Impact of IT on Business: Advantages & Disadvantages
VerifiedAdded on 2020/04/07
|12
|3892
|30
AI Summary
This assignment requires students to critically analyze the disadvantages of information technology (IT) in a business context. Students are expected to research and discuss topics such as high implementation costs, potential job losses due to automation, and the vulnerability of data to security breaches. They must also demonstrate an understanding of how businesses can mitigate these risks and challenges.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference:
Title: Father of Artificial Intelligence
Reference: Childs, M. 2017. John McCarthy: Computer scientist known as the father of AI.
[online] The Independent. Available at: http://www.independent.co.uk/news/obituaries/john-
mccarthy-computer-scientist-known-as-the-father-of-ai-6255307.html [Accessed 27 Sep.
2017].
URL: http://www.independent.co.uk/news/obituaries/john-mccarthy-computer-scientist-known-
as-the-father-of-ai-6255307.html
Summary:
This article describes about John McCarthy and his invention. He was the inventor of
Artificial Intelligence and is known as the father of AI. The term AI was coined by
John McCarthy in the year 1995. I have chosen this article because it gives a
description about the significant role that John McCarthy had played in developing
AI.
In this article the author describes about John McCarthy’s childhood interests and
characteristics. He was an extremely bright child and he had learnt mathematics on
his own. He had attended a symposium that described and spoke about how
cerebral mechanisms affect the behavior of the human beings. This ignited the
interest of developing machines that had human like intelligence.
The most interesting fact about this article is that it explained how this computer
scientist invented artificial intelligence. Systems with inbuilt intelligence were
developed in the Stanford Lab. These systems could imitate human skills like
listening, vision, movement as well as reasoning. John McCarthy had even
presented the concept of ecommerce in the 1970s.
I found this article interesting because it gave me an idea about the concept of
Artificial Intelligence. This article inspired me as it showed how John McCarthy’s
effort in incorporating human intelligence inside machines. This article gave an
insight about the contributions of John McCarthy in the field of Artificial Intelligence
as well as modern computing.
Week 2
The text discusses the components and activities of operating systems however is largely
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference:
Title: Father of Artificial Intelligence
Reference: Childs, M. 2017. John McCarthy: Computer scientist known as the father of AI.
[online] The Independent. Available at: http://www.independent.co.uk/news/obituaries/john-
mccarthy-computer-scientist-known-as-the-father-of-ai-6255307.html [Accessed 27 Sep.
2017].
URL: http://www.independent.co.uk/news/obituaries/john-mccarthy-computer-scientist-known-
as-the-father-of-ai-6255307.html
Summary:
This article describes about John McCarthy and his invention. He was the inventor of
Artificial Intelligence and is known as the father of AI. The term AI was coined by
John McCarthy in the year 1995. I have chosen this article because it gives a
description about the significant role that John McCarthy had played in developing
AI.
In this article the author describes about John McCarthy’s childhood interests and
characteristics. He was an extremely bright child and he had learnt mathematics on
his own. He had attended a symposium that described and spoke about how
cerebral mechanisms affect the behavior of the human beings. This ignited the
interest of developing machines that had human like intelligence.
The most interesting fact about this article is that it explained how this computer
scientist invented artificial intelligence. Systems with inbuilt intelligence were
developed in the Stanford Lab. These systems could imitate human skills like
listening, vision, movement as well as reasoning. John McCarthy had even
presented the concept of ecommerce in the 1970s.
I found this article interesting because it gave me an idea about the concept of
Artificial Intelligence. This article inspired me as it showed how John McCarthy’s
effort in incorporating human intelligence inside machines. This article gave an
insight about the contributions of John McCarthy in the field of Artificial Intelligence
as well as modern computing.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONEsuch individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Title : Linux Operating System
Reference: Operating-system.org. (2017). History of the Linux Kernel. [online]
Available at: http://www.operating-system.org/betriebssystem/_english/bs-linux.htm
[Accessed 27 Sep. 2017].
URL: http://www.operating-system.org/betriebssystem/_english/bs-linux.htm
Summary:
This article describes about the Linus Torvalds who had developed the operating system
called Linux. He had intense knowledge about hardware programming. He was known for
developing own driver for the floppy controller. I have chosen this article because it has
described the significant role that Linus Torvalds had played in the development of Linux.
The author of this article describes how the derivative of UNIX called Minix was used by Linus
Torvalds. He had become extremely interested in the Minix operating system that was used in
various universities. According to Torvalds, the terminal emulator in Minix was not acceptable
and then he started to develop his own code for the terminal emulator by concentrating more
on the hardware level functions.
The most interesting fact about this article is that it gave an idea about how the Linux
operating system was developed. Torvalds had programmed own drivers for accessing the
data. These additional functions gave the software the ability to download files from the
Internet and upload files on the Internet. Torvalds was adding functionalities to the terminal
program that gave him the idea of enhancing this program to an operating system.
I found this article interesting because it gave an insight into the development of Linux.
Torvalds had developed Freax operating system in the year 1991 that was later renamed as
Linux. Torvalds is still known to be the main developer of Linux kernel since 1991.
resource that describes ONEsuch individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Title : Linux Operating System
Reference: Operating-system.org. (2017). History of the Linux Kernel. [online]
Available at: http://www.operating-system.org/betriebssystem/_english/bs-linux.htm
[Accessed 27 Sep. 2017].
URL: http://www.operating-system.org/betriebssystem/_english/bs-linux.htm
Summary:
This article describes about the Linus Torvalds who had developed the operating system
called Linux. He had intense knowledge about hardware programming. He was known for
developing own driver for the floppy controller. I have chosen this article because it has
described the significant role that Linus Torvalds had played in the development of Linux.
The author of this article describes how the derivative of UNIX called Minix was used by Linus
Torvalds. He had become extremely interested in the Minix operating system that was used in
various universities. According to Torvalds, the terminal emulator in Minix was not acceptable
and then he started to develop his own code for the terminal emulator by concentrating more
on the hardware level functions.
The most interesting fact about this article is that it gave an idea about how the Linux
operating system was developed. Torvalds had programmed own drivers for accessing the
data. These additional functions gave the software the ability to download files from the
Internet and upload files on the Internet. Torvalds was adding functionalities to the terminal
program that gave him the idea of enhancing this program to an operating system.
I found this article interesting because it gave an insight into the development of Linux.
Torvalds had developed Freax operating system in the year 1991 that was later renamed as
Linux. Torvalds is still known to be the main developer of Linux kernel since 1991.
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development of the
modern Internet.
Title and Reference:
Title: NSFNET – National Science Foundation Network.
Reference: Livinginternet.com. 2017. NSFNET, National Science Foundation
Network. [online] Available at: https://www.livinginternet.com/i/ii_nsfnet.htm
[Accessed 27 Sep. 2017].
URL: https://www.livinginternet.com/i/ii_nsfnet.htm
Summary:
This article describes about NSFNET that is considered to be the main driver of the
first period public growth of Internet. NSF had funded the development of CSNET in
the year 1979 in order to link the departments of computer science in the universities
that are not connected to ARPANET. I have chosen this article because it describes
NSFNET that played a major role in the development of modern Internet.
In this article the author describes that NSF had constructed supercomputing centers
in many regions for the purpose of providing high speed connection. In the year
1985, the growth of CSNET had become rapid. Initially NSFNET was used for linking
the computer centers in five universities.
The most interesting fact about this article is that it gave us an idea regarding the
critical decisions that led to the development of NSFNET. The decisions stated that
NSFNET would be used for general purpose and not be limited to the connectivity of
super computers. This would provide connectivity in the regional networks. The
decision even stated that NSFNET would use the TCP IP protocol of ARPANET.
I found this article interesting because it gave an insight into the development of
modern Internet via NSFNET. In the year 1994, the NSFNET traffic had become
more than 10 trillion bytes and it was dissolved in the year 1995. The research had
continued to develop vBNS which had formed the basis for Internet2 project.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Title: Token Ring
Reference: Lifewire. 2017. What Is Token Ring and How Does It Work?. [online]
Available at: https://www.lifewire.com/what-is-token-ring-817952 [Accessed 27 Sep.
2017].
URL: https://www.lifewire.com/what-is-token-ring-817952
Summary:
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development of the
modern Internet.
Title and Reference:
Title: NSFNET – National Science Foundation Network.
Reference: Livinginternet.com. 2017. NSFNET, National Science Foundation
Network. [online] Available at: https://www.livinginternet.com/i/ii_nsfnet.htm
[Accessed 27 Sep. 2017].
URL: https://www.livinginternet.com/i/ii_nsfnet.htm
Summary:
This article describes about NSFNET that is considered to be the main driver of the
first period public growth of Internet. NSF had funded the development of CSNET in
the year 1979 in order to link the departments of computer science in the universities
that are not connected to ARPANET. I have chosen this article because it describes
NSFNET that played a major role in the development of modern Internet.
In this article the author describes that NSF had constructed supercomputing centers
in many regions for the purpose of providing high speed connection. In the year
1985, the growth of CSNET had become rapid. Initially NSFNET was used for linking
the computer centers in five universities.
The most interesting fact about this article is that it gave us an idea regarding the
critical decisions that led to the development of NSFNET. The decisions stated that
NSFNET would be used for general purpose and not be limited to the connectivity of
super computers. This would provide connectivity in the regional networks. The
decision even stated that NSFNET would use the TCP IP protocol of ARPANET.
I found this article interesting because it gave an insight into the development of
modern Internet via NSFNET. In the year 1994, the NSFNET traffic had become
more than 10 trillion bytes and it was dissolved in the year 1995. The research had
continued to develop vBNS which had formed the basis for Internet2 project.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Title: Token Ring
Reference: Lifewire. 2017. What Is Token Ring and How Does It Work?. [online]
Available at: https://www.lifewire.com/what-is-token-ring-817952 [Accessed 27 Sep.
2017].
URL: https://www.lifewire.com/what-is-token-ring-817952
Summary:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
This article describes Token Ring which is used at the data link or second layer of
the OSI reference model. This technology is applicable for connecting devices in a
ring or star topology in LANs. I have chosen this article because it discusses about
Token Ring which is an alternative of Ethernet that is used in the data link layer.
The author of this article said that Token Ring initially supported 16 Mbps but later on
it was extended to 100 Mbps for competing with Ethernet. Token Ring cabling is
more expensive than the CAT 3/5e of Ethernet. The nodes in token ring can be given
priority. Tokens are used for the purpose of avoiding collisions. Ethernet networks
are prone to collisions and therefore it prefers to use switches.
The most interesting fact about this article is that it discussed about the working
mechanism of Token Rings. Token Ring is known for maintaining data frames that
are continuously circulating in the network. These data frames can be shared by all
the devices that are connected. A packet frame is passed to the next node on the
network.
I found this article interesting because it gave an insight into the working mechanism
of Token Ring. This article also described the difference between Token Ring and
Ethernet. Token Ring is an important protocol that is used in the data link year.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Title: Gary McKinnon
References: BBC News. 2017. Profile: Gary McKinnon. [online] Available at:
http://www.bbc.com/news/uk-19946902 [Accessed 27 Sep. 2017].
URL: http://www.bbc.com/news/uk-19946902
Summary:
This article describes about a famous hacker named Gary McKinnon. He was
arrested in the year 2002 for hacking into the military systems of US in order to find
information regarding UFOs. I have chosen this article because it discusses about
Gray McKinnon who is a famous hacker.
The author of this article describes Gary McKinnon’s involvement in hacking the
database of the US military. He had also been accused of hacking as well as forging
the database and computer systems of NASA. He had accessed valuable and critical
documents of the system. In his early life, after completing a computer course he
used to do contract works but later on he decided to use his skills of hacking for
doing a research on UFO.
The most interesting fact about this article is that it described how McKinnon had
accessed confidential documents that were present in the military database. He is
said to have caused around 800000 dollars damage to the computer systems
between the year 2001to 2002. He said that he did not have any malicious intention.
His main motive was to search for truth.
I found this article interesting because it gave an insight about the life of Gary
McKinnon. It said that he was suffering from Asperger’s syndrome which made him
the OSI reference model. This technology is applicable for connecting devices in a
ring or star topology in LANs. I have chosen this article because it discusses about
Token Ring which is an alternative of Ethernet that is used in the data link layer.
The author of this article said that Token Ring initially supported 16 Mbps but later on
it was extended to 100 Mbps for competing with Ethernet. Token Ring cabling is
more expensive than the CAT 3/5e of Ethernet. The nodes in token ring can be given
priority. Tokens are used for the purpose of avoiding collisions. Ethernet networks
are prone to collisions and therefore it prefers to use switches.
The most interesting fact about this article is that it discussed about the working
mechanism of Token Rings. Token Ring is known for maintaining data frames that
are continuously circulating in the network. These data frames can be shared by all
the devices that are connected. A packet frame is passed to the next node on the
network.
I found this article interesting because it gave an insight into the working mechanism
of Token Ring. This article also described the difference between Token Ring and
Ethernet. Token Ring is an important protocol that is used in the data link year.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Title: Gary McKinnon
References: BBC News. 2017. Profile: Gary McKinnon. [online] Available at:
http://www.bbc.com/news/uk-19946902 [Accessed 27 Sep. 2017].
URL: http://www.bbc.com/news/uk-19946902
Summary:
This article describes about a famous hacker named Gary McKinnon. He was
arrested in the year 2002 for hacking into the military systems of US in order to find
information regarding UFOs. I have chosen this article because it discusses about
Gray McKinnon who is a famous hacker.
The author of this article describes Gary McKinnon’s involvement in hacking the
database of the US military. He had also been accused of hacking as well as forging
the database and computer systems of NASA. He had accessed valuable and critical
documents of the system. In his early life, after completing a computer course he
used to do contract works but later on he decided to use his skills of hacking for
doing a research on UFO.
The most interesting fact about this article is that it described how McKinnon had
accessed confidential documents that were present in the military database. He is
said to have caused around 800000 dollars damage to the computer systems
between the year 2001to 2002. He said that he did not have any malicious intention.
His main motive was to search for truth.
I found this article interesting because it gave an insight about the life of Gary
McKinnon. It said that he was suffering from Asperger’s syndrome which made him
obsessed with these activities of hacking. He was accused of several hacking
incidents but he had denied of having any malicious intention.
incidents but he had denied of having any malicious intention.
Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference:
Title: Unmanned Aerial Vehicles
Reference: Gscomputel.com. 2017. Wireless datalinks for drones – G S Computel.
[online] Available at: http://www.gscomputel.com/wireless-datalinks-for-drones/
[Accessed 27 Sep. 2017].
URL: http://www.gscomputel.com/wireless-datalinks-for-drones/
Summary:
This article describes about drones or Unmanned Aerial Vehicles that will help to make
wireless networking extremely feasible. I have chosen this article because it described about
drones that will be used as a future technology and will have a strong impact on the society.
The author of this article described the use of wireless drone and its usefulness in the airline
industry. It said that we are unable to access the Internet while we are on flight. People feel
that they are lucky if they can get to check their emails. Bandwidth is limited when people are
on flight.
The most interesting fact about this article is that it said how wireless networking feasibility
can be changed by using UAVs. Researchers of the industry as well as the academic
researchers are finding ways for making long distance as well as wireless networking more
feasible. The main aim of the research is to streamline the process of communication
between manned aircrafts and UAVs.
I found this article interesting because it gave an insight into what UAVs could do in the
future. UAVs are those aircrafts that do not need any man to operate it. It is an automatic
aircraft technology that has the ability to fly on its own based on programs that are
incorporated in the system. UAVs will create a great impact on the airline industry.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference:
Title: History of Twitter
Reference: Lifewire. 2017. The History of Twitter You Didn't Know. [online] Available
at: https://www.lifewire.com/history-of-twitter-3288854 [Accessed 27 Sep. 2017].
URL: https://www.lifewire.com/history-of-twitter-3288854
Summary:
This article describes about the history of Twitter. It is considered to be among the
biggest social networking platforms in this generation. I have chosen this article
because it gives a clear overview of the development of Twitter and its social
business.
The author of this article described how a side project turned into a world famous
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference:
Title: Unmanned Aerial Vehicles
Reference: Gscomputel.com. 2017. Wireless datalinks for drones – G S Computel.
[online] Available at: http://www.gscomputel.com/wireless-datalinks-for-drones/
[Accessed 27 Sep. 2017].
URL: http://www.gscomputel.com/wireless-datalinks-for-drones/
Summary:
This article describes about drones or Unmanned Aerial Vehicles that will help to make
wireless networking extremely feasible. I have chosen this article because it described about
drones that will be used as a future technology and will have a strong impact on the society.
The author of this article described the use of wireless drone and its usefulness in the airline
industry. It said that we are unable to access the Internet while we are on flight. People feel
that they are lucky if they can get to check their emails. Bandwidth is limited when people are
on flight.
The most interesting fact about this article is that it said how wireless networking feasibility
can be changed by using UAVs. Researchers of the industry as well as the academic
researchers are finding ways for making long distance as well as wireless networking more
feasible. The main aim of the research is to streamline the process of communication
between manned aircrafts and UAVs.
I found this article interesting because it gave an insight into what UAVs could do in the
future. UAVs are those aircrafts that do not need any man to operate it. It is an automatic
aircraft technology that has the ability to fly on its own based on programs that are
incorporated in the system. UAVs will create a great impact on the airline industry.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference:
Title: History of Twitter
Reference: Lifewire. 2017. The History of Twitter You Didn't Know. [online] Available
at: https://www.lifewire.com/history-of-twitter-3288854 [Accessed 27 Sep. 2017].
URL: https://www.lifewire.com/history-of-twitter-3288854
Summary:
This article describes about the history of Twitter. It is considered to be among the
biggest social networking platforms in this generation. I have chosen this article
because it gives a clear overview of the development of Twitter and its social
business.
The author of this article described how a side project turned into a world famous
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
communication technology. The idea of Twitter had come into the mind of its co
founder, Jack Dorsey in the year 2006. Initially Twitter was imagined to be a platform
where communications could be done over SMS. Noah Glass, Evan Williams, Biz
Stone and Jack Dorsey played a significant role in developing Twitter.
The most interesting fact about this article is that it said how Twitter had developed.
Initially it was called “twttr”. The Twitter concept had gone through a tough time when
it was tested at the Odeo. The Twitter usage had increased in the year 2007 and on
an average 60000 tweets was being sent on a daily basis.
I found this article interesting because it gave an insight into the innovations that
were brought out by the users. The users were responsible for the creation of new
jargons and for using the service in a different way. They had started using RT while
sending messages for the followers to make them understand that this message was
a report. Twitter is one of the most famous social media platforms and it is
developing with time.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
Title: Netflix
Reference: Kissmetrics. 2017. ‘How Netflix Uses Analytics To Select Movies, Create
Content, & Make Multimillion Dollar Decisions’ [online] Available at:
https://blog.kissmetrics.com/how-netflix-uses-analytics/
[Accessed 27 Sep. 2017].
URL: https://blog.kissmetrics.com/how-netflix-uses-analytics/
Summary:
This article describes about Netflix and the use of data mining in its business. Netflix
is considered most popular media that is known for providing streaming media as
well as video on the demand. It also provides DVD by using mail. I have chosen this
article because Netflix is one example where its business has been able to use the
concept of data mining in a significant manner.
The author of this article described how Netflix has used analytics for the purpose of
selecting movies, creating contents and making decisions that are worth multimillion
dollar. Analytics has helped the company to understand the preferences of the
customers so that they can deliver satisfying products. Netflix has 1103.95 million
customers across the world. Data mining has helped the company to become
successful.
The most interesting fact about this article is that it discussed about special features
of Netflix that are absent in a traditional TV. Users can ask several questions like
how many users have watched a particular series and get an answer like 70 per
cent. If most of the users say that they have watched a TV show that has been
stopped then this data can be used for the purpose of restating the series once
again.
I found this article interesting because it gave an insight into the data mining
functions in Netflix. It said about all the events that are tracked by Netflix. The data
founder, Jack Dorsey in the year 2006. Initially Twitter was imagined to be a platform
where communications could be done over SMS. Noah Glass, Evan Williams, Biz
Stone and Jack Dorsey played a significant role in developing Twitter.
The most interesting fact about this article is that it said how Twitter had developed.
Initially it was called “twttr”. The Twitter concept had gone through a tough time when
it was tested at the Odeo. The Twitter usage had increased in the year 2007 and on
an average 60000 tweets was being sent on a daily basis.
I found this article interesting because it gave an insight into the innovations that
were brought out by the users. The users were responsible for the creation of new
jargons and for using the service in a different way. They had started using RT while
sending messages for the followers to make them understand that this message was
a report. Twitter is one of the most famous social media platforms and it is
developing with time.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
Title: Netflix
Reference: Kissmetrics. 2017. ‘How Netflix Uses Analytics To Select Movies, Create
Content, & Make Multimillion Dollar Decisions’ [online] Available at:
https://blog.kissmetrics.com/how-netflix-uses-analytics/
[Accessed 27 Sep. 2017].
URL: https://blog.kissmetrics.com/how-netflix-uses-analytics/
Summary:
This article describes about Netflix and the use of data mining in its business. Netflix
is considered most popular media that is known for providing streaming media as
well as video on the demand. It also provides DVD by using mail. I have chosen this
article because Netflix is one example where its business has been able to use the
concept of data mining in a significant manner.
The author of this article described how Netflix has used analytics for the purpose of
selecting movies, creating contents and making decisions that are worth multimillion
dollar. Analytics has helped the company to understand the preferences of the
customers so that they can deliver satisfying products. Netflix has 1103.95 million
customers across the world. Data mining has helped the company to become
successful.
The most interesting fact about this article is that it discussed about special features
of Netflix that are absent in a traditional TV. Users can ask several questions like
how many users have watched a particular series and get an answer like 70 per
cent. If most of the users say that they have watched a TV show that has been
stopped then this data can be used for the purpose of restating the series once
again.
I found this article interesting because it gave an insight into the data mining
functions in Netflix. It said about all the events that are tracked by Netflix. The data
mining method uses a well defined algorithm that helps to understand the user
behavior and gain success in business.
behavior and gain success in business.
Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
Title: Brian Acton: Co founder of WhatsApp
Reference: Successstory.com. 2017. Brian Acton Story - Bio, Facts, Networth,
Family, Auto, Home | Famous Founders | SuccessStory. [online] Available at:
https://successstory.com/people/brian-acton [Accessed 27 Sep. 2017].
URL: https://successstory.com/people/brian-acton
Summary:
This article describes about Brian Acton, the co founder of WhatsApp. I have chosen
this article because it gives a summary of the life and the success story of the co
founder of a mobile application called WhatsApp. WhatsApp is the most popular
messaging app in this modern generation of technology.
The author of this article describes how Brian Acton did not give up after getting
rejected by Facebook and kept on working hard and developed WhatsApp. Brian
Acton believes that life is an adventure and it is all about achieving success. Brian
Acton was a computer science graduate. His mother had motivated him to start a
business on his own.
The most interesting fact of this article is that it gave a clear overview of the life and
career of Brian Acton. He was the system administrator at Rockwell International.
Later on he had worked with Apple and Adobe systems as a test engineer. He had
also worked with Yahoo. In 2007 he decided to leave the job at Yahoo. In the year
2009, Koum and Acton tried to get a job in Facebook but they were let down.
I found this article interesting because it gave an insight into the confidence and
hard work of Brian Acton that led to his success. This article showed that Brian
Acton’s positive spirit led to the success of WhatsApp and in 2014, they had agreed
to sell it to Facebook for 19 billion dollars.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference:
Title: Disadvantages of IT
Reference: Smallbusiness.chron.com ,2017, ‘The Disadvantages of Information
Technology in Business’ [online] Available at:
http://smallbusiness.chron.com/disadvantages-information-technology-business-
4020.html
[Accessed 31 Aug. 2017].
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
Title: Brian Acton: Co founder of WhatsApp
Reference: Successstory.com. 2017. Brian Acton Story - Bio, Facts, Networth,
Family, Auto, Home | Famous Founders | SuccessStory. [online] Available at:
https://successstory.com/people/brian-acton [Accessed 27 Sep. 2017].
URL: https://successstory.com/people/brian-acton
Summary:
This article describes about Brian Acton, the co founder of WhatsApp. I have chosen
this article because it gives a summary of the life and the success story of the co
founder of a mobile application called WhatsApp. WhatsApp is the most popular
messaging app in this modern generation of technology.
The author of this article describes how Brian Acton did not give up after getting
rejected by Facebook and kept on working hard and developed WhatsApp. Brian
Acton believes that life is an adventure and it is all about achieving success. Brian
Acton was a computer science graduate. His mother had motivated him to start a
business on his own.
The most interesting fact of this article is that it gave a clear overview of the life and
career of Brian Acton. He was the system administrator at Rockwell International.
Later on he had worked with Apple and Adobe systems as a test engineer. He had
also worked with Yahoo. In 2007 he decided to leave the job at Yahoo. In the year
2009, Koum and Acton tried to get a job in Facebook but they were let down.
I found this article interesting because it gave an insight into the confidence and
hard work of Brian Acton that led to his success. This article showed that Brian
Acton’s positive spirit led to the success of WhatsApp and in 2014, they had agreed
to sell it to Facebook for 19 billion dollars.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference:
Title: Disadvantages of IT
Reference: Smallbusiness.chron.com ,2017, ‘The Disadvantages of Information
Technology in Business’ [online] Available at:
http://smallbusiness.chron.com/disadvantages-information-technology-business-
4020.html
[Accessed 31 Aug. 2017].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
URL: http://smallbusiness.chron.com/disadvantages-information-technology-
business-4020.html
Summary:
This article describes about the disadvantages and challenges of IT in businesses. IT
has several advantages but at the same time it can harm the society as well. I have
chosen this article because it talks about the negative consequences of technology
on the lives of the people.
The author of this article describes the various types of problems that a business can
face due to the implementation of information technology. It said that the investment
cost of information system is very high because there can be extra expenses like
cost of license. IT can be responsible for eliminating the jobs of the people as
technology will replace the manual works.
The most interesting fact about this article is that it talks about the security breaches
that can take place. Security threats are becoming a major concern across the world.
There can be loss of data due to the vulnerabilities that are present in the
technology. An individual can get an unauthorized access to the data and misuse it.
Strong security policies will protect the information system from any types of attacks.
I found this article interesting because it gave an insight into the negative impact of
information technology and made me well informed about the types of problem that
can be faced by a business by using information technology.
business-4020.html
Summary:
This article describes about the disadvantages and challenges of IT in businesses. IT
has several advantages but at the same time it can harm the society as well. I have
chosen this article because it talks about the negative consequences of technology
on the lives of the people.
The author of this article describes the various types of problems that a business can
face due to the implementation of information technology. It said that the investment
cost of information system is very high because there can be extra expenses like
cost of license. IT can be responsible for eliminating the jobs of the people as
technology will replace the manual works.
The most interesting fact about this article is that it talks about the security breaches
that can take place. Security threats are becoming a major concern across the world.
There can be loss of data due to the vulnerabilities that are present in the
technology. An individual can get an unauthorized access to the data and misuse it.
Strong security policies will protect the information system from any types of attacks.
I found this article interesting because it gave an insight into the negative impact of
information technology and made me well informed about the types of problem that
can be faced by a business by using information technology.
MARKING SHEET - DO NOT DELETE
Criteri
a
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deduc
tions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
Criteri
a
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deduc
tions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.