, PA: Engineering Science Reference.

 

1380 Words  5 Pages

Reviewing The Adventures of an IT Leader 

In scanning and analyzing the emerging technologies, the IT departments need a technology plan which comprises both objectives and strategies. The aim of the technology plan is to analyze the technology in terms of the existing technology and new technology that will aid in day-to-day operations. An important point is that the technology plan requires   effort and timely execution in order to effectively plan how goals and objectives will be achieved.  Effort and time for operation plan will play role in taking action plan, creating proprieties, identifying resources and accountabilities (Austin, Nolan & O'Donnell, 2009).  In the case of IVK, the IT department did not include a project plan for software development and as a result, the company incurred cost associated with ever-increasing technology complexity. The company experienced unanticipated interaction which led to system accidents  and it was difficult to deal with the complexity.  To avoid these complexities, the IT department should set a strategic technology plan which is the process of setting goals, creating the desired outcomes, setting project schedule, requirement and planning.  Note that strategies and plans will play role not only in integrating the technology but also in identifying threats and opportunities associated with the technology (Austin, Nolan & O'Donnell, 2009).  Strategies and plans are vital in technology management and in this case, the IT department will understand the uncertainty and manage problems.  Generally, the IT department need to set enough time and effort to evaluate the environment and technology roadmaps, the desired results, core technologies that align with goals and mission, assign the organization state and assess the life-cycle costs (Austin, Nolan & O'Donnell, 2009).  

             The IT department should also know more on Machine Learning. This means that apart from relying on Artificial Intelligence- ensuring machines carry out task effectively, IT department should use the neural network and allow the machines think and understand the world (Yeomans, 2015). Neural networks allow machines to carry out task like human beings such as making decision, modifying approaches, recognizing data and images and accessing all the information.  In  implementing software and hardware, machine learning will allow customer access high-quality content, the IT department will understand the customer behavior and will offer a personalized experience thereby allow the company understand the need of customers (Yeomans, 2015).  In other words, machine learning offers ‘Smart Content’ where customers will get a superior experience.

The response to the Bernie Ruben’s first question is that on blog entry, they should maintain confidence to ensure that Carl Williams does not know anything based on the blog entry to avoid conflict and disharmony. Note that William is not interested with IT meetings and does not trust the leadership team especially Barton. They should hold private meeting with managers and IT staff and discuss the issue on blogs. This statement helps answer the second question that there should be a general policy on blogging and the policy should be that Barton and employees should keep company’s propriety information confidential or rather Barton should be in the front line to restore confidence which all employees will agree with (Austin, Nolan & O'Donnell, 2009).  The second policy is that since some factors may compel the team to disclose the information, and then there should be scenarios for information disclosure.  Failure to adhere to the rules, there should be a policy that describes the measures and punishments upon the person who violates the confidential policy. Last, there should be a process for scanning and analyzing emerging technologies and in this case, the company should consider creating a special group that will play this particular role (Austin, Nolan & O'Donnell, 2009). The role of this group will not only be to explore the emerging technology but should also go beyond to  investigate from research findings  and  conduct research in other companies  that  used that particular technology. This method will offer knowledge on the technology, its benefits and risks.  In addition, the selected special group should consider creating a technology forum within the company and this will allow the employees to offer different opinions on the emerging technologies (Austin, Nolan & O'Donnell, 2009).

 Of the three proposed processes, the best process that IVK should pursue is the third proposal which is based on ‘gradual migration’. This means that there should be three technology platforms. The first  platform; emerging technology-IT  staff should  allow the company focus on  scanning and  analyzing new technology, declining technology- IT staff should consider  ignoring technology that do not fit within the organization and if the  IT staff decides to  purchase such technology, then CEO should approve  and  standard; which means  IT staff should allow the organization  implement the best technology. This process is important in that it will eliminate the nonstandard system and allow the organization to implement standard infrastructure and maximize flexibility (Austin, Nolan & O'Donnell, 2009).

IT standardization and innovation is in conflict in IVK organization. This is because; there was a conflict in between the company’s infrastructure and the IT department.  The conflict is rooted from the idea that the infrastructure standards could not align with the decision made by business managers. In other words, the business managers focused  on nonstandard applications  but the company could not make changes  or fulfill the desires of the business managers  simply due to lack of standardization (Austin, Nolan & O'Donnell, 2009).  The complexity allowed the organization to continue with operation successfully but a big problem was lack of innovation. This means that the organization could not   find a competitive position due failure of investing in technology and innovation.

About the kid’s toolkit approach to management, I think that as a director of the New Application Development Systems, Barton should try things before implementing. In other words, he should understand the technology before implementing it in the organization. When problems arise, the manager should not only fix the problem but should also find the root cause. Managers tend to belief that problem will go away but at the end it results to negative consequences.  Thus, managers should make effective decisions on IT managemngt and should not only focus on day-to-day challenges but should also find the root cause of the problems and offer solution (Austin, Nolan & O'Donnell, 2009).  More important, he should encourage employees   pursue the best actions and behaviors and in case of business or culture change, the actions and behaviors should also align with the new environment.  In other words, management should analyze the organization needs in order to set strategies and identify the technology that will fit the changing market.

 

 

 

 

 

 

 

 

 

Reference

Austin, R. D., Nolan, R. L., & O'Donnell, S. (2009). The adventures of an IT leader. Harvard Business Press

Yeomans, M. (2015, July 7). What every manager should know about machine learning. Harvard

Business Review. 

 

1128 Words  4 Pages

Electronic Industry

The electronic industry in  United States consists of electronic and computer products  and this industry engages in production, assembling and retailing of mobile phones , computers , communication equipments and other similar products and their accessories.  The industry is also comprised of different companies that have established electronic components products. The production of such products depends on technology that is highly innovative, and which is continuously integrated into designing of products so that they are smaller and even more powerful (IBM, 2008).  Research and development has defined the structure of this industry in terms of innovation, productivity and even growth over the past two decades. This is also translated into the cost, demand and pricing in the market structure and which have been used to emphasis and formulate business strategies.  The effects of such strategies can be seen in production, pricing, scale economies, switching costs and even transaction costs.  The electronic market is made of consumer products and consumer products retailing (Bajaj, 2011).

The consumer electronics sector is a very big industry that is defined by great innovations, a lot of disruption. The innovation results to a market with electronic products that are increasingly connected due to digitalization. The digitalization has led to disruptions which have forced the firms to place more focus on consumers, and their interaction with technology.  Due to such changes, the industry has seen fall of barriers and formation of new alliances between firms from varying backgrounds which greatly affect the consumer electronic business (Bajaj, 2011).  The industry is also influenced by emerging revolutionary products such as 3D printers that reshape the relationship between the producers, marketers and even consumers who are the end users.  The market is wrought with consumers with increasing disposable incomes and whose steadiness has improved purchasing powers to the advantage of manufacturers and retailers.  Between 2005 and 2014, personal disposable income has risen by over 4 percent every year and by 2015 the rises was recorded at over 3.9 percent (Moizo, 2016). This has been an important driver of the sector and has continued to grow very steadily, as increase in income remains subdued by low rate of inflation. The prices in the electronics industry have been shifting between high and low, while efforts to produce innovative products with high value have been met with collapse and the stagnation in prices over the past years. 

Between 2005 and 2011, electronic products‘s price index reduced by -15 percent. From 2012, the price index has remained low and stable at 84.8 in value. This means that there is high pressure on profit margins due to high competition. On the other hand, the ratio of income to revenue in the industry was at a high of 7.5 percent in 2014(Moizo, 2016). This kind of performance can be attributed major to the performance of most innovative firms who are also the market leaders. For companies which are not able to sustain such kind of competition, a very fierce competition affects their performance and thereby limits the ratio of net income to revenue.  The US electronics industry is also faced with reduced leadership in the market as global competition intensifies and other markets produce innovative but low priced products. These foreign markets are able to produce electronic products of the same quality but retailing at lower prices since they enjoy economic of scales associated with lower production costs (Moizo, 2016).

The structure of this industry has also been facing swift changes especially in market landscape, since the market is constantly being re-defined by various forces related to the aforementioned changes in product innovation. The changing landscape is forcing the whole consumer electronic industry to face these challenges on a number of fronts. The issues include the emergence of a sophisticated and frugal consumer market due to various economic situations such as Great Recession experienced in 2008; incapacitating price wars that are being fought by various formats of industry trade which include pure-play vs. discount, the two versus online retailing; the online retailers in the industry enjoys a considerable competitive edge thanks partly to reduced overheads and even tax laws that are not at par with retail games’ new rules; preferences for millennial consumer are always demanding and changing (Moizo, 2016).   The result of such a market structure has been manufacturers and retailers who have been adopting strategies to protect against risks of such an onslaught. Major retailers such as Wal-mart, Target and Best Buy have been forced to have strategy re-evaluation and re-alignment in order to survive the new realities of such a market (Diagne, 2012).

To succeed in this industry, firms have to re-align their strategies so that they remain competitive, increase growth and profitability. The firms have to ensure that their investment in research and development translate to creation and designing of innovative and high quality products that meets not only the domestic quality threshold but international standards. This is because the competition has gone global with other firms in foreign markets integrating big technological innovations into their electronic products so that they are gaining a large market share in the international electronic market. In addition, retailers in consumer electronics sector have to focus on consumers especially the millennial population whose preferences are constantly changing. Firms have to be aware of the defining characteristics of consumers who are technologically savvy and with increasing demands.  The change in strategy has to include retail approaches since pricing and convenience as other important factors defining the present market. Consumer electronics retailers have to adopt combined strategies like supply chain, pricing, merchandising, customer services and inventory management so as to offer consumer experience with no store limitations (Moizo, 2016).  This also involves adjusting to the new distribution patterns in the market such as online retailing. The changing markets and increased competition means that consumers will continue having many options for same electronic products .their decision to buy being informed by the innovation, quality and pricing of these products measured against their preferences.

There are some government policies in United States relating to electronics industry, and especially consumer electronics.  These policies aim at protecting the consumer against any unreasonable deaths and injury risks relating to these products. The Consumer Product Safety Act (CPSA), which was enacted in 1972, established an agency to offer safety standard so as to prevent any risks related to consumer products. Under this Act, any consumer products considered substandard are prohibited and such products can be recalled once they are considered to be hazardous (United States, Office of the Federal Register, n.d). The Act provides for assistance to consumers in their efforts to assess the relative safety of such consumer products. The Act also facilitates any researching and investigating the cause and deterrence of injuries, illness or deaths related to consumer products. So as to improve the safety of consumer products, the CPSC recommend that firms should totally comply with mandatory standards and voluntary standards in the private sector (United States, Office of the Federal Register, n.d). These regulations implies that firms in the electronic industry have to design and manufacture products that are  meets the set standards while preventing cases of injury and even deaths. The failure to comply with such standards may lead to recalling of consumer electronic standards and even negative publicity that can dent the image of firms’ brands. To achieve the set standards, firms have to design and develop high quality and innovative electronic products.

An analysis of China, Brazil and South African in terms of competitiveness can give an insight into the expected performance of the electronic firms in United States in these markets. The country’s competitiveness is determined by the social, political, economical and technological factors which determine the success of an organization in such a market.  These aspects have a combined impact on any business that desires to carry out business activities in such regions.

China   

China has been able to acquire a distinct competitive edge against majority of countries in the world including Brazil and South Africa. The largest inflows from foreign direct investment in the world can be attributed to this country which stood at 46 Percent in 2013 (Schwab, 2016). The figure has increase in recent years as the economy of the country continues with a forward surge.  The government has ensured there is an improvements depicted by market- oriented reforms through policies and market principles that have led to a remarkable growth of the economy. The political environment of China has been stable aided by a one –party political system.  The country also has a large market size at around 1.35 billion people , part of which is a  middle class that is raising rapidly with higher income and  hence, purchasing power(Schwab, 2016). The country’s robust economy has been able to weather down the various economic downturns experienced globally so that its growth has been consistent. In fact, economic analysis shows that the performance of the economy will perform better than that of Brazil and South African in the future.  In 2016-2017 period, China has ranked 28th, in terms overall competitiveness scores. The ranking is attributed to a number of progresses in competitiveness’ sophisticated areas that have had considerable contribution to innovation ecosystem of the nation.  Such areas include higher education at 54th place, up 14, innovation at 30th place, up 1; and business sophistication at 34th place, up 4(Schwab, 2016).

The Country’s currently the largest consumer of electronic products especially mobile phones in the world and this is making it to emerge as an innovation center for technological innovation including advances in software and telecommunication. In fact, the mobile phone has been the best platform for consumers globally and Chinese innovation in communication and other electronic devices has placed it at an advantageous position in global market (ECSIP Consortium, 2016).  Adoption of various technologies including mobile telephony has placed the country on a good position in terms of market size and opportunities for firms seeking growth (Schwab, 2016). As the largest market for various electronic devices especially smart phones and with a population that is becoming increasingly wealthier, China has stood out an attractive market for many foreign firms. The society in the country is, therefore, composed of many consumers who are ready to buy premium electronic products as they intended to improve their lifestyles. This means that an investor should consider such potential in the market represented by an increasing spending for highly innovative and quality electronic products.  The middle class section of the country’s population is expected to increase from 6 percent to 51 percent in a decade which shows the rising purchasing power for premium electronic products (Schwab, 2016).

 In addition, China offers a relative lower cost of production for manufacturing forms due to its large human resource. The labor in the country is readily available at a comparatively cheaper cost, which means that a firm can manage to offer lower prices for its products in the market. Apart from the cheaper labor, the literacy level in the country is constantly improving which provides a large pool of skills for firms in this market.

Brazil

Brazilian governments have embarked on a journey to modernize the electronic industry with an aim of ensuring that economic development balance is achieved. The previous decades have been wrought with development of electronics and electrical complex, which have been poised to spearhead the modernization process in the industry.  Various policies have been enacted by these governments that borders on protectionism, so as to protect the Brazilian firms against cheap products from foreign market (Wetering, 2015). This adds up as preferential treatment of domestically produced electronic products. Other policies also include important taxes that are high for imported products, so as to protect the country’s manufacturing sector (Wetering, 2015).  Such policies have actually affected the competitiveness of the country in the global economic arena in comparison with other countries like china.

The country has a population of over 200 million people most of whom are experiencing improved living standards, and this presents a large market for any multinational company wanting to expand into this area (Wetering, 2015).  Over the past decade, the country has also undergone a robust economic growth which makes one of the top ten largest economies in the world.  The electronic market has been part of this expanded growth, with an oval earning of $ 50 billion as at 2014, even though it stills a small portion in comparison with other larger industry complexes.  There are also improvements in areas such as property rights protection amd other measures of excessive influence. The country has also bounced back from past sharp drop in judicial independence and corruption cases .

 Despite of such growths, the country has other challenges relating to political turmoil and trade shocks which have seen it fall 6 positions to the 81st competitive country. This is majorly due to deterioration of goods and labor and even financial markets. The country also experiences high rates of insecurities and hence, the administration of public sector has come to be perceived as poor. The political uncertainty in the country and the continued deepening finances are still a roadblock to improving the competitiveness of this country. The current recession being experienced in the economy can be seen in a steady deceleration of growth rate from 4.5 % average growth rate for 2006-2010 periods to 2.1 % for 2011-2014 periods. Actually the economic growth rate of the country had been expected to be negative for the 2015-2016 periods (Schwab, 2016). The country is also facing a macro-economic imbalance including expanding current account, rising inflation and government deficits which represent poor productivity. This shows that the macro-economic of the country is not as good as that of China and requires dealing with market distortions that continue to negatively affect the market. Statistics have shown that after a period of growth in revenues in the electronic industry, the sector has undergone great pressure over the past decade or so. This can be attributed to aforementioned economic downturn and in combination with consumers choosing to buy cheaper electronics other than the expensive gadgets. The expansion of domestic market of this industrial shows been positive and has not even contributed positively to the country’s trade balance.  In fact, this industry had more importation of around 41.1 billion in comparison with exportation which was only 6.5 billion US $ which represents a deficit of USD 34.6 billion (Schwab, 2016).  Such happenings in the economy can be attributed to stagnation in innovation related investments especially by bigger firms in the industry. In addition, the lack of robust revenue growth in the local market has affected the market negatively.  The cost of products from the Brazilian industries has increased over the past decade because of higher wages and little growth in productivity; this can be attributed to combination of various aspects including inadequate infrastructure, inefficient skilled manpower and even bureaucracy (Schwab, 2016). This shows that in comparison with China , the country’s global competitiveness is wanting. 

South Africa

The electronic industry in South Africa is relatively has a positive future drive by expectation of better future performance of the market.  The country’s has seen an improvement in scoring and ranking at 47th place in the world an increment of 2 places (Schwab, 2016). The South African market has seen relative effect of commodity reduced commodity price in comparison with other regional countries The country has also  undergone improvements marginally when compared to almost every other competitiveness aspect. The major areas where such progress has been recorded include improved competition at the local continent and international market.  The improvement is 13 places and 16 places locally and internationally respectively (Schwab, 2016). The most improved areas that shows competitiveness for the country include better usage of talent in regard to how pay indicates productivity and a significant, though small improvement in equation quality. This improvement in education quality is an indication that the market has more qualified skills needed in the electronic industry sector of the economy (Schwab, 2016).

  In addition, the sector is expected to attract more players in the market due to increased adoption of technology and level of innovation, where entrepreneurs are able to develop their own products and sell them locally and internationally.  With a lot of technical expertise, the country can manage to export more electronic industry products to the international markets.  The retail of electronic and related appliances in South African forms a major part of consumer sales a trend that has continued into recent years. There is a large opportunity for retailing of electronic products especially the ones which are portable such as smartphones. The largest retailers of these products include the supermarkets and departmental stores with help of institutional help like banks that have enabled retailers to expand their operations in the country (Deloitte, 2015). The preferences of consumer in the country are very similar to global preferences and this has given international brands to set up operations in the market to serve the consumer needs across every category of electronics products (Deloitte, 2015). The presence of leading multinational firms is a vote of confidence to the competitiveness of the country especially while serving the regional market.

On the other hand, there are various shortcomings which may limit the country’s competitiveness when compared to China and Brazil. A major shortcoming involves infrastructure development which has stopped. Major developments that have stalled include electricity and transport, so that power shortages have become rampant while movements of goods have been poor. The quality of the country’s institutions in terms of service delivery has diminished due to lack of political stability and reduced transparency (Schwab, 2016). There have rising security concerns which have led to several business leaders not having trust in political leaders. In addition, the slowing economic growth that has seen the country drop 11 places by 2015 also reduced competitiveness of the country when compared to China whose economic growth has been relatively stable (Schwab, 2016). This means that the high rate of unemployment in South Africa is not likely to diminish in the near future. This hampers country’s capacity to leverage in terms of demographic dividend (Schwab, 2016). The high unemployment means that the purchasing power of a large part of the population is very low and hence, presenting a problem to a business that wants to expand in this market.  

The comparison of competitiveness between China, Brazil and South Africa indicates the advantage enjoyed by each country at the global market level. China has the best business environment among the three due to its large market, improved government intervention through policy, political stability and high level of technology that encourages better production.

Apple Inc., entry strategies into Chinese and South Africa markets

Apple can generate a lot of revenues if it expands into the Chinese and South African markets since the business environments are generally conducive for setting up their operations. In China, the company should consider using Partnership as the entry strategy. This strategy involves ownership of production and operation in a foreign market through partnership with investors in that specific country. In this strategy, two or more parties make an agreement where they combine effort through pooling of resources so as to accomplish a given objective (Markman & Phan 2011). In this case, the partnership may involve co-marketing arrangement or even strategic alliance in the manufacturing process. Partnership will be a useful strategy in the Chinese market where culture is different from the Western Culture, including both the social and Business culture. By brining local partners into the business operations, the company will familiarize itself with the consumer behavior and build electronic products with quality and design that aligns with that culture.  Since the local partners are familiar with this market, they can help in evaluating and understanding this target market before determining how and when to launch the company’s operations. These partners will also go a long way to provide the necessary financial   resources needed especially if the firm is not financially stable(Markman & Phan 2011). The Chinese market is expanding with expansion of middle class hence there is a need to exploit that market.

 The entry into South African market should be through indirect exporting where Apple Inc. will sell its product through a certain channel. Thus channel should be through an established relationship with a supplier or vendor in the market. Vendor relationships usually involve low cost and Apple can agree with such suppliers for their exclusive sale of the particular electronic product. Since setting up production in South African market like in China, the company should focus on retailing its product through indirect exporting.  Vendor relationship is a strategy that enables have a competitive edge of its rivals since such focus will enable to firm to target specific customers within a given market in the country. This means that the firm can establish different relationships with many vendors who will have a direct contact with the customers (Griffin & Pustay, 2012).  The vendor relationship or rather supplier relationship should be strategic where multiple but controlled interaction points between the firm representative and major suppliers are established. Aligning the supplier relationship throughout the market and in the firm needs a structure that is clear and involving corporate interaction (Griffin & Pustay, 2012).  There should be sustainable value created through a structure that comprises of segmentation of supplier, supplier relationship governance, management of supplier performance and development of supplier capacity (Griffin & Pustay, 2012). This will ensure that the supplier is able to reach a larger market while at the same time offering high quality service to consumers.

 

Supplier relationship creation

 

       
       
 

 

 

 

 

 

 

                                                                                                         

 

This will ensure that retail business of Apple is monitored and the performance enhanced so as to give the firm a competitive edge over neighbors.

 

 

 

 

References

IBM, (2008). The enterprise of the future .Electronics industry. Retrieved from:

https://www-935.ibm.com/services/us/gbs/bus/pdf/gbe03105-usen-ceo-electronics.pdf

Bajaj, N., (2011).Understanding U.S. Consumer Electronics Retailing. Retrieved from:

https://www.cognizant.com/InsightsWhitepapers/Understanding-US-Consumer-Electronics-Retailing.pdf

Moizo , D., (2016).Consumer Electronics; U.S. Consumer Electronics, a sector on the move. Retrieved from:

http://www.eulerhermes.com/economic-research/blog/EconomicPublications/us-consumer-electronics-industry-report-jan16.pdf

Diagne, A., F., (2012).Made In America: Computer and Electronic Products

http://www.esa.doc.gov/sites/default/files/made-in-america-computer-and-electronic-products.pdf

Schwab, K. (2016). The global competitiveness report 2016-2017, ed. In WE Forum.

 

ECSIP Consortium, (2016). Study on the Competitiveness of the Electrical and Electronic Engineering Industry

 

United States. Office of the Federal Register, (n.d). Code of Federal Regulations: 1949-1984. U.S. General Services Administration, National Archives and Records Service, Office of the Federal Register, 1980.

15 U.S. Code Chapters 47 - CONSUMER PRODUCT SAFETY

Deloitte, (2015).Competitiveness: Catching the next wave Africa

Wetering, H. V., (2015). Brazil, the new manufacturing hotspot for electronics?. Retrieved from: http://reporterbrasil.org.br/wp-content/uploads/2016/09/Brazil-the-new-manufacturing-hotspot-for-electronics.pdf

 

Markman, G., & Phan, P. H. (2011). The Competitive Dynamics of Entrepreneurial Market Entry. Cheltenham: Edward Elgar Pub. 452-454

Griffin, R. W., & Pustay, M. W. (2012). International business. Harlow: Pearson Education. 171-173

3825 Words  13 Pages

            International Cyber Security Threats

            Chapter 1. Introduction

The interment is increasingly becoming the central part of individual’s lives today. Nations are now reliant on technology particularly cyberspace (Aloul et al., 2012). This is comprised in every activity that is delivered on daily basis. Ranging from instant texting, purchases, traveling, learning and financial transactions, it is apparent that the internet has now transformed every aspect of life. With the increasing internet utilization by individuals, guarding important data has thus become a necessity and a priority for national and international governments. As technology continuously empowers growth it becomes apparent that individuals are more vulnerable to cyber threats. People today are in need of liberty and enablement to utilize technology while being guarded against any spiteful activity (Aloul et al., 2012). Cyber threats are currently developing rather rapidly thus creating the necessity to create and stiffen security protections to ensure adequate guard for everyone utilizing these cyberspaces. The escalation of cyber threats in varying rates and differences has resulted in prime security threats thus the necessity for better security protection application to hinder the occurrence of such threats which might not only affect national but also international socio-economic performance (Aloul et al., 2012). Most institutions and individuals globally are faced with major challenges while attempting to maintain cyber-security based on monetary and technology assets limitation. This research paper is objected at analyzing the need and the importance of cyber-security in the contemporary, globalized internet era.

Chapter 2. Literature Review

According to Cavelty, (2013) cyber-security mainly relates to the creation of self-reliance and safety in regard to the utilization of information in the quest of ensuring a conviction by the information society. In other words, it is an intervention in the contemporary society whose objective is to lower and hinder any risk and susceptibilities in relation to cyberspace safety. Similarly, Byres& Lowe, (2004) cyber-security in this context, therefore, encompasses basically everyone and every activity globally. It offers tremendous opportunities for improving human development and obtaining more improved assimilation in the data society. Cyber-security supports extensive acquisition to knowledge as well as learning in regard to schemes and policies evolution. More so, it develops fresh kinds of profitable, social and expert models which creates a number of practical and lawful issues that should be that should be handled on the ground of valuing its unique nature and concerns. This, therefore, implies that based on the evolution different measures and distinct strategies contrary to those that have been acquired prior to the information era of technology are necessary (Cavelty, 2013).

Possibly the most dominant and dangerous cyber-security threat is cyber-terrorism. The rate of the recent terrorist owned attacks globally has raised concerns among professions on the intimidations that is faced by nations (Aloul et al., 2012). Cyber-terrorism is an organized attack against computer-based information systems. In this context, terrorists mainly seek to destruct the existing information structure in a country so as to intimidate national security, ruin public trust, deteriorate the economy and cause unrepairable damages. Most of such attacks are fueled politically and normally result in violence (Cavelty, 2013). While in most cases these attacks are aimed at destroying the security systems the economy is the most affected due to destructions and instabilities. It is worth noting that terrorists normally necessitate minimal period to access critical data and destroying security. As most states are developing fresh technologies without considering adequate security needs this is creating even wider opportunities for a security attack. The security and communication network of any country can be impacted greatly by terrorists hacking. For the United States and the globe, September 11 offered the most suitable example of the damages that can arise (Cavelty, 2013).

Ericsson (2010) notes that, nevertheless, most administrations and societies are existing in terror of the undesirable effects of information technology based on the experienced socio-economic and security threats. In accordance, the absence of cyber-security within most environments degrades information security confidence. This is usually the scenario with most intrusions globally leading to the loss of finances (Aloul et al., 2012). In the administrative, supervisory and law organizations the absence of cyber-security lowers the actualization of utmost possibility in regard to information technology. This, therefore, means that unique measures are necessitated to stop cyberspace from becoming a root of threats for an administration’s citizen while avoiding the occurrence of cyber criminality. Most governments have as per today, adopted distinct measures that seek to improve cyber-security for its citizens but most of them have proved to be less effective (Ericsson, 2010).

The utilization of cyber instruments in the acquisition of data has increased being part of international intelligence services. In addition, most foreign countries are particularly working even more in the creation of information system and agreement that would increase the possibility for sole institutions to acquire severe effects by destroying distributions, economic and relationship systems (Ericsson, 2010). These aspects are particularly essential for the military authority and security in general which would, in turn, impact individual’s lives nationally and globally. According to Javaid et al, (2012) the increasing state of national and foreign enemies are eyeing information systems that might incorporate computer, communication and internet systems in an essential sector. In that, the attackers might destroy the systems to acquire information that is necessary for the transferring data to different networks that are ruled by foreign or national enemies thus creating threats (Javaid et al, 2012).

Apart from the criminal groups, cyber terrorists and international intelligence departments, insiders can be an additional cause of cyber-security intimidation (Javaid et al, 2012). Insiders normally necessitate increased knowledge in regard to interruptions generated by computers given that they have information about their targets infrastructure (Probst, 2010). This, therefore, permits those to acquire any kind of information which might also include copying and destroying of data at wish from their unauthorized control (Ericsson, 2010). Contractors can also be the sources of such attacks because they understand almost every aspect of the systems. In that organizations are required to employ experts to assist them with their security installment and if the professions are not, therefore, driven by positive purposes the opportunity can be utilized in accessing vital content regarding such institutions and placing it, the government and society in actual threats. The rise of cyber threats has affected business relations and productivity for a significant period with has resulted in collaboration amid countries globally. Simultaneously, policy developers, professions, and researchers are consistently outlining the significance of collaboration amid different countries and their administrations to respond to the issues levied by the nature of cyberspaces so that cyber safety can be achieved. Actually, it is uncertain that any given country has the capability to guard itself against cyber threats without collaborating with different countries.

Based on Kritzinger & Solms, (2010) the hacking of fundamental information, computer infections, and any additional cyber-connected threats impacts the lives of individuals ranging from small inconveniences to severe loss cases. Today's cyber threat is usually caused by susceptibilities and carelessness or in other cases unplanned accidents. Nevertheless, the cases can be organized ones such as hacking or information access without any authorization. The primary objectives of such cases are related to stealing fundamental data in order to develop unlawful monetary transfers that are aimed at destruction. In other words, the development of technology has placed most individuals under threats which affect security (Kritzinger & Solms, 2010). In other words, cyber security can best be described as a mode of offering protection to any existing data from unauthorized destruction. This can also be described as any measure and activity that is applied to lower risks and any type of susceptibility and the enforcement of the needed regulation for safety (Mo et al., 2012).

Rowe, Lunt & Ekstrom,(2011) notes that in the dynamic world today, Cyber-security is vital for societies, nations, and organizations that are involved in the gathering and storage of wider data varieties on networks and computers (Mo et al., 2012). For most families across the globe, the need to guard their members and particularly unsuspecting children from the negative effects of cyber use has grown to be of adequate significance. In regard to personal lives, people are more focused on guarding information that would have direct effects on the social existence and financial stability. The internet cannot be rejected because it has positively transformed every life’s aspect and the persisting threats can be handled adequately (Rowe, Lunt & Ekstrom, 2011). Technology has offered varied and stable grounds for learning but the threats are still present. Data such as photos that are shared individually within the social internet platforms such as Twitter can be utilized by other unauthorized persons unsuitably thus resulting in severe and intimidating situations.

According to Probst, Hunker, Gollmann, & Bishop, (2010) today, social networking platforms are considered to be the most recognized mediums for interactions and sharing of data globally. However, despite the benefits, the platforms have generated numerous opportunities for cyber criminality, conceded personal individualities and data outflow. Thus, it is important for persons to comprehend on the manner in which they can guard themselves against cyber threats and should always understand the general distinction amid actual and computer-generated word (Kritzinger & Solms, 2010). Apart from the fact that the government is needed to install measures that seek to enhance technology liberty and safety individuals should in general know how they should guard their important information and also participate in ethical online conducts in the quest of eradicating cyber threats evolution thus generating a safer online surrounding Von (Solms & Niekerk, 2013).

International business institutions, particularly SMEs are faced with severe challenges while attempting to protect their data. Having low monetary and technology materials makes it even worse for those organizations to improving their security systems and maintain technology improvements (Probst, Hunker, Gollmann, & Bishop, 2010). Cyber-crime has been existence for the longest period since the initiation of technology but despite the need to addressing the issue in order to improve the standard of individual’s life and create safety, it is on the rise. However, having adequate awareness in regard to cyber-security and adequate organization can be useful can be essential for organizations and individuals in general (Solms & Niekerk, 2013). Cyber-security has equal prominence for the local and international governments because most of the operative organizations keep extensive amounts of confidential reports regarding the associated nations and its citizens. Regardless, most of the governmental institutions experience challenges in regard to guarding their confidential information (Wang & Lu, 2013). The unlawful acquisition of delicate data technologically by terrorists from administration owned institutions and internet spying can result in severe threats on a nation. For this rationale, cyber-security is of dominant significance for all kinds of institutions and a fundamental asset to any given state. The intensifying utilization of the contemporary internet and the rising cyber-crimes has created more cyber-security importance than ever before (Wang & Lu, 2013).

Based on Yan, Qian, Sharif, & Tipper, (2012) for the impacts of cyber-security intimidations to be lowered, the United States, for instance, has created several measures to avoid such outcomes. It is admirable, that America utilizes billion dollars each year that are aimed at improving the secretive and public protection against the rising violence and equipped international cyber intimidations. However, the existing measures are inadequate to fight the rapidly rising threats against the nation’s security (Probst, 2010). With the rising use of internet networks in different countries, it is essential for all the state to combine their capabilities in the fight against cyber-security intimidations. According to Wei, Lu, Jafari, Skare, & Rohde, (2010) it is worthless for any given nation to assert that it is committed to fighting cyber-crime solely because systems are now accessible from any region globally. The most suitable approach would be America adopting global control. In this process, the administration will gain more safety and the potential to establish, situate cyber criminals and penalize them methodically (Donaldson, Siegel, Williams & Aslam, 2015).

Chapter 3. Methodology

The aim of this research was to establish the existing cyber-security threats and the significance of cyber safety in the national and global context. In addition, the search sought to investigate the effectiveness of the existing international cyber-security interventions in creating technology autonomy and enhancing security.

Research Method and Design

This study utilized a quantitative study which involved analyzing and review findings from existing studies under a descriptive design. The method and design were selected because they are cost and time effective. In addition, contrary to a qualitative research, a quantitative study has the capability of generating maximum information to support all the raised claims and the research question (Lim, 2013). In addition, quantitative study generates computable as measurable results. Its only disadvantages are that it normally limits the scope of the study on the set frameworks (Tavakoli, 2013). The study is not vulnerable to biases and opinions because the arguments are acquired from authoritative sources. In other words, quantitative findings are more accurate and reliable because the researcher has the opportunity of testing the hypothesis, remain objective and make dependable recommendations (Tavakoli, 2013).

Research Strategy and Approach

The investigation that was utilized with respect to this research was a practical one and not new. The study utilized different existing literature that regards the role of cyber-security measures of security and the increasing cyber threats globally. In this context, the research created fresh ideas that are grounded in existing literature. The study utilized an inductive investigation strategy. This approach involves the researcher creating specific observations which are in turn utilized for the development of research theories (Tavakoli, 2013). This approach was utilized because the research was a quantitative one.

Data Collection and Tools

Quantitative data was mainly acquired from the online surveys and analysis. Secondary information was acquired particularly from books, articles, and journals. The sources were only included if they addressed the issue of cyber threat in the global context. The collection methods mainly depended on random sampling in order to eliminate any cases of biases which would, in turn, affect the dependability and accuracy of the study. Information was acquired, summarized and then assessed in order to form a uniform study pattern that supports the research objective. On the other hand, online surveys were examined to offer primary data to support the raised claims for genuineness.

Data Analysis

Content analysis was the utilized approach for evaluating information gathered from secondary sources. This refers to the mode of study where the acquire information is classified in regard to concepts to permit the development of firm grounds (Tavakoli, 2013). This approach is beneficial because it assists in the simplification and mini minimization of the gathered data. The approach is an objective one but prone to human mistakes (Tavakoli, 2013).

Research Limitations and Ethical Considerations

The primary limitation of this study was time and information analysis challenge because the subject of cybercrime has been largely discussed thus requiring more analyzing time on the large content. Since the study handles a sensitive issue regarding national and foreign security confidentiality was upheld.

Conclusion

It is apparent from the analysis above that today’s cyber-security terrorizations are severely harmful to the nations and international security. The primary issue is that technology is progressing rather fast on everyday basis thus creating more sophisticated fresh ways for terrorists and hackers for getting through cyber-security. An attack on confidential data regarding a country can offer unauthorized information acquisition thus threatening the safety of a nation in general. Equally, internet users create cyber-security intimidations solely based on the information shared on the sites. It is particularly challenging to determine the motives of the internet users which is threatening the existence of every individual. It is based on such challenges that it becomes necessary for any administration to apply all that is in its exposure to create harmless cyberspaces for every individual. It is essential to create mutual objectives globally in regard to cyber threats reduction based on the reliant nature of communication systems and economies globally.

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1-6.

Byres, E., & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.

Ericsson, G. N. (2010). Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507.

Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 585-590). IEEE.

Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847.

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., & Sinopoli, B. (2012). Cyber–physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195-209.

Probst, C. W., Hunker, J., Gollmann, D., & Bishop, M. (2010). Aspects of insider threats. In Insider Threats in Cyber Security (pp. 1-15). Springer US.

Rowe, D. C., Lunt, B. M., & Ekstrom, J. J. (2011). The role of cyber-security in information technology education. In Proceedings of the 2011 conference on Information technology education (pp. 113-122). ACM.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & security, 38, 97-102.

Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.

Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber-attacks. In Innovative Smart Grid Technologies (ISGT), 2010 (pp. 1-7). IEEE.

Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials.

Probst, C. W. (2010). Insider threats in cyber security. New York: Springer.

Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Enterprise cyber-security: How to build a successful cyberdefense program against advanced threats.

Tavakoli, H. (2013). A dictionary of research methodology and statistics in applied linguistics. Tehran: Rahnamā.

Lim, W. M. (2013). Research methodology: A toolkit of sampling and data analysis techniques for quantitative research. Place of publication not identified: Grin Verlag.

 

 

 

 

 

 

 

3087 Words  11 Pages

Macro Article Analysis

 Information communication technology is one of the many tools being used to spur a slowing economic growth and hence, creation of new jobs. As many people around in the world engage on the online platform, economies are enhancing their ability to take advantage of emerging technologies and hence be more competitive. ICT sector has great economic impacts on countries whose focus is sustainable economic growth and development, and remaining afloat in an economic environment that is becoming increasingly volatile (Kvochko, 2013).

Job creation one of the effects that are being brought about by the new technologies.  The ICT sector is becoming a major source of employment in major economies like US and Australia where many jobs are being added annually even though such growth is not even. The production of goods and services is also increasing and widening in line with the growth in world technology market (Kim, & Heshmati, 2014). Another major impact of the ICT sector expansion is a growth in the world economy. The economic growth of countries is measured through GDP, which refers to a rise in market value of services and goods after being adjusted for inflation over a given period of time.  Research on the different countries is indicating that the adoption of ICT in economies leads to increased growth in GDP. In emerging markets like China, penetration of broadband is being related to over 2.5 percent growth in GDP and the main drivers include e-commerce. E-commerce refers to use of online platform in selling of goods or services (Cimoli, Hofman, & Mulder,2010). Hence, ecommerce is offering a platform where an array of products services can be traded through electronic interaction between parties and this enhances the transaction process.

 A major impact of ICT is that it leads to emergence of new services and even industries though increased innovation. Not only has it led to growth of services industries, it has been a major factor that is driving economic growth in the production of goods in various industries. The ICT sector is also a major player in the transformation of public services as they increasingly become available through online platform and this enhances the regulatory framework that informs how business transactions are conducted.  In fact, a key trend has been the switching of various public services into cloud computing platform and this has become a major basis of modernization of the economic activities. Different governments around the world such as Moldova are shifting their IT infrastructure into the cloud thereby enabling business and citizens can access the various services through their mobile phones (Kvochko, 2013). The overall effect is provision of conducive economic environment where innovations can thrive and hence, this leads to new service industries and enhancement of entrepreneurship. Such an enabling environment has lead to emergence of a totally new sector that includes major companies such as Facebook which create many jobs in the economy. Research indicates that Facebook apps which form a big part of these innovations resulted to creation of more than 182,000 jobs as at 2011 and this is expected to increasing moving forward (Kvochko, 2013). This indicates that innovations lead to improved production of goods and services, hence creation of jobs for the economies.  The new job created through due to incorporation of ICT sector help in addressing various challenges experienced in the world market in relation to unemployment or underemployment of available labor.

 In addition, business innovation has increased due to adoption of ICT meaning that more and more business are finding it important to have their presence in the online platforms. With the modernization of the world economies ICT makes it possible for entrepreneurs to start new businesses, expand local businesses and even move their operations to different parts of the global market.  Competitiveness is major aspect that affects business operations and with adoption of ICT, organizations are able to gain competitive advantages which enable them to carry out their transactions both at the local and global market (Kim, & Heshmati, 2014).  Internet offers new ways these organizations can reach out to existing and new customers and hence, gain larger market share. An important aspect has been the use of social media as an essential marketing tool to reach out to consumers of various goods or services provided. The business processes are becoming efficient and easier to streamline due to the use of ICT tools.  Another area which is transformed by the ICT sector is the workforce that plays a key role in the growth of firms and economies. Division of labor is becoming easier through emerging microwork platforms that are developed by firms such as Amazon and oDesk (Kvochko, 2013). Various tasks can be divided into smaller components which can then be outsources to workers through contracts. Since cost associated with labor is a major player in profitability of firms, entrepreneurs can greatly reduce such cost or be able to access a qualified workforce at lower cost (Kvochko, 2013).. Such an economic environment makes it easier for entrepreneurs to come up with starts ups that face limited regulatory and legal handles since the public services are automated.

References

Kvochko, E., (2013). Five ways technology can help the economy. Retrieved from: https://www.weforum.org/agenda/2013/04/five-ways-technology-can-help-the-economy/

Kim, T.-Y., & Heshmati, A. (2014). Economic growth: The new perspectives for theory and policy. 230

Cimoli, M., Hofman, A. A., & Mulder, N. (2010). Innovation and economic development: The impact of information and communication technologies in Latin America. Cheltenham, UK: Edward Elgar.10-14

 

 

919 Words  3 Pages

Trends in IT recruiting

The information technology industry is continuously shaping and transforming the other industries in the global economy driven by growth and integration of communications and IT into the society and the economy.  From mobile applications and cloud computing to infrastructure and social media, very few industries have to change their operations more rapidly and few are required to adapt to these changes within the appropriate speed for success. In IT recruiting, may be more than other industries, time factor is very important. Whether top talent in is needed for organizing internal IT or a technology provider is looking for the best in the industry , the recruiters in the  IT recruiters are faced with rapidly changing competitive parameters. The changes are aimed at efficiently and effectively driving the results of any given business. A quick look into the present information technology hiring market shows various major trends that are forming a landscape that is very challenging for the recruiters as well as employers. The aim is to enable leaders deal with significant operational, technical, cost and managerial challenges that they encounter in their endeavors. Intense competition, speed of innovation in products and changing platforms and even business models are forcing the recruiters and employees to consider these trends and adopt strategies that will help in dealing with them.

Findings

Different factors including the economy, change in the behavior of candidates and an upsurge in usage of social media have played a big role in shaping the way recruiters and employers relate with the tech experts and professionals. Various changes have emerged due to the market needs especially of talents and experts needed to assist in dealing with the arising challenges.  The three major trends in IT recruiting includes increasing employment of contingent workforce in form of freelancers and contractors , increasing issues related to mobility of talent tools and  the use of social media in the recruitment process. Modern employers encounter the moment –to-moment fluctuations that arise from market changing market demands which need a quick decision making and even agility in response to market trends (Fraumeni , Manser , Mesenbourg, n.d).  These are mostly seen in smaller organizations than in large firms.  The IT recruiters have to approach freelances so as to assist them in dealing with rapid innovation and change in the economy. The employers have to recruit staff in accordance with their clients including the government recruiters such as Labor Department who may not focus more on long-term employment but on filling the short-term needs or even part-time employees (Gheorghe, 2015). This means that Just-in-Time recruitment is becoming a strategy for employers especially in functions such as marketing where organizations are in need of taking advantage of appropriate time in the market.

 In this regard, there has been development of various tools such as Elance, which is a Silicon Valley based Private Talent Cloud. Such tools make it possible for recruiters to find and bring on board contingent employees to work under specified deadlines. In the current business world, Just-in-Time hiring is surely a major critical strategy that enables effective use of resources to attract and win over top talent while at the same time retain control and visibility at the business level. The recruiters are finding it possible to fill important and gaps that require high skills with freelance employees (Gheorghe, 2015).  The issue of Virtual Reality is being adopted by many recruiters as more work becomes doable virtually. There are various advantages related to continent workforce .Employers who strategically and effectively use contractors normally have a good structure and outline of how the contractors will be used. The recruiters no possess the luxury of recruiting a permanent workforce since employers are rapidly moving to a model that is more contingency-based (Global services & research portfolio (n,d). In this model contractors and freelancers are becoming a good fit with the organizational recruitment strategies.

The emerging talent mobility challenges in the current environment are significantly related to market and economic realities of given segments in any industry. The IT recruitment industry is able to reach out to a wide pool of talents who are need in any particular place or industry, especially in sectors that are continuously expanding.  The challenge of immobility relates to relocation costs and recruiters are embarking on a strategy of looking for candidates whose relocation will not be needed. The IT recruiter have had to act on behalf of employers to communicate and convince the candidates for hire that undertaking assignments outside their homes will be important in optimizing their careers. The recruiters have to adopt some mobility policies so as to recruit external experts and talent who will fill up positions that are not attractive to internal staff.  The various recruitment programs have to be subjected to pressure of cost management and reduced allocation of resources which affect the recruitment of individuals whose relocation is necessary. In this sense, recruiting of different but rare talents become a hard task for the IT recruiters as they try to remain within the employers cost regulations and control.

The increasing use of social media has influenced the way IT recruitment is being done by reshaping the whole industry. In recent years, social media has been a huge and effective tool for carrying out business activities. The tool is revolutionizing how organizations communicate to the market and in this sense, how the staffing industry is recruiting employees for the clients. Pinterest, LinkedIn, Twitter and Facebook are becoming important tools for the forms recruiting IT specialist and linking them with clients.  Social media is affecting the connection between job seekers and recruiters, how recruiters arrive at their conclusions and the way IT recurring agencies present themselves in the market.  It is allowing the recruiting agencies to reach out to more candidates by expanding their networks since there are no longer geographical limitations (Nikolaou, 2014). The recruiters network and connect with the best IT talents across all places as required by the employers who are their clients.

 Through the media, it is possible to join industry discussions, groups and even forums to have an access to experts and great mind that they can contact directly. The greatest advantage is that the recruiters can easily access passive candidates who are also talented. It is clear to them that passive candidates are mostly better off, but since they are not search for jobs placed on boards or applying to recruiters, connecting with them is quite hard.  However, a social platform such as LinkedIn allows the recruiters to eventually create links with the candidates so as to provide them good opportunities that they cannot afford to overlook. This is for the satisfaction of the clients which in turn builds the reputation of IT recruiters. The platform allows the recruiters to filter the search criteria so as to obtain the potential candidates who will match the skills requirements of the clients (Nikolaou, 2014).  The strategy is more effective than expecting that a person with required skills will apply for apply for a position from a job advert that has been posted online.

 The social media platform is also becoming important for IT recruiters to assess their candidate who use it to open up more about themselves. Obtaining a complete portrayal of prospect employees may not be possible by looking viewing their resume. The platform offers a link to the samples and portfolios, professional qualifications and this is enabling the recruiters to learn a lot about candidates who can fit in the positions at the workplaces of the clients. With many users , the platforms forms a great way in which IT recruiting organizations can enhance their brand awareness and then fain enough exposure. The recruiters are using the platform for market with an aim of brand recognition especially among the small and medium sized organizations that may be restrained by huge cost of using the traditional methods of search for the right IT specialists. The IT recruiters are also increasingly using video contact to facilitate the recruitment process since this allows for higher rates of engagement than any other contents (Nikolaou, 2014). Eventually the social recruiting fulfills the goal of building up the employer brand and getting potential candidates to view the IT opportunities being offered by the employer.

Emerging issue

 An important issue arising in this case is recruitment for contingency workforce.  The consistent fluctuations in market demand for quick decision making process and agility to adapt to emerging trends is making firms, especially small size and medium size to seek freelancers and contractors to perform tasks requiring IT expertise. As such the role of IT recruiting firm ensures is to provide a link between the clients and these specialist to provide their services on temporary basis.  The growth of contingent workforce is becoming more prominent and in the performance of similar service for employers. Employers are seeking provisional workers and this is being enhanced by new online platforms that are becoming more sophisticated in cases where such services are required on part time basis.  The IT recruiting industry is able to provide contingent workers to offer relief in situations that are stressful like replacement of talented individuals whose absence will affect the operations of the firms (Gheorghe, 2015). The rise of the contingent employees becomes very important to recruiters who are able to meet their clients need for reduced costs and filling skill gaps and hence allowing business to become agile and hence, address certain challenges they may encounter. The IT recruiting industry is therefore, able to provide platform where the employer can access the IT expert services at the most convenient moment.

Conclusion

IT recruiting plays an important role in providing the link between the clients and candidates through various platforms. Timing is an important aspect in IT recruiting given that information technology and communication provides is constantly changing and hence the need for top talent to address arising challenges. The various trends that influence this industry include part-time workforce, workforce mobility and social recruiting.

References

Fraumeni ,B., Manser ,M., Mesenbourg, T., (n.d). Government STATISTICS: E-COMMERCE AND THE ELECTRONIC ECONOMY.

 

Global services & research portfolio (n,d). 2017-2018

Gheorghe, M. (2015). State of Freelancing in IT and Future Trends. World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 9(5), 1474-1478.

 

Korsakienė, R., Stankevičienė, A., Šimelytė, A., & Talačkienė, M. (2015). Factors driving turnover and retention of information technology professionals. Journal of business economics and management, 16(1), 1-17.

 

Nikolaou, I. (2014). Social networking web sites in job search and employee recruitment. International Journal of Selection and Assessment, 22(2), 179-189.

 

1769 Words  6 Pages

Yes Schools should Provide Unfiltered Internet Access

Introduction

Most schools tend to filter their internet access, even though there are those sites which can be able to provide educational support. Filtered internet access may limit students from being able to access educational information, particularly is the website is unknown. These filters consequently tend to hinder the access of unknown sites, thus making it hard for the students to be able to benefit. Even though filtering internet access in schools is significant, the filters should not be too restrictive, thus limiting the students from visiting educational sites.

Schools should provide unfiltered internet access to the students, “High school students use unique approaches in order to access the sites they want (Orey, Stephanie, & Robert, 23).” This is basically because they have mastered the art of using proxy sites.  Proxy sites tend to hide the identity of the internet user, thus making it easy for them to surpass the filters. After hiding their identity, they can be able to access any sites on the internet without any restrictions. “The access of other websites is also affected by the filters.” Students may not be able to access educational sites. These sites include social media sites, in which most tutors pass their online lessons. This consequently makes it hard for the students to access such information.

Students should not be restricted from accessing the internet. “Filters limit the information which should be gathered by the students (Orey, Stephanie, & Robert, 26).” These filters have become very restrictive, limiting students from being able to gather significant information. For instance, one cannot be able to access some sites, since filters restrict their access. Moreover, students cannot be able to put what they have learnt into practice, due to the restrictions which have been made on educational sites.

Indeed, schools should allow students to use unfiltered internet access. “Schools, should advice students to only concentrate on sites which are important for their educational purposes (Orey, Stephanie, & Robert, 26).” Teachers are supposed to advice their students, and allow them to do things without being restricted. Filtering internet access, tends to make students curious, thus looking for ways of getting unfiltered access. In addition, teachers should guide and support students in accessing the best educational sites.

Conclusion

Filters should not be too restrictive, since they limit students from accessing significant information. Teachers are supposed to look for possible ways of advising and helping students in getting the best websites, thus making it easier for them to increase their educational knowledge. Students should not be provided with unfiltered internet access, as this is likely to make them curious, hence resulting in the use of proxy sites in order to gain access to erotic sites.

Work Cited

Orey, Michael, Stephanie A. Jones, and Robert M. Branch. Educational Media and Technology Yearbook: Volume 37. New York, NY: Springer, 2013. Internet resource.

484 Words  1 Pages

Elements of Computer Security

 

 Computer security defines the significance of embracing strategic means of protecting computing systems particularly for the safety of stored data in organizations. Computer security involves protection of a broad system which signify distinctive classifications such as physical and network protection. Specifically, computer security is made up of unified security services that detect and protect potential threats that may interfere with system security. Nevertheless, computer security encompasses a series of policies that are responsible of identifying possible threats and at the same time provide equitable requirements of enhancing secure system in an organization. Computer security is an essential element in any organization since a secure computing system avoids operational contradictions, enhances business processes and importantly, ensures safe and reliable storage of organizational information (University of California, 2017).

Secure computing systems are characterized by elements of concealment, reliability and its availability. Confidentiality is a crucial element of computer security since it determines which information is accessible by outside sources and sensitive information that should be restricted from public review. Computer systems depend on access control for confidentiality since it is a key mechanism of computing security. For instance, access control is usually the central mechanism which examines and decides access viability. Access control may base its authorization decision from various evaluations. For instance, the mechanism may evaluate relevant information from “Access Control Matrix” within an organization’s computing systems in order to verify whether the user name provided links to specific operation requested. Importantly, control matrix may be integrated on the basis of either Access Control Lists (ACLs) usually to connected objects of security objects in an organization or rather the matrix may be based on capabilities entailed by organizational principals. Nevertheless, confidentiality of computing security is as well linked to the responsibility of data existence. Therefore, it is the responsibility of access control to conceal data to facilitate its mere existence in instances necessitating data protection (Gupta et al 2016).

Computer security specify on data trustworthiness usually meant to border organizational data from unresponsive alterations. Data integrity involves sustenance of data content and its origin in order to control data authentication. Computer security is thus oriented at regulating data accuracy by evaluating credibility of the source from which data was extracted.  Computer security plays a major role of ensuring functionality of the element of integrity in order to undermine possible threats of data distortion. This element of integrity in computer security includes two mechanisms classified into prevention and detection mechanisms objected to enhance data integrity in differing ways. For instance, prevention mechanisms actually blocks unauthorized access whereas detection mechanism is set to report instances when data is untrustworthy. Detection mechanisms bases its report of data credibility on either event exploration or it may study availed data to examine unauthorized changes (Wolff, 2016).

Availability is also a major element of computer security. Element of availability provides a perception that every organizational information must be accessible at any given time. Availability can be regarded as a reflection of system reliability meaning integrated system can be trusted with an organization’s resources. Additionally, element of availability classifies the need to integrate a system design that can be accessed with less ambiguity. Availability of a secure computing system defines capabilities to resist on purpose utterances intended to hinder data accessibility. For that reason, computer security emphasizes integration modified system designs whose network is less prone to illicit changes  in order to facilitate reliability of resources when need be.

References

Gupta, B., IGI, G., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of Research on Modern             Cryptographic Solutions for Computer and Cyber Security. Hershey, Pennsylvania [701   E. Chocolate Avenue, Hershey, PA 17033, USA]: Information Science Reference.

https://its.ucsc.edu/security/training/docs/its-training2016-17.pdf

University of California. (2017). Introduction to Computer Security. UC SANTA CRUZ –           Retrieved from http://its.ucsc.edu/security/training/intro.html

Wolff, J. (2016). Perverse Effects in Defense of Computer Systems: When More Is Less. Journal             Of Management Information Systems, 33(2), 597-620. doi:10.1080/07421222.2016.1205934

659 Words  2 Pages

The Future of Big Data

            Big data includes the data settings that are large in volume or compound bin nature that the ancient data processing cannot be used.  Almost everyone in the healthcare family will agree with the fact that data can drive not only marketing and sales but also identify its outcomes as well. With that, big data and using it are two diverse approaches.  Those who review its outcomes always determine not only the future of an organization but also the end results of the patient care (Anderson, Janna & Rainie, 32). 

            In many companies, big data is used to categorize the customer’s needs.  Marketing in such companies remain separate from the rest of the enterprise and may be operating without profits of the available data to promote products.  While the type of data used to modify the end user experience and to eradicate the one size fits all solutions that given today, customers still experience approaches by vendors that only minimally change solutions to them, while the client and consumer patience is the main thing.  The information needed to address the specific requirements of the customer is becoming more available but getting into the right track remains a confront (Anderson, Janna & Rainie, 38). 

            In healthcare, big data remains more unproven although it has not stopped companies and marketers from jumping on the big data bandwagon.  Big data can provide a better care quality and less expenditures but the proof to support these claims to date is uncertain at best.  Big data analytics take masses of data from many diverse sources to discover patterns that can be useful in solving problems.  These sources include clinical, financial and operational data and often work in the cloud as well.  Most of this data is made to allow patient connection by taking a proactive and a conservative approach.  Clinical data validates from across the range of care to often include not only lab results and unstructured data (Sander, 92). 

            Big data has started to disrupt the ancient databases and data warehouses that will be the next big wave of advancement in data management.  Innovation has to be faster or cheaper to overcome the inactivity of an ancient approach in Information Technology.  Apache made at least ten times less expensive to house data by distributing it across commodity hardware and opening up new software. There are some edges and hidden costs, but this was compelling enough to get significant market grip versus legacy hard work and software.  The main utility of the Hadoop distributions has morphed towards used mostly by a storage layer with a system of other tools buildings analytics value above it (Sander, 95). 

            This is because the next challenge has been in processing the data for understanding.  Map reduces turns to be a bit complex for many to influence in building analytics applications both that use unfamiliar language and limiting in its flexibility. The Apache spark is swiftly becoming the main aim of the analytic engine for Hadoop storage offering enough time and graph liability. The next problem of the machine data is that as the data volumes have become more expensive to handle while its meaning has become harder at its scale. The important news is that machine learning works better to the data that is thrown on it. The math machine learning is new and its economics has changed (Sander, 102). 

            One of the most interesting areas that the big data is used is the pediatric cardiology and this is where analytics are used to make patients more specific proposals for treatment. The Pediatric Cardiac Critical care uses big data to try and improves the quality of care by collecting data to the critical practice and outcomes from each patient’s medical record and analyzing the data so that they can provide clinicians with timely presentation criticism. This predicts the culture of ongoing improvement through analytics and mutual learning. This disease is registry is also important as we move towards a future based healthcare system (Dumbill et al, 45). 

            Big data in radiology is more about decision support than anything else and plays an important role in expressing the way radiologists  said that they always use the clinical policy to support the computer-based diagnosis. The idea is not there because the world, while seemingly large, it needs to be inspired in the confidence level needed by radiologists.  These large data sets can be used in the future clinical decisions support systems such as CAD to study patients with the same features and calculate the likelihoods of malignancies and other diseases.  Putting this in future forecast, data mining needs some more coding and tagging which will make the data easier in organizing and searching through. This will promote both radiology identify and finally the patient outcomes through improved diagnostic capability which are made possible through using the big data (Dumbill, 66). 

            Looking at the application of the World Graph of the government, the aim of any current government is to protect the rights of its citizens, sustain and conserve markets and to maintain the education systems that make the society to advance.  The future data that is already gathered about people shows a compelling story about what they consider good and bad or what they need for the future.  Pairing data from anyone with the analysis and the ability to route resources to people who can solve societal predicaments can be more effective than the current systems (Dumbill, 78). 

            Based on education, it is important that teachers teach students in physical buildings.  It is rather important for the students and families to pay lot money in college education.  Algorithms can parse classroom discussion boards and forecast the students’ grades and scores with a high degree of correctness.   If computers know of every nuance of a person, their grades can be computed. The current data movement to the online movement is a small step towards the future (Viktor, 32). 

            In addition to this, mechanical teachers can review your knowledge level and the costs of education that may be more seen to more students.  The universal data and advantages give information about a person to help them make life big with greater decisions. This data analyzes information about a student to review what career path he is best suited. Professional works that need data engagement can be done more effectively by the Universal graph used by a human.  This does not mean that people will not have meaningful careers.  The universal graph will check the field that is more suited by your abilities.  Humans can reach a new degree organization based on the future of the big data of the universal graph (Viktor, 45). 

            Widening the scope of the Company, the universal graph can help review what the new products or services it should offer.  Employees should be valve for the management and this should lead to more training and support to help them succeed.  Based on the country level, the universal graph can help guide the nation’s plans of the geopolitical issues and from effective programs that would solve the impossible problems such as poverty and social inequality.  Looking on the future of the big data, the universal graph can help people fix many of the global social ills so structures such as the government of the judiciary system that could be formed together (Dumbill et al, 87).    

            Social media sites such as the facebook and twitter can learn about your personality using the current data system.  It does this through parsing the vacation and the photos that one posts along with the new articles you link to and the thoughts on any issue.  For instance, Amazon builds a sense of who you are based on what you buy.  The future data in all these systems shows the prospect of the universal graph.  In future, the universal graph will help one reduce the trial and errors so that people can find a life partner, for instance, choosing a better college or university to go (Michael &Telang, 93).   

            The future data is determined in the universal graph so that one can better understand and make future actions.  Graph technology is currently helping the moving data of the large companies such as Netflix that has improved connections.  The graph technology will help the utility companies to forecast when they will have peak periods in either the usage or the company equipment failures.  The banks will also be able to predict more instances of theft and interior trading (Michael &Telang, 119).  

            The future of the big data has not come yet, but its prospect is convincing.  The current graph technique will help companies and organizations learn more smoothly.  It future is prospected to help people reach their potential and live more fulfilling lives (Michael &Telang, 123)

Conclusion

            The big data will adjust business and businesses will change the society.  The world that is based on the big data is still very new and as a society, people are not good at handling all the data that can be presently corrected.  Technology will endure surprising us and what is more certain is that it will be different. 

 

Work cited

Anderson, Janna Q, and Harrison Rainie. The Future of Big Data. Washington, D.C: Pew Internet & American Life Project, 2012. Internet resource.

Dumbill, Edd, Alistair Croll, Julie Steele, Michael K. Loukides, and Mac Slocum. Planning for Big Data. , 2012. Internet resource.

Klous, Sander. We Are Big Data: The Future of Our Information Society. Place of publication not identified: World Scientific, 2016. Print.

Mayer-Schönberger, Viktor. Learning with Big Data: The Future of Education. , 2014. Internet resource.

Smith, Michael D, and Rahul Telang. Streaming, Sharing, Stealing: Big Data and the Future of Entertainment. , 2016. Print.

     

1620 Words  5 Pages

 

 

IT systems

4

The comparative success of the PeopleSoft product in Australia is as a result of its skills and expertise gained trhough experience in operation that is accredited to its dominance in the Enterprise Resource Planning market. Having operated in different markets such as New Zealand and the United States, PeopleSoft had the experience needed to enter and serve the Australian market satisfactorily. When the CASMAC project was introduced, it was quite beneficial not only to the university but also to individual IT managers. The system was able to reduce the workload and effot that was involved in accomplishing various tasks. IT managers would therefore be able to initiatives that added value to their work such as conducting research and professional development among others. The system also saved on time as tasks were accomplished faster allowing IT manegers to be more satisfied with their work.

5

            The CASMAC project was a positive experience to the Australian universities in that it was able to solve most of the problems that they were facing under the old systems. Since the old systems were developed in the 1970’s, the software technology used was in the 3rd generation and this meant that the system could not incorporated new changes due to its lack of flexibility. This made it difficult for the universities to incorporate changes to accomodate their needs as well as the needs of a government that demanded transparency. However, the CASMAC systems, being more flexible allowed for the incorporation of new technology that allowed the universities to keep up with the continuous technological developments so as to meet their needs. Furthermore, the systems made it possible for the university to provide the information needed by the government in a fast, convenient and affordable manner. The universities were now able to comply to the policies stipulated by the government as well as ensure that their manegerial obligations were met thus prooving the benfits of the CASMAC systems to the Australian universities.

 

6

 What alternative outcomes may have emerged had the CASMAC initiative not occurred?

Had the CASMAC initiative not occured, universities would have had a hard time abiding to the policies stipulated by the government for them to provide the needed information as well as keeping up with the constantly evolving technological developments. The challenges woyuld have increased even more especially due to the failure of the failure to deliver assistance through the UniPower consortium project. However, the rate at which technology was developing would have led to universities pursuing other avenues to resolve their issues and ensure that they delivered what was expected by the government as well as the universities.

 

There exists a very big difference in the way private organisations and public organisations like universities go about making the decision of whetehr to invest in IT. While private organisation start by questioning whether there is a need to invest in IT, public organisation realise that investing is a necessity and mostly consider when they will invest and what procedures to follow. Public organisations are not troubled by decisions of whatehr to replace or upgrade a system since their major concern is what systems will be miost beneficial and where it can be acquired from so that it can be implemented. Private organisations on the other hand not only consider the need for new IT systems but also their cost and return on investment. There is however evidence that the commercial sector use more formal decision making processess when making investments so as to avoid wastage of funds especially on investments that result to failure. While investing in IT projects could have huge benefits for an organisation, it is important to include a financiual criteria so as to avoid wastage of funds.

 

 

 

 

 

 

 

 

 

622 Words  2 Pages

Internet Technology

How is the TCP/IP protocol related to information transfer on the Internet?

TCP/IP is basically the language which a computer utilizes in order to access the internet. TCP/IP therefore consists of a set of protocols which are aimed at establishing a system of networks in order to offer a host with internet access (Laudon & Traver, 2017). TCP/IP is therefore responsible for data connectivity, through offering other functions such as, mapping, acknowledgment and addressing. TCP/IP is therefore responsible for the connectivity of the internet, as it allows the computer to be able to directly connect to the internet. This is because, TCP/IP communicates and transfers raw data from the computer to the internet, and it converts it into a language which can be understood by the internet. The raw data transferred from the computer to the internet through TCP/IP can therefore be easily understood by the internet, thus the user can be able to get information from the internet. In addition, TCP/IP receives huge chunks of information and breaks them down into packets, whereby the information can now be easily transferred to the form which can be easily understood by the internet within the shortest time possible (Jamsa, 2013).

What technological innovation made client/server computing possible?

The personal computer, is the technological invention which made client/server computing probable. If personal computers were not invented, then this means that the internet and the web could have not also been invented (Cheruku, 2010). Client/server computing has made it possible for the capacity to be expanded continually, through adding both clients and servers to the network. A client/server network is much more reliable than the centralized computing architecture, since if a single server encounters a problem, a backup server can be used. In addition, client/server is reliable since when a client is down, then the other parts of the system continue operating without any problems at all. Moreover, through the use of client/server computing, the processing load can further be balanced by many smaller but powerful machines (Laudon & Traver, 2017). The processing load can therefore be distributed to different smaller machines instead of being concentrated in one supercomputer. This therefore allows both hardware and software to be easily and more economically built. Client/server computing has also enabled easier access of the internet, since a person can easily access the internet through the use of a personal computer at the comfort of his or her home. Furthermore, online marketing can now be easily conducted, since customers can be able to access products online, thus being able to shop from their preferred businesses.

What is cloud computing, and how has it impacted the Internet?

Cloud computing is a system of computing whereby both individuals and firms can easily gain computing power and software applications through the internet (Jamsa, 2013). Through cloud computing, people can now be able to obtain most applications online, as opposed to purchasing both software and hardware components, and later installing them into their computer systems. This is currently the fastest growing form of computing, since it has been embraced by most users in different parts of the world. Cloud computing has impacted the internet positively, since it has drastically reduced the cost of operating and building websites, since the required hardware and software infrastructure, can now be licenced as a package through the providers of the internet, at a very low cost. When it comes to individuals, they can now be easily able to participate in e-commerce or otherwise other activities without having very powerful laptops or otherwise desktops. Cloud computing has therefore made it easier for people to be able to access more information at very low cost from the internet (Laudon & Traver, 2017).


 

Reference

Laudon, K. C., & Traver, C. G. (2017). E-commerce 2017: Business, technology, society.

Jamsa, K. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Cheruku, D. R. (2010). Satellite communication. New Delhi: I.K. International Pub. House.

666 Words  2 Pages

Page 3 of 4

Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...