The Interview and Sony Pictures Hack
VerifiedAdded on 2020/04/07
|12
|3930
|269
AI Summary
This assignment requires you to analyze the Sony Pictures hack of 2014, specifically focusing on its connection to the controversial film 'The Interview'. You need to examine the security vulnerabilities that led to the breach, the type of data compromised, and the consequences for Sony Pictures. Additionally, discuss the broader implications of this incident for cybersecurity and data protection in the entertainment industry.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
3,5,7,8,9,10 COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting of
other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting of
other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely
silent on the individuals who played a role in its development. Find and summarise a
resource that describes ONE such individual. The individual should have had a
significant influence on the development of computers and/or components of modern
computing architecture.
Devlin’s Angle
Reference:Devlin, K. (2017). Contexts of Paradox. [online] Maa.org. Available at:
https://www.maa.org/external_archive/devlin/devlin_12_03.html [Accessed 16 Sep. 2017].
Link:www.maa.org/external_archive/devlin/devlin_12_03.html
Summary:
After three months on 28th December, it will be 101st anniversary of the birth of John von Neumann,
who was the American mathematician, Hungarian by birth place. He had achieved many
accomplishments in his whole life span among which, the most accomplished achievement was the
"von Neumann architecture" that states the origination of the basic principle of computer design. This
invention was also known as Von Neumann computers. It can be said that these are the ancestors of
laptop PCs and desktops of this modern age. Main feature of this computer was that the data and the
program both are stored together, generally in the slow-to-access storage media like hard disks and
were being transfer to be faster like RAM (Volatile storage medium) for processing or executing using
CPU (Central Process Unit). The processing of the recent computers is based on that same principle
but term "von Neumann architecture" is being rarely used nowadays, although this was the common
term for the profession in computing at early 1970s. It was a radical idea when Von Neumann in 1945
proposed this technical architecture. At that time machine’s essential part was the programs, and thus
different from the data ton which the machines were being operated. The common way during that time
in this operating system was to input the program data using plug-board or ay physical means and after
that feeding the data for the program o act upon.
Week 2
The text discusses the components and activities of operating systems however is
largely silent on the individuals who played a role in their development. Find and
summarise a resource that describes ONEsuch individual. The individual should have
had a significant influence on the writing or development of operating systems.
Title: Linux History
Reference: Stallman, R. (2017). History of Linux, Who Invented Linux, How Was Linux Invented.
[online] Livinginternet.com. Available at: https://www.livinginternet.com/i/iw_unix_gnulinux.htm
[Accessed 16 Sep. 2017].
Link: www.livinginternet.com/i/iw_unix_gnulinux.htm
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely
silent on the individuals who played a role in its development. Find and summarise a
resource that describes ONE such individual. The individual should have had a
significant influence on the development of computers and/or components of modern
computing architecture.
Devlin’s Angle
Reference:Devlin, K. (2017). Contexts of Paradox. [online] Maa.org. Available at:
https://www.maa.org/external_archive/devlin/devlin_12_03.html [Accessed 16 Sep. 2017].
Link:www.maa.org/external_archive/devlin/devlin_12_03.html
Summary:
After three months on 28th December, it will be 101st anniversary of the birth of John von Neumann,
who was the American mathematician, Hungarian by birth place. He had achieved many
accomplishments in his whole life span among which, the most accomplished achievement was the
"von Neumann architecture" that states the origination of the basic principle of computer design. This
invention was also known as Von Neumann computers. It can be said that these are the ancestors of
laptop PCs and desktops of this modern age. Main feature of this computer was that the data and the
program both are stored together, generally in the slow-to-access storage media like hard disks and
were being transfer to be faster like RAM (Volatile storage medium) for processing or executing using
CPU (Central Process Unit). The processing of the recent computers is based on that same principle
but term "von Neumann architecture" is being rarely used nowadays, although this was the common
term for the profession in computing at early 1970s. It was a radical idea when Von Neumann in 1945
proposed this technical architecture. At that time machine’s essential part was the programs, and thus
different from the data ton which the machines were being operated. The common way during that time
in this operating system was to input the program data using plug-board or ay physical means and after
that feeding the data for the program o act upon.
Week 2
The text discusses the components and activities of operating systems however is
largely silent on the individuals who played a role in their development. Find and
summarise a resource that describes ONEsuch individual. The individual should have
had a significant influence on the writing or development of operating systems.
Title: Linux History
Reference: Stallman, R. (2017). History of Linux, Who Invented Linux, How Was Linux Invented.
[online] Livinginternet.com. Available at: https://www.livinginternet.com/i/iw_unix_gnulinux.htm
[Accessed 16 Sep. 2017].
Link: www.livinginternet.com/i/iw_unix_gnulinux.htm
Summary:
In 1991 Linus Torvalds was the one who invented Linux by himself. He was a student at the Finland,
University of Helsinki where he was using a non-free Unix-like system called Minix and after that he
started writing own kernel. His work was started with developing hard-drive access and device drivers
and in September 1991, he developed his basic design and named it Version 0.01. Afterwards
combining this with GNU system, the free operating system Kernel was developed and named Linux
and spread in the market. After almost two months on 1991, October 5th, he announced the launch of
next version (Version 0.02) by a posting sent to the comp.os.minix newsgroup. This was the same
Minix operated basic version but became popular and attracts considerable interests nevertheless.
Continuous improvement in this kernel led to the increase in popularity and increases number of
volunteers in the internet and thus after eliminating certain bugs on December 19 a new version was a
release that was Unix-like Linux system. As the time was passing new updates were being developed
by him and a new Linux Version was released on January 5, 1992, which was an improved and stable
kernel. That release was named Version 0.95 in order to reflect that it was being evolved and
developed towards becoming a full-featured system.
In 1991 Linus Torvalds was the one who invented Linux by himself. He was a student at the Finland,
University of Helsinki where he was using a non-free Unix-like system called Minix and after that he
started writing own kernel. His work was started with developing hard-drive access and device drivers
and in September 1991, he developed his basic design and named it Version 0.01. Afterwards
combining this with GNU system, the free operating system Kernel was developed and named Linux
and spread in the market. After almost two months on 1991, October 5th, he announced the launch of
next version (Version 0.02) by a posting sent to the comp.os.minix newsgroup. This was the same
Minix operated basic version but became popular and attracts considerable interests nevertheless.
Continuous improvement in this kernel led to the increase in popularity and increases number of
volunteers in the internet and thus after eliminating certain bugs on December 19 a new version was a
release that was Unix-like Linux system. As the time was passing new updates were being developed
by him and a new Linux Version was released on January 5, 1992, which was an improved and stable
kernel. That release was named Version 0.95 in order to reflect that it was being evolved and
developed towards becoming a full-featured system.
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development
of the modern Internet.
Title: The History of Ethernet
Reference: Bellis, M. (2017). Learn Why Robert Metcalfe Is the Father of Ethernet. [online]
ThoughtCo. Available at: https://www.thoughtco.com/history-of-ethernet-robert-metcalfe-4079022
[Accessed 18 Sep. 2017].
Link: https://www.thoughtco.com/history-of-ethernet-robert-metcalfe-4079022
Summary:
PARC (Palo Alto Research Centre) at Xerox Corporation was the place where
Ethernet was developed by a group led by Robert Metcalfe, which is an example of
networking technology that was developed and properly worked without the
government funding, which was a unique and rare achievement in the field of
networking technology of its own kind. Using Coaxial cable for the sharing the media
between two networks in an efficient way was demonstrated in this experiment.
Ethernet stations were able to detect the collisions that had occurred and were
successful in stopping the transmission immediately and make a retry attempt after a
short time randomly, whereas, Aloha system was not capable of providing these
services. Thus the approach of Ethernet raises the possibilities of efficiency and
accuracy of the Aloha technique and made it applicable for real use. The application
of shared-media LANs became the most dominant approach for the computer-to-
computer communication among local areas and building this attracted various
networking companies towards this invention and IBM (Token Rising) and others
captured the emerging market with this technology. At its Initial stage it uses centre’s
time-sharing as the gateway to the APARNET to make connection with the network
of about 100 personal Computers of PARC’s Alto. It was believed at the initial stage
that the limited and small size performance of Personal Computers would preclude
the use but, with the help of DARPA funding, group of David Clark built an efficient
TCP implementation for the system.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the
text. Find and summarise a resource that describes the features and uses of ONE
other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
Title: PPP (Point-to-Point Protocol)
Reference: Ruiz, V. (2017). PPP (Point-to-Point Protocol. [online] W3.ual.es. Available at:
https://w3.ual.es/~vruiz/Docencia/Apuntes/Networking/Protocols/Level-2/03-PPP/index.html
[Accessed 16 Sep. 2017].
Link: https://w3.ual.es/~vruiz/Docencia/Apuntes/Networking/Protocols/Level-2/03-PPP/index.html
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development
of the modern Internet.
Title: The History of Ethernet
Reference: Bellis, M. (2017). Learn Why Robert Metcalfe Is the Father of Ethernet. [online]
ThoughtCo. Available at: https://www.thoughtco.com/history-of-ethernet-robert-metcalfe-4079022
[Accessed 18 Sep. 2017].
Link: https://www.thoughtco.com/history-of-ethernet-robert-metcalfe-4079022
Summary:
PARC (Palo Alto Research Centre) at Xerox Corporation was the place where
Ethernet was developed by a group led by Robert Metcalfe, which is an example of
networking technology that was developed and properly worked without the
government funding, which was a unique and rare achievement in the field of
networking technology of its own kind. Using Coaxial cable for the sharing the media
between two networks in an efficient way was demonstrated in this experiment.
Ethernet stations were able to detect the collisions that had occurred and were
successful in stopping the transmission immediately and make a retry attempt after a
short time randomly, whereas, Aloha system was not capable of providing these
services. Thus the approach of Ethernet raises the possibilities of efficiency and
accuracy of the Aloha technique and made it applicable for real use. The application
of shared-media LANs became the most dominant approach for the computer-to-
computer communication among local areas and building this attracted various
networking companies towards this invention and IBM (Token Rising) and others
captured the emerging market with this technology. At its Initial stage it uses centre’s
time-sharing as the gateway to the APARNET to make connection with the network
of about 100 personal Computers of PARC’s Alto. It was believed at the initial stage
that the limited and small size performance of Personal Computers would preclude
the use but, with the help of DARPA funding, group of David Clark built an efficient
TCP implementation for the system.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the
text. Find and summarise a resource that describes the features and uses of ONE
other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
Title: PPP (Point-to-Point Protocol)
Reference: Ruiz, V. (2017). PPP (Point-to-Point Protocol. [online] W3.ual.es. Available at:
https://w3.ual.es/~vruiz/Docencia/Apuntes/Networking/Protocols/Level-2/03-PPP/index.html
[Accessed 16 Sep. 2017].
Link: https://w3.ual.es/~vruiz/Docencia/Apuntes/Networking/Protocols/Level-2/03-PPP/index.html
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Summary:
Point-to-Point protocol (PPP) is another example of Layer-two protocol that could help in establishing
a direct connection by the means of phone trunk lines, serial cables, trunk lines, specialized radio links,
fiber-optic links, or cellular telephones. Various advantages of using PPP can be encountered among
which most dominating feature is that it is not proprietary. This approach includes all the features that
are not available in HDLC that can be listed as: Firstly, the advanced system of link quality
management feature enables the users to monitor the link quality. PPP takes down those links in which
too many errors had been detected. Secondly, it supports both the CHAP and PAP authentication,
which was practiced and explained in later applications. PPP (Point-to-Point Protocol) can provide
multiprotocol LAN-to-WAN connections through handling the IPX, Apple Talk, and TCP/IP. Another
use can be stated as it has many applications in fiber-optic lines, satellite transmission, and twisted pair
in more efficient and better way. PPP is also helpful in providing transport over Frame Relay, ATM,
optical links, and ISDN. Modern networks, most dominating concern is related to the security of the
networks and PPP can be helpful in providing an authenticate connections that uses any of the PAP
(Password Authentication Protocol) or the more secured CHAP (Challenge Handshake Authentication
Protocol).
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title: On This Day: Robert Tappan Morris Becomes First Hacker
Prosecuted for Spreading Virus
Reference: Staff, f. (2017). On This Day: Robert Tappan Morris Becomes First Hacker Prosecuted for
Spreading Virus. [online] Findingdulcinea.com. Available at:
http://www.findingdulcinea.com/news/on-this-day/July-August-08/On-this-Day--Robert-Morris-
Becomes-First-Hacker-Prosecuted-For-Spreading-Virus.html [Accessed 18 Sep. 2017].
Link: http://www.findingdulcinea.com/news/on-this-day/July-August-08/On-this-Day--Robert-Morris-
Becomes-First-Hacker-Prosecuted-For-Spreading-Virus.html
Summary:
Robert Tappan Morris
Millions of dollars had been wasted; more than 6000 systems were damaged and
infected more than 6000 major Unix system that had been slowed down to the least
point and made them unusable, which was detected due to a computer virus during
November of 1988. The virus was created by Robert Tappan Morris and raises the
debate that whether the virus was the first of its kind. According to the public records
the virus was created by himself and spread on the internet and thus, he was convicted
under the Computer Fraud and Abuse Act, which made him criminal as well popular
too. After listening to Morris “'worm' virus wasn't intended to damage anything and
was instead released to gauge the size of the internet, my intention was not to cause
problem to anyone”. These statements were not much to save him from the
punishment, in any way he had developed the worm and caused damage irrespective
of the fact that it was intentionally or unintentionally. However after that he was
sentenced as a criminal and sentenced to three years probation, a hefty fine, and 4000
hours of community service. He was a great programmer and the coding was unique,
and was attracting various programmers to learn about that, which makes him and the
Point-to-Point protocol (PPP) is another example of Layer-two protocol that could help in establishing
a direct connection by the means of phone trunk lines, serial cables, trunk lines, specialized radio links,
fiber-optic links, or cellular telephones. Various advantages of using PPP can be encountered among
which most dominating feature is that it is not proprietary. This approach includes all the features that
are not available in HDLC that can be listed as: Firstly, the advanced system of link quality
management feature enables the users to monitor the link quality. PPP takes down those links in which
too many errors had been detected. Secondly, it supports both the CHAP and PAP authentication,
which was practiced and explained in later applications. PPP (Point-to-Point Protocol) can provide
multiprotocol LAN-to-WAN connections through handling the IPX, Apple Talk, and TCP/IP. Another
use can be stated as it has many applications in fiber-optic lines, satellite transmission, and twisted pair
in more efficient and better way. PPP is also helpful in providing transport over Frame Relay, ATM,
optical links, and ISDN. Modern networks, most dominating concern is related to the security of the
networks and PPP can be helpful in providing an authenticate connections that uses any of the PAP
(Password Authentication Protocol) or the more secured CHAP (Challenge Handshake Authentication
Protocol).
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title: On This Day: Robert Tappan Morris Becomes First Hacker
Prosecuted for Spreading Virus
Reference: Staff, f. (2017). On This Day: Robert Tappan Morris Becomes First Hacker Prosecuted for
Spreading Virus. [online] Findingdulcinea.com. Available at:
http://www.findingdulcinea.com/news/on-this-day/July-August-08/On-this-Day--Robert-Morris-
Becomes-First-Hacker-Prosecuted-For-Spreading-Virus.html [Accessed 18 Sep. 2017].
Link: http://www.findingdulcinea.com/news/on-this-day/July-August-08/On-this-Day--Robert-Morris-
Becomes-First-Hacker-Prosecuted-For-Spreading-Virus.html
Summary:
Robert Tappan Morris
Millions of dollars had been wasted; more than 6000 systems were damaged and
infected more than 6000 major Unix system that had been slowed down to the least
point and made them unusable, which was detected due to a computer virus during
November of 1988. The virus was created by Robert Tappan Morris and raises the
debate that whether the virus was the first of its kind. According to the public records
the virus was created by himself and spread on the internet and thus, he was convicted
under the Computer Fraud and Abuse Act, which made him criminal as well popular
too. After listening to Morris “'worm' virus wasn't intended to damage anything and
was instead released to gauge the size of the internet, my intention was not to cause
problem to anyone”. These statements were not much to save him from the
punishment, in any way he had developed the worm and caused damage irrespective
of the fact that it was intentionally or unintentionally. However after that he was
sentenced as a criminal and sentenced to three years probation, a hefty fine, and 4000
hours of community service. He was a great programmer and the coding was unique,
and was attracting various programmers to learn about that, which makes him and the
coding very popular and the created Worm remains have been kept at the Boston
Museum of Science for present.
Museum of Science for present.
Week 6
Society is increasingly reliant on networks and network technologies but they are
evolving at a rapid pace. Find and summarise a resource that describes ONE example
of a future networking technology or trend that will impact society.
Title: 5 Trends That Will Drive the Future of Technology
Reference: Satell, G. (2017). Forbes Welcome. [online] Forbes.com. Available at:
https://www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-future-of-technology/
#534f4f1b51ee [Accessed 16 Sep. 2017].
Link: www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-future-of-technology/
#534f4f1b51ee
Summary:
The Web of Things
With the rise of the innovations in technology it can be said that the Web of Things can be the most
pervasive trend in the future, where interaction with anything will becomes a computable entity.
Interacting with any object like the cars of the individual, homes of the individuals and everything else
will be interacting with the smartphone or any other mobile devices. The driving trend in future will be
two complementary technologies which can be listed as: firstly, NFC (Near Field Communication) that
will access the allowance for two-way data communication among the nearby ultra-low chips and
devices that are applicable in harvesting energy in the environment. This will help in putting
computable entities just everything about each place an individual think of. Web of Things is already in
the way but as it is evolving day by day might change the face of the world. Many of the applications
that are being used to make payment like IBM’s Smarter Planet will spread and be used by every
person and will take only few years to be spread world-wise. The face of marking will also be changed
or advanced by the access of digital technologies by using advertisement and other factors. Everything
will be automated and interaction with every object and work will be done by just digital selection.
Week 7
The text mentions social business and the impact of the use of social networking
platforms. Find and summarise a resource that describes the history of the
development of ONE such social media platform.
Title: 5 Social Media Monitoring Tools to Simplify Your Marketing
Reference: Peyton, L. (2017). 5 Social Media Monitoring Tools to Simplify Your Marketing. [online]
Socialmediaexaminer.com. Available at: http://www.socialmediaexaminer.com/5-social-media-
monitoring-tools-to-simplify-your-marketing/ [Accessed 16 Sep. 2017].
Link: http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-simplify-your-
marketing/
Summary:
Sprout Social is a Social Media Management tool that is changing the way of business around the
world. This could help an organization or business person to monitor their own company profiles,
feedback and ratings. This has the capability to support all the social media platforms including
Facebook, Youtube, Twitter and LinkedIn. Each platform monitoring is the ‘must’ objective in order
to take the benefits of these platforms in improving the personal business. It provides mobile
application (for Android and iPhone), which means an individual can access the monitoring details on
the go too. In order to make advertisement for the products or services that are being offered by the
Society is increasingly reliant on networks and network technologies but they are
evolving at a rapid pace. Find and summarise a resource that describes ONE example
of a future networking technology or trend that will impact society.
Title: 5 Trends That Will Drive the Future of Technology
Reference: Satell, G. (2017). Forbes Welcome. [online] Forbes.com. Available at:
https://www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-future-of-technology/
#534f4f1b51ee [Accessed 16 Sep. 2017].
Link: www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-future-of-technology/
#534f4f1b51ee
Summary:
The Web of Things
With the rise of the innovations in technology it can be said that the Web of Things can be the most
pervasive trend in the future, where interaction with anything will becomes a computable entity.
Interacting with any object like the cars of the individual, homes of the individuals and everything else
will be interacting with the smartphone or any other mobile devices. The driving trend in future will be
two complementary technologies which can be listed as: firstly, NFC (Near Field Communication) that
will access the allowance for two-way data communication among the nearby ultra-low chips and
devices that are applicable in harvesting energy in the environment. This will help in putting
computable entities just everything about each place an individual think of. Web of Things is already in
the way but as it is evolving day by day might change the face of the world. Many of the applications
that are being used to make payment like IBM’s Smarter Planet will spread and be used by every
person and will take only few years to be spread world-wise. The face of marking will also be changed
or advanced by the access of digital technologies by using advertisement and other factors. Everything
will be automated and interaction with every object and work will be done by just digital selection.
Week 7
The text mentions social business and the impact of the use of social networking
platforms. Find and summarise a resource that describes the history of the
development of ONE such social media platform.
Title: 5 Social Media Monitoring Tools to Simplify Your Marketing
Reference: Peyton, L. (2017). 5 Social Media Monitoring Tools to Simplify Your Marketing. [online]
Socialmediaexaminer.com. Available at: http://www.socialmediaexaminer.com/5-social-media-
monitoring-tools-to-simplify-your-marketing/ [Accessed 16 Sep. 2017].
Link: http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-simplify-your-
marketing/
Summary:
Sprout Social is a Social Media Management tool that is changing the way of business around the
world. This could help an organization or business person to monitor their own company profiles,
feedback and ratings. This has the capability to support all the social media platforms including
Facebook, Youtube, Twitter and LinkedIn. Each platform monitoring is the ‘must’ objective in order
to take the benefits of these platforms in improving the personal business. It provides mobile
application (for Android and iPhone), which means an individual can access the monitoring details on
the go too. In order to make advertisement for the products or services that are being offered by the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
organization, these are the biggest platforms to introduce the features of the products and services to a
very large crowd. Many of the organization have their own twitter and Facebook pages, where an
individual can interact with the organization directly and get responses too. Sprout Social offers a
feature called Web Alerts that can be used a s a monitor for the organization to compare and track the
improvement, achievement, and likely among the customers and take actions based on those results.
This is small part of Data Mining, which collects data from the blogs, pages, and posts made on the
social media websites and produce the summary in the form of percentage chart or pie.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the
textbook.
Title: Information Systems: A Manager's Guide to Harnessing
Technology, v. 1.1.1
Reference: Gallaugher, J. (2017). Information Systems: A Manager's Guide to Harnessing Technology
1.1.1 | FlatWorld. [online] FlatWorld. Available at:
https://catalog.flatworldknowledge.com/bookhub/1836?e=fwk-38086-ch11_s07 [Accessed 18 Sep.
2017].
Link: https://catalog.flatworldknowledge.com/bookhub/1836?e=fwk-38086-ch11_s07
Summary:
Wal-Mart can be demonstration on data mining can change the business processes in more easily and
profit way and show how to achieve world-class value chain efficiencies using data mining. It uses
demand forecasting in order to predict the number of cashiers needed at a particular time at the
particular store. It is sharing data with the suppliers in more efficient and effective manner using data
mining. Wal-Mart sells physical objects by the means of internet (e-commerce) and improving it by the
means of data mining to dig up data related to the customers. It is using data mining to predict the
behaviour of the customers and offers them the choices that the earlier consumer had preferred who
had same behaviour as at that instant. Wal-Mart is utilizing data mining to mature the business which
needs a dramatic cost saving and wide market to make better profits and continuously boost its stock
price in the share market. Data mining is helping the organization to be more efficient and effective in
attracting the customers and manipulating the decision making of the customers by offering the
products according to their needs and it is being estimated by the means of data mining. However, the
data assets of the Wal-Mart is not sufficient to track or predict the impactful industry trends, which
includes upscale and target discounters and many more.
very large crowd. Many of the organization have their own twitter and Facebook pages, where an
individual can interact with the organization directly and get responses too. Sprout Social offers a
feature called Web Alerts that can be used a s a monitor for the organization to compare and track the
improvement, achievement, and likely among the customers and take actions based on those results.
This is small part of Data Mining, which collects data from the blogs, pages, and posts made on the
social media websites and produce the summary in the form of percentage chart or pie.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the
textbook.
Title: Information Systems: A Manager's Guide to Harnessing
Technology, v. 1.1.1
Reference: Gallaugher, J. (2017). Information Systems: A Manager's Guide to Harnessing Technology
1.1.1 | FlatWorld. [online] FlatWorld. Available at:
https://catalog.flatworldknowledge.com/bookhub/1836?e=fwk-38086-ch11_s07 [Accessed 18 Sep.
2017].
Link: https://catalog.flatworldknowledge.com/bookhub/1836?e=fwk-38086-ch11_s07
Summary:
Wal-Mart can be demonstration on data mining can change the business processes in more easily and
profit way and show how to achieve world-class value chain efficiencies using data mining. It uses
demand forecasting in order to predict the number of cashiers needed at a particular time at the
particular store. It is sharing data with the suppliers in more efficient and effective manner using data
mining. Wal-Mart sells physical objects by the means of internet (e-commerce) and improving it by the
means of data mining to dig up data related to the customers. It is using data mining to predict the
behaviour of the customers and offers them the choices that the earlier consumer had preferred who
had same behaviour as at that instant. Wal-Mart is utilizing data mining to mature the business which
needs a dramatic cost saving and wide market to make better profits and continuously boost its stock
price in the share market. Data mining is helping the organization to be more efficient and effective in
attracting the customers and manipulating the decision making of the customers by offering the
products according to their needs and it is being estimated by the means of data mining. However, the
data assets of the Wal-Mart is not sufficient to track or predict the impactful industry trends, which
includes upscale and target discounters and many more.
1
Week 9
One of the greatest success stories in application development in recent times has
been the popularity of mobile apps. Find and summarise a resource that describes the
story of ONE successful mobile app developer.
Title: Robert Nay, Bubble Ball: A 14-Year-Old Built The No. 1
IPhone Game
Reference: Kooser, A. (2017). A 14-Year-Old Built The No. 1 iPhone Game. [online] Huffington Post
India. Available at: http://www.huffingtonpost.in/entry/robert-nay-bubble-ball-14-year-old-built-
iphone-app_n_910170 [Accessed 18 Sep. 2017].
Link: http://www.huffingtonpost.in/entry/robert-nay-bubble-ball-14-year-old-built-iphone-
app_n_910170
Summary:
Robert Nay
Bubble Ball named application was developed by only 14 years old boy whose name
is Robert Nay, which was an innovative and an assets for the mobile application
developer companies. This application was launched in December 2010 at Apple
iTunes platform, which was an interesting puzzle game with 72 levels and was
downloaded by more than 2 million users from that platform in only two weeks from
its release. The starting levels are easy and the user completes the stages, the
difficulty rises accordingly and become extremely challenging at higher levels. In
addition with the entertainment these ramps, planks, and tools can also be created by
using a variety set of catapults, geometric pieces, gravity inverters, and accelerators in
order to complete the level and take the ball to the finish line. This application was
awarded with the app of the week title by “Ansca Mobile’s Hall of Fame” in 2011
during an award function. In only three years after the release of the application, total
download reaches to a score of more than sixteen million and become a trending
application at the Apple’s App store, which made Robert Nay a great application
developer with an innovative idea. After that android also starts offering the
application at the Google’s Playstore for free and is now available on bothn the apple
store and the Google Playstore.
Week 10
While information systems and technology deliver many benefits to society, they can
also result in (sometimes inadvertent) negative effects and outcomes. Find and
summarise a resource that describes ONE example of where the use of an information
system or technology has led to negative consequences for humans.
Title: The Interview: film at center of shocking Sony data breach
scandal opens in LA
Reference: Laughland, O. (2017). The Interview: film at center of shocking Sony data breach scandal
opens in LA. [online] the Guardian. Available at: https://www.theguardian.com/film/2014/dec/12/the-
interview-sony-data-hack [Accessed 18 Sep. 2017].
Week 9
One of the greatest success stories in application development in recent times has
been the popularity of mobile apps. Find and summarise a resource that describes the
story of ONE successful mobile app developer.
Title: Robert Nay, Bubble Ball: A 14-Year-Old Built The No. 1
IPhone Game
Reference: Kooser, A. (2017). A 14-Year-Old Built The No. 1 iPhone Game. [online] Huffington Post
India. Available at: http://www.huffingtonpost.in/entry/robert-nay-bubble-ball-14-year-old-built-
iphone-app_n_910170 [Accessed 18 Sep. 2017].
Link: http://www.huffingtonpost.in/entry/robert-nay-bubble-ball-14-year-old-built-iphone-
app_n_910170
Summary:
Robert Nay
Bubble Ball named application was developed by only 14 years old boy whose name
is Robert Nay, which was an innovative and an assets for the mobile application
developer companies. This application was launched in December 2010 at Apple
iTunes platform, which was an interesting puzzle game with 72 levels and was
downloaded by more than 2 million users from that platform in only two weeks from
its release. The starting levels are easy and the user completes the stages, the
difficulty rises accordingly and become extremely challenging at higher levels. In
addition with the entertainment these ramps, planks, and tools can also be created by
using a variety set of catapults, geometric pieces, gravity inverters, and accelerators in
order to complete the level and take the ball to the finish line. This application was
awarded with the app of the week title by “Ansca Mobile’s Hall of Fame” in 2011
during an award function. In only three years after the release of the application, total
download reaches to a score of more than sixteen million and become a trending
application at the Apple’s App store, which made Robert Nay a great application
developer with an innovative idea. After that android also starts offering the
application at the Google’s Playstore for free and is now available on bothn the apple
store and the Google Playstore.
Week 10
While information systems and technology deliver many benefits to society, they can
also result in (sometimes inadvertent) negative effects and outcomes. Find and
summarise a resource that describes ONE example of where the use of an information
system or technology has led to negative consequences for humans.
Title: The Interview: film at center of shocking Sony data breach
scandal opens in LA
Reference: Laughland, O. (2017). The Interview: film at center of shocking Sony data breach scandal
opens in LA. [online] the Guardian. Available at: https://www.theguardian.com/film/2014/dec/12/the-
interview-sony-data-hack [Accessed 18 Sep. 2017].
Link: https://www.theguardian.com/film/2014/dec/12/the-interview-sony-data-hack
Summary:
The Exit Interview
Sony Pictures was all set to release its most controversial movie ‘The Interview’,
which was at controversies during the day they green-lit production in 2014. At early
times of motion picture entertainment the secrets or the top secrets that might affect
the reputation of the production company would have never exposed out from the
sound proof rooms and neither there was any trail named internet to follow them. But
today is the days of internet and not any secret hide in the sound proof rooms or in
dark and it became the example for the issues related with the information security
and technologies when Amy Pascal, the studio executive come office to find that the
computers of the Sony pictures had been hacked in the morning of 24th November.
The screens of the computers were hacked and were displaying texts written “We’ve
obtained all your internal data including your secrets and top secrets. If you don’t
obey us, we’ll release data shown below to the world.” It was not only a single
computer rather than that whole computers connected to the network were been
hacked and the data was comprised of five links that were holding many internal
records for the Sony Pictures. This shows if security is not given priority, it may cause
several and serious damage to the organization.
Summary:
The Exit Interview
Sony Pictures was all set to release its most controversial movie ‘The Interview’,
which was at controversies during the day they green-lit production in 2014. At early
times of motion picture entertainment the secrets or the top secrets that might affect
the reputation of the production company would have never exposed out from the
sound proof rooms and neither there was any trail named internet to follow them. But
today is the days of internet and not any secret hide in the sound proof rooms or in
dark and it became the example for the issues related with the information security
and technologies when Amy Pascal, the studio executive come office to find that the
computers of the Sony pictures had been hacked in the morning of 24th November.
The screens of the computers were hacked and were displaying texts written “We’ve
obtained all your internal data including your secrets and top secrets. If you don’t
obey us, we’ll release data shown below to the world.” It was not only a single
computer rather than that whole computers connected to the network were been
hacked and the data was comprised of five links that were holding many internal
records for the Sony Pictures. This shows if security is not given priority, it may cause
several and serious damage to the organization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the task;
summary fails to explain what the resource was about; the relevance and/or
usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot be
located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples rather
than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the task;
summary fails to explain what the resource was about; the relevance and/or
usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot be
located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples rather
than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.