ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

ICT's Impact on Global Relationships

Verified

Added on  2020/05/16

|13
|4696
|75
AI Summary
This assignment examines the profound influence of Information and Communication Technology (ICT) on global economic, environmental, and social interactions. Students are tasked with analyzing how ICT fosters both positive and negative impacts across these domains, considering aspects such as online delivery, dematerialization, energy consumption, data protection, and global interconnectedness. The analysis should draw upon relevant resources and critically evaluate the multifaceted relationship between ICT and global transformation.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting
of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required. An example
of a completed task is below. Note the first response is good – so aim for something
like this. The second response is not acceptable, so if you submit anything like it, you
won’t pass the assignment! The reasons? Poor resource selection (Wikipedia), no
Harvard reference and a block cut and paste from the site (no citation, no original
content).
Example
Task Find two resources that explain aspects of IT Service Management.
(Good
Response
)
Title and Reference:
COBIT versus ITIL
Ibaraki, S 2014, online, COBIT versus ITIL, viewed 29/01/2015,
<http://blogs.technet.com/b/cdnitmanagers/archive/2014/04/06/cobit-
versus-itil.aspx>.
Summary:
This resource is a blog entry discussing the differences between CoBIT
and ITIL. I chose this resource as there is a lot of confusion about the
way in which ITSM is applied and the distinction between the CoBIT
and ITIL implementations is frequently unclear. Ibaraki explains that
CoBIT provides the governance and metric structures while ITIL
delivers on the actual mechanics and “how-to” processes. The author
makes an interesting observation that it is wrong to simplify COBIT as
providing the ‘why’ and ITIL providing the ‘how’ because both ITSM
mechanisms have considerable overlap and both need to be used at the
same time. I found this article very useful in explaining the differences
and similarities between these two aspects of ITSM.
(Bad
Response
)
Title and Reference:
http://en.wikipedia.org/wiki/IT_service_management
Summary:
This pages talks about ITSM. It says that IT service
management (ITSM) refers to the entirety of activities – directed
by policies, organized and structured in processes and
supporting procedures – that are performed by an organization or part
of an organization to plan, deliver, operate and control IT services
offered to customers. It is thus concerned with the implementation of
quality IT services that meet the needs of customers, and is performed
by the IT service provider through an appropriate mix of people,
process and information technology.
Document Page
Note: Each resource summary should be a maximum of 300 words.
Week 1
Task The past decade has witnessed tremendous advances in
computing, wired and wireless communication, and storage
technologies. Discuss the main features and applications of two
mass storage technologies namely: direct-attached storage and
network-attached storage.
Summary Title and Reference:
Olson, C. (2018). Getting started with storage.
Understanding SAN vs NAS vs DAS.. [online] Vanilla Video.
Available at: https://vanillavideo.com/blog/2014/started-storage-
understanding-san-nas-das [Accessed 30 Jan. 2018].
Summary:
DAS (Direct attached storage): It can be considered as a basic
form of storage which is externally hard drive connected by
means of USB cable. It is very much simple as it sounds to be.
However it can be stated that when we consider the concept of
storage the user tend to have a prospective of multiple drive
which work or act together in some way. The DAS concept can
be considered to be same regardless it is 24 drives or one drive
and usage of different cables are focused upon. Taking into
consideration a large DAS system the USB can be considered to
be very much slow. The DAS is not so much used in the concept
of hardware of lower level due to the factor that it is not market
friendly and intuitive. When large array of storage are to be
initiated then the acronym DAS are used. In this aspect to the
computer the storage device can be attached without using a
network infrastructure.
NAS (Network Attached Storage): A network attached Storage
is relatively simple. A computer regardless of the number of
storage or number of size relating to storage availability, can be
considered to a NAS only if it acts in a network as a file server.
In simple words the concept of network attached storage (NAS)
can be stated as a computer device which shares files over any
network. The main advantage of using NAS is that it is very
much economical in a way of providing a large storage to many
computer system at one time. It can also be used for better
utilization of computer resources. The main disadvantage which
is related to the concept is that it requires an IP address and
basically takes up a network space. It could be also related to
slower latency rate and potentially maximum issue related to data
transfer.
Week 2
Task Real-time operating systems are operating systems that guarantee
Document Page
a certain capability within a specified time constraint. Discuss the
main benefits of real-time operating systems for the health sector.
Summary Title and Reference:
Newelectronics.co.uk. (2018).
Real time operating system architectures are important for
medical designers. [online] Available at:
http://www.newelectronics.co.uk/electronics-technology/real-
time-operating-system-architecture-is-important-for-medical-
designers/35970/ [Accessed 30 Jan. 2018].
Summary:
The medical device manufacturer can understand the importance
of the operating system (O.S) and the contrary which is related to
the common practice related to the embedded design system. The
medical team selects the OS first before they choose the board.
The business needs which are related to the need of the OS
selection are much like those of other devices and requirement
like quality, cost, vendor history, track record of vendor and
ecosystem. The things which should be looked forward in a good
operating system are basically a quality management
environment and a good process related to manufacturing for
example ISO 9001. The aspect of claims related to safety which
may include data testing and the concept of verification of design
with attachment of proper certification such as IEC 61508 and
IEC 62304. The OS can be considered as a tool that can directly
provide concrete evidence related to behaviors and functionality
in a system. The prospective which should be covered in this
context is the system profiling, code coverage and the memory
analysis artifacts. The consumer grade devices which are medical
related failure implies inconvenience. Taking into consideration
the devices whose failure may result in serious consequences the
key OS characteristics that should be followed mainly include the
concept of dependencies of the machine, multicore support,
power management, platform dependencies. Since the
architecture of the OS can be have an effect which is profound on
the dependability of the system it should be the first concept that
should be put under scrutiny. The most common RTOS
architecture which can be taken into consideration are the
monolithic, executive and the microkernel. Taking into
consideration any system the availability of the system is very
much essential for example a heart monitor that loses the
connective can result in the failure of alarming which can result
in dire patient consequences.
Week 3
Task Mobile Cloud computing has gained a wide acceptance for
organisations as well as individuals by introducing computation,

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
storage and software based services. Explain the security and
privacy issues in relation to the use of the mobile Cloud
computing in the finance sector.
Summary Title and Reference:
Ijastems.org. (2018).
Cite a Website - Cite This For Me. [online] Available at:
http://www.ijastems.org/wp-content/uploads/2017/03/v3.si1_.39.
Cloud-Computing-Security-Issues-Challenges-and-its-Solutions-
in-Financial-Sectors.pdf [Accessed 30 Jan. 2018].
Summary:
The security aspect which is related to the cloud can be done in
two levels. One can be on the level of the provider and another
on the level of the user. The service provider of the cloud should
take into consideration that the server is very well secured. A
cloud service can be considered to be an appropriate technology
if security aspects are meet. In the financial sector if the data is
lost from the cloud it could lead to a big problem. The cloud
providers always ensure that the cloud gives the maximum
security to the user but uncertain conditions are faced majorly
which cannot be ignored. Such situation can include natural
disaster or fire. Due to this reason the user cannot access the data
when they need it. If the cloud provider due to some problem
related to financial problem or legal issue it can be a big problem
and it could lead to data losses which can sometimes be
permanent. The concept of data stealing can be also considered
as a problem where the hackers tend to retrieve the data of the
user and use them for their own benefit. Many of the cloud
providers in this context do not have their own server instead
they use the server of other providers due to the concept of cost
effectiveness and flexibility. In the end it can said that the main
issue which can be faced by the cloud providers relating to
financial sector could be data issue, infected applications, privacy
issue. The concept of cloud computing can be considered to be
point of debate in most of the cases. Regardless to the concept
there is a tremendous rise in the adaptation of the concept of
cloud computing in the financial sector.
Week 4
Task TCP/IP is consists of communication protocols used to transfer
packets between computer hosts within the network. In TCP/IP,
the transport layer is responsible for providing the application
layer with session and datagram communication services.
Discuss the common standards at the transport layer.
Document Page
Summary Title and Reference:
Ccnablog.com, 2016, online,
Transport layer | CCNA Blog.
<http://www.ccnablog.com/transport-layer/>.
Summary:
The transport layer is responsible for the control and the
segmentation of the different communication streams. On the
other hand it is also responsible for the assembly which is related
to the communication which is at the end of the receiver. In the
TCP/IP protocol suite there are basically two protocols which are
TCP (Transmission control protocol) and UDP (user datagram
protocol). Along with these protocol there are various other
protocol which control them.
The User Datagram Protocol (UDP) is basically used when the
communication stream does not depend fully on the connection
aspect. This basically means that one end of the connection can
be connected to the network and the other end might be
temporarily down. The concept of communication does not have
to be on stream for it to be working properly. This can be termed
as unreliable transport. Some of the applications which can be
included in this concept are the DNS (Domain Name system)
which mainly involve how the devices resolve the IP address to
names and the Voice over IP which basically facilitates making
of calls over the network and also achieve the concept of video
streaming. The UDP works at the port number 69.
Taking into consideration the transmission control protocol in
order to work properly the connection has to be established
successfully. This means that both the ends the senders and well
as the receiver should be online to work properly. The utilization
of the reliable transport is done in this protocol. Some of the
application which can be implemented using the concept of TCP
includes HTTP and HTTPS for the aspect of website, email using
POP and SMTP and file transfer concept using FTP. The TCP
works at the port number 80.
Week 5
Task The Internet of Things (IoT) is a system of interrelated computing
devices that are provided with unique identifiers and the ability to
transfer data over a network without requiring human-to-human
or human-to-computer interaction. Discuss the cyber security
challenges faced by the health sector in this IoT era.
Summary Title and Reference:
Enterprise Innovation | Asia's Premier Business and Technology
Publication. (2018).
Document Page
Cybersecurity implications of IoT in the healthcare industry.
[online] Available at:
https://www.enterpriseinnovation.net/article/cybersecurity-
implications-iot-healthcare-industry-451803924 [Accessed 31
Jan. 2018].
Summary:
The concept of the internet can revolutionize the technology
aspect of the world. This concept can also be applied to the
features which are related to the health care sector. The main
concern for the medical expert, hospital and the doctors are the
cyber security risks which are associated with the concept. The
growth which is related internet of things devices is very much
staggering. According to a recent survey it can be stated that by
the end of 2020 the internet of things market would be reaching a
mark of $117 billion which basically expands at a rate of 15
percent average per year. Asia can be considered to be one of the
leader in this field with the sector of health care being one of the
top 5 industries. One of the concern which can be involved in the
technology is the vulnerability which is relating to the devices.
Adding up with this concept is the patch of cycles which may be
extremely lone to never. Fortunately many technological means
are valuable to combat the risk factors. The Singapore national
university hospital has majorly undertaken trails in order to
access the viability which is related to the remote health care
sector. The main aim of the trail was to monitor the patients with
the help of smart devices at homes to be sure that interventions
can be provided if it is needed. This basically improves the aspect
of continuous monitoring of the patient at the same time reduce
the amount of visit needed at the hospital. In order to achieve the
safety in IoT devices few of the concepts which should be
incorporated are good communication, strong authentication,
secure protocol and segmentation of the network. Frequent
assessment of the vulnerability and the risks can help protect the
patient s and their network.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 6
Task Internet of Things (IoT) Cloud is a model designed to facilitate
the information society, enabling advanced services by
interconnecting physical and virtual things based on, existing and
evolving, interoperable information and communication
technologies through ennoblement of ubiquitous, convenient, on-
demand network access to a shared pool of configurable
computing resources. Explain the importance of real time data
capture capability, data visualisation, data analytics, and API
protocols in the application of IoT Cloud.
Summary Title and Reference:
SearchSalesforce. (2018).
What is IoT Cloud (Salesforce IoT Cloud)? - Definition from
WhatIs.com. [online] Available at:
<http://searchsalesforce.techtarget.com/definition/IoT-Cloud>
[Accessed 31 Jan. 2018].
Summary:
The concept of real time data capture can be considered to a vital
aspect when relating to the IoT cloud. This can be considered as a
data in the real time with real time data execution. The concept of
real time data collection basically enables the service providers
and the user relating to the data to achieve an efficient output
from the system. The data visualization can be considered to be
tangible element and noticeable aspect for the IoT cloud
platform. This basically makes it a trending technology for the
world which expands from the concept of grocery chain to car
elements. The concept of data analytics allows the sensor to
exchange signals which may include the information without any
obstacle involved in the process. The concept of API control and
other interfaces can be helpful in the process of management of
the data exchange and the commands by the sensors or the
gateways. The concept needs more than one API for the process
of real time data collection and simultaneously executing the
data. The IoT application platform by the DGLogik offers more
than just the concept of virtualization that can be used for any
sort of applications. These are basically the technology which are
boosting thenconecpt of different technology and these provide
the user with the effective and efficient output whch is the
primary requirement of the user.
Week 7
Task A Social Network Service (SNS) is a kind of web service for
establishing a virtual connection between people with similar
Document Page
interests, backgrounds, and activities. However, there are
different security and privacy threats that target every user of
social networking sites. Provide five solutions to deal with these
security threats.
Summary Title and Reference:
Hootsuite Social Media Management. (2018).
5 Social Media Security Risks and How to Avoid Them. [online]
Available at: https://blog.hootsuite.com/social-media-security-
for-business/ [Accessed 31 Jan. 2018].
Summary:
1. Create a social media policy: the process of social media
policy can be helpful to keep any brand safe while ensuring
employee participation. Taking into account the policy it can
be changing and each of the company can have their own
policy. The policy can be very much helpful for
organizations that operate on social media sites.
2. Media training: The training should be very important aspect
which basically deals with the security aspects. The threats
which are over the concept of the internet should be very
much important to be addressed for the proper working of the
organization. Training helps an employee to identify crises
situation and provides a basic framework which helps them
to face the problem.
3. Social media access limited: the right of the person who is
publishing the information over the internet should have a
basic idea of the information. The access should be restricted
so that everyone does have the access permission of putting a
content over the internet.
4. Putting someone in charge: in this context it can be stated
that too many cooks can spoil the broth. Similarly taking into
consideration the concept of social media one person should
lead the team so that there are no confusion in the near future.
If everybody is given the authority do everything it can be a
huger problem.
5. Secure technology: The technology which is used in this
context should be secured. The most important aspect in this
mainly involve the protection of the data. The password and
the user name of the authority should not be published so that
anyone can get access to the data and the content.
Week 8
Task Big data has been considered to be a breakthrough technological
development over recent years. Big data is based on large
volumes of extensively varied data that are generated, captured,
and processed at high velocity. Discuss the main challenges as
well as the social and economic values for organizations in
Document Page
adopting big data.
Summary Title and Reference:
Kumar, D. (2018).
Big Data: The 10 Big challenges that are hindering its adoption.
[online] TECHSEEN. Available at:
https://techseen.com/2016/04/27/big-data-the-10-big-challenges-
that-are-hindering-its-adoption/ [Accessed 31 Jan. 2018].
Summary:
The main challenges which are faced within the concept of
adaptation of big data is the infrastructure problem. This
challenges can be broken down into two major parts such as
storage and how the data is basically stored. The implementation
of the analytics relating to big data are deployed within the
organization can be considered to be very much organic. In many
of the situations the companies run in multiple nodes. Taking
into consideration the vendors they use the concept of powerful
parallel processing and increased memory to compensate with
the large volume of data which is generated. On the other hand
another process which can be Implemented is putting the big
chunk of data in memory by means of grid computing approach
where many machines can be used for the purpose of resolving
the problem. More than 80% of information which is generated
form the Social media, ERP data, social media, customer
transaction, video, images and email is unstructured. Due to this
factor it is very much difficult to handle and manage this type of
data. The concept of virtualization can also be considered to be
big problem in this scenario. Taking into consideration the role
of data analytics millions of row of data can be a big headache
for them. Legacy problem is another problem which is majorly
faced in the concept. These type of issue are mainly two folded
which are legacy architecture and legacy culture. It basically
involve the concept of learning and unlearning of the processes
related to the working with the data..
Week 9
Task There has been a growing interest in the application of agile and
lean practices for software development. Discuss the benefits of
agile and lean practices and their impacts on project constraints.
Summary Title and Reference:
Pmi.org. (2018).
Agile and lean project management : the right formality for your
project. [online] Available at:
https://www.pmi.org/learning/library/agile-lean-project-
management-formality-7992 [Accessed 31 Jan. 2018].
Summary:

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Lean: Lean can be considered as a management and
improvement philosophy that began in the concept of
manufacturing. The principles which are related to the concept
can be applied to any process. The focus point is on the concept
of reduction of the waste while creating an environment of better
workplace by means of “respect to humanity”. The
implementation of the reduction of waste can result in the
improvement in the production time, quality and cost. In the
process of project management there can be waste of various
types like excessive planning, excessive documentation and
control, avoidable reworks, unproductive multi-tasking process.
The concept of lean project management can eliminates these
types of waste.
Agile: The concept of Agile can be considered to be quick and
lightly. It was associated with the agile software development
process. The approach involves minimizing the risk by means of
performing iterations related to the project that delivers results
which are meaningful. Communication in this process is very
much quick, real time and informal and preferably done in a face
to face basis. The autonomy in this context is very much
significant relating to project participants.
Both the concept of agile and lean recognize the need which is
related to open mindedness that basically appreciates the
complex interplay relating to communication, self-managed team
and the commitment to success. There is a tendency by the
people to latch onto the good system as cure-alls. Combining the
best part of the approach which is multiple requires work against
process fundamentals and creativity. The approach in this context
is moderate and the analytical approach keep the process of
continuous improvement active. Both the processes impact on
the project can be vast and it can be implemented according to
the need of the project.
Week 10
Task The availability and implementation of information and
communication technologies (ICT) is increasingly vital to all
dimensions of a nation’s inclusive, equitable and sustainable
economic development and growth strategies. Discuss how ICT
is fundamentally changing the nature of economic,
environmental, and social relationships globally.
Summary Title and Reference:
Oecd.org. (2018).
Cite a Website - Cite This For Me. [online] Available at:
http://www.oecd.org/ict/4d/44005687.pdf [Accessed 31 Jan.
2018]
Summary:
Document Page
The relation which exist between the ICT and the environments
is very much multifaceted and complex. This is due to the factor
that the concept of the ICT can play a positive as well as negative
role. The positive impact in this concept can come from online
delivery, dematerialization, travel substitution and transport. The
negative concept come from material which are used and the
energy consumption and distribution of the equipment’s relating
to ICT. The impact which is put forward by the ICT on the
environment can be classified as indirect and direct. The direct
impact may include e waste and energy consumption and indirect
impact may include intelligent system of transport, smart grids
and building. The ICT also plays a vital role in the data
protection. The location of the storage of the data can also be
considered as a big factor. It is seen in most of the cases the data
of the user are not available for their access since they are located
in other servers which are not accessible by them. The data of the
user should be available for their access at any time when they
need to do so The economic impact by the ICT can be on the
sector of automotive electronics. It can be stated that it can also
have an impact on the sector of energy efficiency and the
resources relating to social relation which can be termed as
global. Nevertheless there have been many studies which state
that the difficulties in this approach in order to avoid effects of
rebound and realizing the potential benefits.
Document Page
MARKING SHEET - DO NOT DELETE
(Up to 3 marks per weekly task)
Criteria
0 No Response
<=1.0 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
of the resource has not been explained.
<=2.0 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
of the resource as been explained to some extent, but needs additional
information.
<=3.0 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance of the resource selection has been clearly explained.
Key
Deductions -1.0
-3.0
Resource not referenced correctly/not in Harvard format
Resource not referenced/Resource cannot be traced with details provided.
Week Marks Awarded Comments
1
2
3
4
5
6
7
8
9
10
TOTAL
1 out of 13
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]