Mining WhatsApp's Success: A Data Mining Perspective
VerifiedAdded on 2019/10/30
|8
|3373
|154
Case Study
AI Summary
Summary: The case study highlights the importance of data mining techniques in healthcare organizations. It emphasizes the need to maintain a high level of care for patients while analyzing costs, operational efficiency, and revenues. The primary objective is to identify the application of data mining techniques to analyze huge data clusters.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
1
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference:
David A. Patterson
Eecs (2017). David A. Patterson | EECS at UC Berkeley. [online]
Www2.eecs.berkeley.edu. Available at:
https://www2.eecs.berkeley.edu/Faculty/Homepages/patterson.html [Accessed 16
Sep. 2017].
Summary:
The resource is an online article that describes the work and contribution of David A.
Patterson, who has an immense contribution in the modern computing architecture.
Patterson graduated from UCLA in 1976 and is a professor of Computer Science at
the University of California. He has done a lot of research in the field of modern
computing architecture and has provided significant concepts such as, Reduced
Instruction Set Computers (RISC) and Redundant Array of Inexpensive Disks (RAID)
along with Network of Workstations (NOW). RISC belongs to the instruction sect
architectures which are one of the most important elements of the present day
computing architecture. RAID explains and includes the concept of virtualization
technology for the storage of data in an efficient and reliable manner. David has
received a total of 35 awards for his research and teaching works and has also co-
authored seven different books in the area of computer science. His concepts and
ideas have made it possible to make use of the modern computer architecture with
ease and have also enabled the researchers to find newer topics for further
development and advancement. The article provides a concise overview of the work
done by David in a clear manner.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Bill Gates
Bellis, M. (2017). Microsoft Founder Bill Gates: His Life, Contributions and
Philanthropy. [online] ThoughtCo. Available at: https://www.thoughtco.com/bill-gates-
biography-and-history-1991861 [Accessed 26 Sep. 2017].
Summary:
There are several operating systems that are being used by the users in the present
era. One of the most popular and widely used operating systems is the Windows
Operating System. The first version of windows was released in the year 1985 by
Microsoft and the man behind it was Bill Gates. There have been nine versions of
windows so far which have allowed user to make use of latest elements and
components. He is the co-founder of Microsoft which is the world’s largest software
company. He also worked as a chief solution architect in Microsoft and has a great
contribution in the development of Windows Operating System. He began his work in
the area of computers and software with BASIC interpreter for the development of a
floppy disc system. Microsoft then collaborated with IBM to carry out further research
in the area of software and computer systems. They came up with the first version of
2
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference:
David A. Patterson
Eecs (2017). David A. Patterson | EECS at UC Berkeley. [online]
Www2.eecs.berkeley.edu. Available at:
https://www2.eecs.berkeley.edu/Faculty/Homepages/patterson.html [Accessed 16
Sep. 2017].
Summary:
The resource is an online article that describes the work and contribution of David A.
Patterson, who has an immense contribution in the modern computing architecture.
Patterson graduated from UCLA in 1976 and is a professor of Computer Science at
the University of California. He has done a lot of research in the field of modern
computing architecture and has provided significant concepts such as, Reduced
Instruction Set Computers (RISC) and Redundant Array of Inexpensive Disks (RAID)
along with Network of Workstations (NOW). RISC belongs to the instruction sect
architectures which are one of the most important elements of the present day
computing architecture. RAID explains and includes the concept of virtualization
technology for the storage of data in an efficient and reliable manner. David has
received a total of 35 awards for his research and teaching works and has also co-
authored seven different books in the area of computer science. His concepts and
ideas have made it possible to make use of the modern computer architecture with
ease and have also enabled the researchers to find newer topics for further
development and advancement. The article provides a concise overview of the work
done by David in a clear manner.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Bill Gates
Bellis, M. (2017). Microsoft Founder Bill Gates: His Life, Contributions and
Philanthropy. [online] ThoughtCo. Available at: https://www.thoughtco.com/bill-gates-
biography-and-history-1991861 [Accessed 26 Sep. 2017].
Summary:
There are several operating systems that are being used by the users in the present
era. One of the most popular and widely used operating systems is the Windows
Operating System. The first version of windows was released in the year 1985 by
Microsoft and the man behind it was Bill Gates. There have been nine versions of
windows so far which have allowed user to make use of latest elements and
components. He is the co-founder of Microsoft which is the world’s largest software
company. He also worked as a chief solution architect in Microsoft and has a great
contribution in the development of Windows Operating System. He began his work in
the area of computers and software with BASIC interpreter for the development of a
floppy disc system. Microsoft then collaborated with IBM to carry out further research
in the area of software and computer systems. They came up with the first version of
2
windows on 20th November, 1985. Bill Gates made sure that the process of
development and evolution did not stop and gave the organization another 15 years
of his life as the CEO. The article describes the journey of Windows OS and the
contribution of Bill Gates in the process.
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference:
ARPANET
Livinginternet (2013). ARPANET, Internet. [online] Livinginternet.com. Available at:
https://www.livinginternet.com/i/ii_arpanet.htm [Accessed 16 Sep. 2017].
Summary:
Internet came into existence with an evolution of a lot many earlier networks. One of
such networks was Advanced Research Project Agency Network (ARPANET) which
included the idea of packet switching network and led to the development of Internet.
Information Processing Techniques Office (IPTO) along with Defense / Advanced
Research Project Agency (DARPA) came up with the idea of ARPANET. ARPANET
collaborated with BBN technologies to design the first set of routers. The network
was launched on 30th August 1969 with the release of Interface Message Processor
(IMP). ARPANET provided a base for the sharing and communication of the digital
resources irrespective of their geographical location. The researchers carried on their
work of research and development in the area of networking and came up with a
number of internet protocols in their research projects that were funded by ARPA.
The team came up with the protocols such as remote login protocol which was later
named as Telnet, File Transfer Protocol (FTP), Network Control Program (NCP) and
many more. The article describes complete detail of the ARPANET timeline with the
processes that were involved, researchers that participated and a lot of further
information that led to the development and launch of the Internet.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Address Resolution Protocol (ARP)
Mitchell, B. (2017). What Address Resolution Protocol (ARP) does for your computer
network. [online] Lifewire. Available at: https://www.lifewire.com/address-resolution-
protocol-817941 [Accessed 16 Sep. 2017].
Summary:
Address Resolution Protocol (ARP) is a layer-2 protocol that works on the basis of
modern Ethernet and the Wi-Fi connections. A physical address which is termed as
Media Access Control (MAC) address is associated with every network connection
and system. This address is a unique address for every machine and is used for the
delivery of the messages over the network. This MAC address is identified to initiate
the networking process and an IP to MAC mapping is retrieved from the ARP cache.
3
development and evolution did not stop and gave the organization another 15 years
of his life as the CEO. The article describes the journey of Windows OS and the
contribution of Bill Gates in the process.
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference:
ARPANET
Livinginternet (2013). ARPANET, Internet. [online] Livinginternet.com. Available at:
https://www.livinginternet.com/i/ii_arpanet.htm [Accessed 16 Sep. 2017].
Summary:
Internet came into existence with an evolution of a lot many earlier networks. One of
such networks was Advanced Research Project Agency Network (ARPANET) which
included the idea of packet switching network and led to the development of Internet.
Information Processing Techniques Office (IPTO) along with Defense / Advanced
Research Project Agency (DARPA) came up with the idea of ARPANET. ARPANET
collaborated with BBN technologies to design the first set of routers. The network
was launched on 30th August 1969 with the release of Interface Message Processor
(IMP). ARPANET provided a base for the sharing and communication of the digital
resources irrespective of their geographical location. The researchers carried on their
work of research and development in the area of networking and came up with a
number of internet protocols in their research projects that were funded by ARPA.
The team came up with the protocols such as remote login protocol which was later
named as Telnet, File Transfer Protocol (FTP), Network Control Program (NCP) and
many more. The article describes complete detail of the ARPANET timeline with the
processes that were involved, researchers that participated and a lot of further
information that led to the development and launch of the Internet.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Address Resolution Protocol (ARP)
Mitchell, B. (2017). What Address Resolution Protocol (ARP) does for your computer
network. [online] Lifewire. Available at: https://www.lifewire.com/address-resolution-
protocol-817941 [Accessed 16 Sep. 2017].
Summary:
Address Resolution Protocol (ARP) is a layer-2 protocol that works on the basis of
modern Ethernet and the Wi-Fi connections. A physical address which is termed as
Media Access Control (MAC) address is associated with every network connection
and system. This address is a unique address for every machine and is used for the
delivery of the messages over the network. This MAC address is identified to initiate
the networking process and an IP to MAC mapping is retrieved from the ARP cache.
3
In case a match is not found, an ARP request is sent to the local subnet and an ARP
reply is received. The ARP reply comprises of the permission to update the cache
and carry on with the delivery of the messages. Gratuitous ARP is also used by a
number of networks to make sure that the efficiency of the networks is enhanced.
This L2 protocol plays an important role in the functioning of the communication and
networking channels. There is also inverse ARP and reverse ARP protocols that
have been defined so networking processes. The article provides the details on ARP
methods, its functioning and flow along with the information on the associated L2
protocols as well.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Kevin Mitnick
Greenberg, A. (2014). Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now
Selling Zero-Day Exploits. [online] WIRED. Available at:
https://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/ [Accessed 26
Sep. 2017].
Summary:
Hacking is an activity that includes breaking into the security of the system or an
application through unauthorized mediums to capture the information sets and details
of the activities. There are various hackers that have made themselves famous by
executing such malicious tasks and Kevin Mitnick is one of such names. He is one of
the most famous and widely known hackers of the present times and has been given
the title of the most-wanted computer criminals by the United States Department of
Justice. There are various high-profile hack jobs that have been executed by Kevin
that have had some extremely severe and adverse impacts. He succeeded in the
hacking of the computer systems and applications of numerous technological and
telecommunication organizations such as Motorola, Nokia etc. He was arrested by
the FBI in the year 1995 and was sentenced with a five years imprisonment. He,
however, considered all of his activities as social engineering mechanisms instead of
the hacking services and jobs. He was released in 2000 and currently owns and runs
a computer consulting agency. The article lists out the details and hack jobs of ten
famous hackers and covers the details of their crimes in a brief manner.
4
reply is received. The ARP reply comprises of the permission to update the cache
and carry on with the delivery of the messages. Gratuitous ARP is also used by a
number of networks to make sure that the efficiency of the networks is enhanced.
This L2 protocol plays an important role in the functioning of the communication and
networking channels. There is also inverse ARP and reverse ARP protocols that
have been defined so networking processes. The article provides the details on ARP
methods, its functioning and flow along with the information on the associated L2
protocols as well.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Kevin Mitnick
Greenberg, A. (2014). Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now
Selling Zero-Day Exploits. [online] WIRED. Available at:
https://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/ [Accessed 26
Sep. 2017].
Summary:
Hacking is an activity that includes breaking into the security of the system or an
application through unauthorized mediums to capture the information sets and details
of the activities. There are various hackers that have made themselves famous by
executing such malicious tasks and Kevin Mitnick is one of such names. He is one of
the most famous and widely known hackers of the present times and has been given
the title of the most-wanted computer criminals by the United States Department of
Justice. There are various high-profile hack jobs that have been executed by Kevin
that have had some extremely severe and adverse impacts. He succeeded in the
hacking of the computer systems and applications of numerous technological and
telecommunication organizations such as Motorola, Nokia etc. He was arrested by
the FBI in the year 1995 and was sentenced with a five years imprisonment. He,
however, considered all of his activities as social engineering mechanisms instead of
the hacking services and jobs. He was released in 2000 and currently owns and runs
a computer consulting agency. The article lists out the details and hack jobs of ten
famous hackers and covers the details of their crimes in a brief manner.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference:
Wireless Data links for Drones
Aircrew (2016). Security and the Drone-of-Things - AirMap. [online] AirMap. Available
at: https://www.airmap.com/security-drone-of-things/ [Accessed 27 Sep. 2017].
Summary:
There is a lot of research and developmental work that is going on in the area of
network technologies. One of the popular research subjects is the wireless data links
for drones. Drones are the unmanned aerial vehicles that are being used by the
organizations for a variety of purposes. The latest use of drones is to provide the
high-speed wireless networking capabilities to the users so that it is possible for them
to remain under network connectivity while flying from one place to the other.
Currently, there is low or no bandwidth that is seen when using commercial airlines
from travelling purposes. It is being researched to develop high-speed and long
distance connections through drones. The research work is set to bring a revolution
in the aviation industry. It will also allow enhanced form of security and safety as the
tracking of the aircrafts will also become easier. An extensive work of research is
being done in this field and it is expected that the same will be released in a couple
of years from now. The networking technology will benefit the aviation industry as
well as the passengers. The article provides a brief account of the same and other
latest topics in the field of networking.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference:
History of Facebook
Phillips, S. (2007). A brief history of Facebook. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2007/jul/25/media.newmedia [Accessed 16
Sep. 2017].
Summary:
Social networking mediums have become an integral part of the present era. There
are various social media platforms that are present, such as, Facebook, Twitter, and
Instagram etc. Facebook is one of platforms that have millions of users from all
across the globe. Mark Zuckerberg founded Facebook in the year 2004 while he was
studying at the Harvard University. Within 24 hours of its launch, over 1,200 Harvard
students had signed up on the website which spread to more than half of the
undergraduate students in a span of one month. The address was purchased for
$200,000 in 2005. Up until 2005, the address was restricted to only the education
institutions. However, in 2006, it was made public and any user have a registered
email id could sign up for a Facebook account. Currently, Facebook is the world’s
largest social networking sites with over 2.1 billion users worldwide. It is used by the
users for connecting with their friends, family and professional contacts and share
information with each other. It also allows the users to upload their pictures and video
on their Facebook account. The article provides a brief history of the setting of the
5
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference:
Wireless Data links for Drones
Aircrew (2016). Security and the Drone-of-Things - AirMap. [online] AirMap. Available
at: https://www.airmap.com/security-drone-of-things/ [Accessed 27 Sep. 2017].
Summary:
There is a lot of research and developmental work that is going on in the area of
network technologies. One of the popular research subjects is the wireless data links
for drones. Drones are the unmanned aerial vehicles that are being used by the
organizations for a variety of purposes. The latest use of drones is to provide the
high-speed wireless networking capabilities to the users so that it is possible for them
to remain under network connectivity while flying from one place to the other.
Currently, there is low or no bandwidth that is seen when using commercial airlines
from travelling purposes. It is being researched to develop high-speed and long
distance connections through drones. The research work is set to bring a revolution
in the aviation industry. It will also allow enhanced form of security and safety as the
tracking of the aircrafts will also become easier. An extensive work of research is
being done in this field and it is expected that the same will be released in a couple
of years from now. The networking technology will benefit the aviation industry as
well as the passengers. The article provides a brief account of the same and other
latest topics in the field of networking.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference:
History of Facebook
Phillips, S. (2007). A brief history of Facebook. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2007/jul/25/media.newmedia [Accessed 16
Sep. 2017].
Summary:
Social networking mediums have become an integral part of the present era. There
are various social media platforms that are present, such as, Facebook, Twitter, and
Instagram etc. Facebook is one of platforms that have millions of users from all
across the globe. Mark Zuckerberg founded Facebook in the year 2004 while he was
studying at the Harvard University. Within 24 hours of its launch, over 1,200 Harvard
students had signed up on the website which spread to more than half of the
undergraduate students in a span of one month. The address was purchased for
$200,000 in 2005. Up until 2005, the address was restricted to only the education
institutions. However, in 2006, it was made public and any user have a registered
email id could sign up for a Facebook account. Currently, Facebook is the world’s
largest social networking sites with over 2.1 billion users worldwide. It is used by the
users for connecting with their friends, family and professional contacts and share
information with each other. It also allows the users to upload their pictures and video
on their Facebook account. The article provides a brief history of the setting of the
5
social media platform and its journey towards becoming the largest social networking
platform.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
Data Mining in Healthcare Organization
Silver M (2011). Case study: how to apply data mining techniques in a healthcare
data warehouse. - PubMed - NCBI. [online] Ncbi.nlm.nih.gov. Available at:
https://www.ncbi.nlm.nih.gov/pubmed/11452577 [Accessed 16 Sep. 2017].
Summary:
Business Intelligence technologies are being used at a large scale by the
organizations all across the globe. One of such technology is data mining which has
brought several benefits to its users. Healthcare industry has also benefitted a lot
with the use and application of data mining techniques in its architecture. Rush-
Presbyterian-St. Luke's Medical Center and Hitachi America, Ltd. (HAL), Inc came
together to apply the data mining techniques in their data warehouses. The primary
motive of the project was to maintain a high level of care for the patients in addition
with the analysis of the costs, operational efficiency and revenues of the business.
There was a lot of data and information that the business units were required to
manage and process before providing health services to the patients. The primary
objective of the process was to make sure that the application of the data mining
techniques to analyse the huge data clusters was identified. These techniques
allowed the healthcare organizations to make better use of its data sets and also
allowed better decision making processes. The resource is a case study of the
organization and initiatives it took for the application of the data mining techniques
and the benefits it earned as a result.
Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
Jan Koum – WhatsApp Co-founder
Hess, A. (2017). How WhatsApp founder Jan Koum went from welfare to billionaire.
[online] CNBC. Available at: https://www.cnbc.com/2017/04/24/how-whatsapp-
founder-jan-koum-went-from-welfare-to-billionaire.html [Accessed 16 Sep. 2017].
Summary:
WhatsApp is a mobile messaging application that has provided users from all across
the world to stay connected. It has millions of users spread across the world and the
application has been developed by the CEO and co-founder of WhatsApp, Jan
Koum. He is based out of Ukraine and learned programming skills that gave him a
job at Yahoo. However, he quit after a while and travelled the world to seek
inspiration from several elements. After the launch of Apple’s App Store in 2009, he
invested all of his time and effort in the development of WhatsApp. He made use of
Erlang language to develop the code for the application and also made use of
Extensible Messaging and Presence Protocol (XMPP). XMPP is an open standard
and Koum made use of the customized version of the same in the development of
6
platform.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
Data Mining in Healthcare Organization
Silver M (2011). Case study: how to apply data mining techniques in a healthcare
data warehouse. - PubMed - NCBI. [online] Ncbi.nlm.nih.gov. Available at:
https://www.ncbi.nlm.nih.gov/pubmed/11452577 [Accessed 16 Sep. 2017].
Summary:
Business Intelligence technologies are being used at a large scale by the
organizations all across the globe. One of such technology is data mining which has
brought several benefits to its users. Healthcare industry has also benefitted a lot
with the use and application of data mining techniques in its architecture. Rush-
Presbyterian-St. Luke's Medical Center and Hitachi America, Ltd. (HAL), Inc came
together to apply the data mining techniques in their data warehouses. The primary
motive of the project was to maintain a high level of care for the patients in addition
with the analysis of the costs, operational efficiency and revenues of the business.
There was a lot of data and information that the business units were required to
manage and process before providing health services to the patients. The primary
objective of the process was to make sure that the application of the data mining
techniques to analyse the huge data clusters was identified. These techniques
allowed the healthcare organizations to make better use of its data sets and also
allowed better decision making processes. The resource is a case study of the
organization and initiatives it took for the application of the data mining techniques
and the benefits it earned as a result.
Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
Jan Koum – WhatsApp Co-founder
Hess, A. (2017). How WhatsApp founder Jan Koum went from welfare to billionaire.
[online] CNBC. Available at: https://www.cnbc.com/2017/04/24/how-whatsapp-
founder-jan-koum-went-from-welfare-to-billionaire.html [Accessed 16 Sep. 2017].
Summary:
WhatsApp is a mobile messaging application that has provided users from all across
the world to stay connected. It has millions of users spread across the world and the
application has been developed by the CEO and co-founder of WhatsApp, Jan
Koum. He is based out of Ukraine and learned programming skills that gave him a
job at Yahoo. However, he quit after a while and travelled the world to seek
inspiration from several elements. After the launch of Apple’s App Store in 2009, he
invested all of his time and effort in the development of WhatsApp. He made use of
Erlang language to develop the code for the application and also made use of
Extensible Messaging and Presence Protocol (XMPP). XMPP is an open standard
and Koum made use of the customized version of the same in the development of
6
the mobile application. The application allows the users to chat with their contacts in
a private or group chat and also allows them to share pictures, videos, contacts and
documents. Jan sold WhatsApp to Facebook in 2014 and the deal amounted to a
whooping $19 billion. The article describes the work accomplished by Jan in the
development and deployment of WhatsApp for the users.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference:
Lack of language proficiency in humans
Ukessays (2016). The Negative Impacts Of Information Technology On Society.
[online] UKEssays. Available at: https://www.ukessays.com/essays/information-
technology/the-negative-impacts-of-information-technology.php [Accessed 16 Sep.
2017].
Summary:
Information Systems and technologies have allowed the users and business units to
gain a lot of benefits. There are, however, certain drawbacks that have also been
observed as implication of the technology on the humans. The individuals in the
present era rely on the tele-communication mediums, such as, WhatsApp and social
networking groups to connect with their personal and professional contacts. These
applications have the option of auto-correction which has led to the lack of language
proficiency in humans. They no longer pay attention to the spelling errors or
grammatical mistakes while communicating. There is also a lot of information that is
available on the web which is put up by unreliable resources. It leads to the
emergence of ambiguities and confusion for the humans to decide upon the correct
and incorrect. Human also hesitate in making in-person chats and communication
with the other individuals as they have become used to the virtual medium of
communication. All of these reasons have led to the emergence of slow learning for
humans and has also increased their dependency on any low to high complexity
activity. The article throws light on the set of negative consequences and impacts
that have been observed with the advancement of technology on the human race.
7
a private or group chat and also allows them to share pictures, videos, contacts and
documents. Jan sold WhatsApp to Facebook in 2014 and the deal amounted to a
whooping $19 billion. The article describes the work accomplished by Jan in the
development and deployment of WhatsApp for the users.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference:
Lack of language proficiency in humans
Ukessays (2016). The Negative Impacts Of Information Technology On Society.
[online] UKEssays. Available at: https://www.ukessays.com/essays/information-
technology/the-negative-impacts-of-information-technology.php [Accessed 16 Sep.
2017].
Summary:
Information Systems and technologies have allowed the users and business units to
gain a lot of benefits. There are, however, certain drawbacks that have also been
observed as implication of the technology on the humans. The individuals in the
present era rely on the tele-communication mediums, such as, WhatsApp and social
networking groups to connect with their personal and professional contacts. These
applications have the option of auto-correction which has led to the lack of language
proficiency in humans. They no longer pay attention to the spelling errors or
grammatical mistakes while communicating. There is also a lot of information that is
available on the web which is put up by unreliable resources. It leads to the
emergence of ambiguities and confusion for the humans to decide upon the correct
and incorrect. Human also hesitate in making in-person chats and communication
with the other individuals as they have become used to the virtual medium of
communication. All of these reasons have led to the emergence of slow learning for
humans and has also increased their dependency on any low to high complexity
activity. The article throws light on the set of negative consequences and impacts
that have been observed with the advancement of technology on the human race.
7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
8
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
8
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.