Information Systems and Negative Consequences
VerifiedAdded on  2020/03/28
|16
|3378
|53
AI Summary
This assignment requires students to critically examine the potential downsides of information systems. They must select and summarize a resource that provides a specific example of how an information system or technology has led to negative consequences for humans. The summary should clearly explain the resource's content and highlight its relevance to understanding the potential dangers associated with technological advancements.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1
ICT services management
Name
Course
Professor
School
City
Date
ICT services management
Name
Course
Professor
School
City
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
3
Tasks
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference: Computing architecture of complex design
Theconversation.com. Computing helps with the complex design of modern architecture. Accessed At:
https://theconversation.com/computing-helps-with-the-complex-design-of-modern-architecture-57657
Summary:
This resource is about the American computer scientist Ivan Sutherland who
has developed the sketchpad that has been regarded the computing graphics for the
users interface and this has changed on the course of the architecture in computing
technology. He has highlighted how the computing in the architecture is replacing the
technology and has also highlighted there are rebels in regards to the change of this
technology. The resource also explains how the architect thinks as well as draw the
design stages when it comes to the building of the construction.
I have selected the resource because it provide insights on how this individual
has led to the development and the contribution of the computing architecture. This is
a major contribution to this new developing field and the information is useful to how
the computing architecture is developed.
The key information which has been highlighted in this resource is Sketchpad
is one of the first computer graphical user interface which has been developed by use
of the computing design. It is a recorded tool which enable the designer to be able to
interact with the computer graphically. The resource shows how Ivan Sutherland
developed on this architecture.
The resource has been useful since it has provided insight in regards to the computing
architecture. I have gotten to learn new information in regards to the computer interface which have
been developed.
Tasks
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference: Computing architecture of complex design
Theconversation.com. Computing helps with the complex design of modern architecture. Accessed At:
https://theconversation.com/computing-helps-with-the-complex-design-of-modern-architecture-57657
Summary:
This resource is about the American computer scientist Ivan Sutherland who
has developed the sketchpad that has been regarded the computing graphics for the
users interface and this has changed on the course of the architecture in computing
technology. He has highlighted how the computing in the architecture is replacing the
technology and has also highlighted there are rebels in regards to the change of this
technology. The resource also explains how the architect thinks as well as draw the
design stages when it comes to the building of the construction.
I have selected the resource because it provide insights on how this individual
has led to the development and the contribution of the computing architecture. This is
a major contribution to this new developing field and the information is useful to how
the computing architecture is developed.
The key information which has been highlighted in this resource is Sketchpad
is one of the first computer graphical user interface which has been developed by use
of the computing design. It is a recorded tool which enable the designer to be able to
interact with the computer graphically. The resource shows how Ivan Sutherland
developed on this architecture.
The resource has been useful since it has provided insight in regards to the computing
architecture. I have gotten to learn new information in regards to the computer interface which have
been developed.
4
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference: FreeBSD
Operating-system.org. FreeBSD. Accessed At:
http://www.operating-system.org/betriebssystem/_english/bs-freebsd.htm
Summary:
This resource is about Jordan Hubbard who started the FreeBSD project that
he took the source code from the 386BHD. The FreeBSD has been developed by
more than two hundred developers that passed the modification to the source code to
the central team that in line are responsible for the next releases. This individual has
contributed greatly to the release of this operating system to the x86 computers in
1994 and has strength especially in the network area. FreeBSD has proved on itself in
the use everywhere where the large amount of data has been transferred. This
program made individuals to be able to customize on the installation for the planned
possible use.
I have selected the resource because it provide insight to the operating system
development. It shows how this individual contributed to the operating system
especially in its evolution stages.
The major point to which have been highlighted in this resource is on the features
which are associated in this operating system. It has been highlighted that this
operating system could be easily customized by individuals who install it.
The resource is useful since it highlights new concepts on the development of
the operating system since its evolution. This is well elaborated in the resource.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference: FreeBSD
Operating-system.org. FreeBSD. Accessed At:
http://www.operating-system.org/betriebssystem/_english/bs-freebsd.htm
Summary:
This resource is about Jordan Hubbard who started the FreeBSD project that
he took the source code from the 386BHD. The FreeBSD has been developed by
more than two hundred developers that passed the modification to the source code to
the central team that in line are responsible for the next releases. This individual has
contributed greatly to the release of this operating system to the x86 computers in
1994 and has strength especially in the network area. FreeBSD has proved on itself in
the use everywhere where the large amount of data has been transferred. This
program made individuals to be able to customize on the installation for the planned
possible use.
I have selected the resource because it provide insight to the operating system
development. It shows how this individual contributed to the operating system
especially in its evolution stages.
The major point to which have been highlighted in this resource is on the features
which are associated in this operating system. It has been highlighted that this
operating system could be easily customized by individuals who install it.
The resource is useful since it highlights new concepts on the development of
the operating system since its evolution. This is well elaborated in the resource.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
6
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference: History of internet.
Internetsociety.org. Brief history of the internet. Accessed At:
https://www.internetsociety.org/internet/history-internet/brief-history-internet/
Summary:
This resource is about how the internet came about. It describes on the
networks to which led to the evolution of the internet individuals enjoys today. It
highlights how the social interaction led to the ARPANET network being formed. In
this resource highlights how this network was used to be able to offer the internet.
This aspect of the internet has been examined in detail in this resource has this
network was formulated in the 1970.
I have selected this resource because it has provided information about how
the internet evolved. The network which contributed to its evolution is ARPANET.
The resource has provided the transition of the network as well as the advancement
over the years.
The key information which are discussed in the resource has been the
evolution of the internet from the development of the network of ARPANET. This
has been highlighted and discussed in depth about this network.
The resource has been selected because it offers insight on the development of
the internet from the network that existed over the years. In the research provided in
the research on can trace on the networks available at the time and the advancement
which happened until the development of the internet.
Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference: History of internet.
Internetsociety.org. Brief history of the internet. Accessed At:
https://www.internetsociety.org/internet/history-internet/brief-history-internet/
Summary:
This resource is about how the internet came about. It describes on the
networks to which led to the evolution of the internet individuals enjoys today. It
highlights how the social interaction led to the ARPANET network being formed. In
this resource highlights how this network was used to be able to offer the internet.
This aspect of the internet has been examined in detail in this resource has this
network was formulated in the 1970.
I have selected this resource because it has provided information about how
the internet evolved. The network which contributed to its evolution is ARPANET.
The resource has provided the transition of the network as well as the advancement
over the years.
The key information which are discussed in the resource has been the
evolution of the internet from the development of the network of ARPANET. This
has been highlighted and discussed in depth about this network.
The resource has been selected because it offers insight on the development of
the internet from the network that existed over the years. In the research provided in
the research on can trace on the networks available at the time and the advancement
which happened until the development of the internet.
7
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
biztechmagazine.com. Knowing your layer 2 and layer 3 protocols. Accessed At:
https://biztechmagazine.com/article/2013/10/knowing-your-layer-2-and-layer-3-protocols
Summary:
This resource is about the STP protocol which was designed before the virtual LANs, which is
the second major update to the STP that had changed on the spanning tree from one per network to one
per every VLAN. The key benefit to this protocol is that various VLANs are capable of utilizing
different links all across the network, which could allow the redundant links to be utilized fully to be
able to speed the traffic.
The resource has been selected as it offers insights on this protocol that is
much useful when it comes to supporting the aspect of the domain communication.
Moreover, the article offers benefit of the features of this protocol for example a more
suitable tactical communication as the other based protocol which are not related to
this technology.
The major key information in relation to this resource is on STP protocol
which has been designed before the VLANs. It highlights the next generation to this
protocol and what it is based on such as the dynamic intermediate system to the
intermediate system protocol for routing. Moreover, it highlights on how this protocol
has major complication when it comes to configuring than the use of the traditional
spanning tree.
The resource has been useful since I have been able to learn on the various
protocol rather than the Ethernet which is example of layer 2 data link protocol. This
resource has provided me with the insight that there is more data link protocols than
the Ethernet.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
biztechmagazine.com. Knowing your layer 2 and layer 3 protocols. Accessed At:
https://biztechmagazine.com/article/2013/10/knowing-your-layer-2-and-layer-3-protocols
Summary:
This resource is about the STP protocol which was designed before the virtual LANs, which is
the second major update to the STP that had changed on the spanning tree from one per network to one
per every VLAN. The key benefit to this protocol is that various VLANs are capable of utilizing
different links all across the network, which could allow the redundant links to be utilized fully to be
able to speed the traffic.
The resource has been selected as it offers insights on this protocol that is
much useful when it comes to supporting the aspect of the domain communication.
Moreover, the article offers benefit of the features of this protocol for example a more
suitable tactical communication as the other based protocol which are not related to
this technology.
The major key information in relation to this resource is on STP protocol
which has been designed before the VLANs. It highlights the next generation to this
protocol and what it is based on such as the dynamic intermediate system to the
intermediate system protocol for routing. Moreover, it highlights on how this protocol
has major complication when it comes to configuring than the use of the traditional
spanning tree.
The resource has been useful since I have been able to learn on the various
protocol rather than the Ethernet which is example of layer 2 data link protocol. This
resource has provided me with the insight that there is more data link protocols than
the Ethernet.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference: Germans Raid spy
nytimes.com. West Germans Raid Spy Ring That Violated U.S. Computers. Accessed At:
http://www.nytimes.com/1989/03/03/world/west-germans-raid-spy-ring-that-violated-us-
computers.html?mcubz=0
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference: Germans Raid spy
nytimes.com. West Germans Raid Spy Ring That Violated U.S. Computers. Accessed At:
http://www.nytimes.com/1989/03/03/world/west-germans-raid-spy-ring-that-violated-us-
computers.html?mcubz=0
9
Summary:
This resource is about Markus Hess who is the famous hacker and was
recruited on behalf of the KGB to spy on the Soviets back in the 80s. This individual
was tasked in breaking into the USA military computers so as to obtain the
information which was classified. This individual was able to use the German Datex-
P network through the satellite link. He was able to attack more than four hundred
USA military computers which included those of the military installation in both
Japan and the Germany along with the MIT in Cambridge.
I have selected the resource since it provides insights when it comes to the
aspect of the cyber security threats especially to the networked infrastructure. This
attacker was able to gain an access to the US military computers and obtain classified
information.
The key major points in regards to the resource which I have selected is on the
cyber security aspect where this famous hacker has been able to obtain information
through launching an attack to the computer system. The resource highlights on the
network and the tools used to gain access which was the Digital Hong Kong.
The resource has been helpful since I have been able to learn how the system
can be breached, and it has provide technics in regards to prevent breaches when
similar situations were to occur.
Summary:
This resource is about Markus Hess who is the famous hacker and was
recruited on behalf of the KGB to spy on the Soviets back in the 80s. This individual
was tasked in breaking into the USA military computers so as to obtain the
information which was classified. This individual was able to use the German Datex-
P network through the satellite link. He was able to attack more than four hundred
USA military computers which included those of the military installation in both
Japan and the Germany along with the MIT in Cambridge.
I have selected the resource since it provides insights when it comes to the
aspect of the cyber security threats especially to the networked infrastructure. This
attacker was able to gain an access to the US military computers and obtain classified
information.
The key major points in regards to the resource which I have selected is on the
cyber security aspect where this famous hacker has been able to obtain information
through launching an attack to the computer system. The resource highlights on the
network and the tools used to gain access which was the Digital Hong Kong.
The resource has been helpful since I have been able to learn how the system
can be breached, and it has provide technics in regards to prevent breaches when
similar situations were to occur.
10
Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference: Web of things.
Webofthings.org. What is the web of things? Accessed At: https://webofthings.org/2017/04/08/what-is-
the-web-of-things/
Summary:
This resource is about web of things which is a networking technology. The
article resource highlights that the internet of things is here to stay and it is likely
change the world for the better. In this technology it depicts to the world in which
individuals, physical objects are all connected to the single or perhaps common
network. It further highlights that if things are connected together there would be
exchange of the data with each other.
I have selected on this resource since it offers some insights on a new
technology in which would likely impact society. The web of things technology
would change on the way things are connected to the network. This is a new
phenomenon which would change on the way networking technology is connecting.
The key information in this resource is that web of things is a new way of
networking and this is likely to impact the society in the future. The resource also
highlights how the web of thing is a REST API which allows the interaction with the
real world.
The resource has been useful since have learnt on new technology on networking on how
interaction can be undertaken.
Week 7
Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference: Web of things.
Webofthings.org. What is the web of things? Accessed At: https://webofthings.org/2017/04/08/what-is-
the-web-of-things/
Summary:
This resource is about web of things which is a networking technology. The
article resource highlights that the internet of things is here to stay and it is likely
change the world for the better. In this technology it depicts to the world in which
individuals, physical objects are all connected to the single or perhaps common
network. It further highlights that if things are connected together there would be
exchange of the data with each other.
I have selected on this resource since it offers some insights on a new
technology in which would likely impact society. The web of things technology
would change on the way things are connected to the network. This is a new
phenomenon which would change on the way networking technology is connecting.
The key information in this resource is that web of things is a new way of
networking and this is likely to impact the society in the future. The resource also
highlights how the web of thing is a REST API which allows the interaction with the
real world.
The resource has been useful since have learnt on new technology on networking on how
interaction can be undertaken.
Week 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference: social networking evolution
historycooperative.org. The history of social media: Networking Evolution! Accessed
At:
http://historycooperative.org/the-history-of-social-media/
Summary:
This resource is about the birth of the social media, initially the social media
came to exist from the website which was regarded as the Six Degrees. This social
media was named this after the six degree of the separation theory. This site had
lasted from 1997 to 2001. This website allowed the users to be able to create the
profile and then be able to friend the other users. Moreover, this media website was
able to allow the register of the users in confirming the friendship and it connected
some few individuals.
I have selected this resource since it has provided one of the oldest social
media on how it came about and its development.
The key information which the resource has highlighted is how the social
media platform began, the growth they have encountered over the years. Additionally,
the resource also focused to the journey of the organization has undertaken towards
the growth.
The resource has been useful since it has offered insight to how six degree
began and how they created on the profiles of the users. This shows the evolution of
the social media platform.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Title and Reference: social networking evolution
historycooperative.org. The history of social media: Networking Evolution! Accessed
At:
http://historycooperative.org/the-history-of-social-media/
Summary:
This resource is about the birth of the social media, initially the social media
came to exist from the website which was regarded as the Six Degrees. This social
media was named this after the six degree of the separation theory. This site had
lasted from 1997 to 2001. This website allowed the users to be able to create the
profile and then be able to friend the other users. Moreover, this media website was
able to allow the register of the users in confirming the friendship and it connected
some few individuals.
I have selected this resource since it has provided one of the oldest social
media on how it came about and its development.
The key information which the resource has highlighted is how the social
media platform began, the growth they have encountered over the years. Additionally,
the resource also focused to the journey of the organization has undertaken towards
the growth.
The resource has been useful since it has offered insight to how six degree
began and how they created on the profiles of the users. This shows the evolution of
the social media platform.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
12
blog-geographica.com. How Data mining is used to generate the business Intelligence. Accessed At:
http://www.blog-geographica.com/2016/11/15/how-data-mining-is-used-to-generate-business-
intelligence/
Summary:
This resource is about the data mining is shaping on the way business is done.
The resource highlights that there have been sosphicated as well as complex storage
data. This has been due to the boom of the information technologies. The organization
has been able to deal with the new challenges by analysing, discovering as well as
understanding on the information which is beyond the system. This has been possible
through use of the data mining. This has been utilized through the use of the big data
techniques which is the computerized processes for the large data. This technique has
been used for the analysis of this data.
I have selected on this resource since it highlights situation when the data
mining technique is useful to enable the business to succeed. This has been significant
aspect for the business intelligence as the organization can depend on the data to
make informed decision.
The key information which are highlighted in this resource is on the data
mining which has been used to extract and analyse the data for the use of the business.
The resource has provided various technique which are used in extracting this data
and the way it can be utilized in the organization.
The resource has been useful because it has provided some insight when it
comes to the data mining technique for extracting the data. I have learnt the process of
extracting data and how useful such data can be for an organization.
blog-geographica.com. How Data mining is used to generate the business Intelligence. Accessed At:
http://www.blog-geographica.com/2016/11/15/how-data-mining-is-used-to-generate-business-
intelligence/
Summary:
This resource is about the data mining is shaping on the way business is done.
The resource highlights that there have been sosphicated as well as complex storage
data. This has been due to the boom of the information technologies. The organization
has been able to deal with the new challenges by analysing, discovering as well as
understanding on the information which is beyond the system. This has been possible
through use of the data mining. This has been utilized through the use of the big data
techniques which is the computerized processes for the large data. This technique has
been used for the analysis of this data.
I have selected on this resource since it highlights situation when the data
mining technique is useful to enable the business to succeed. This has been significant
aspect for the business intelligence as the organization can depend on the data to
make informed decision.
The key information which are highlighted in this resource is on the data
mining which has been used to extract and analyse the data for the use of the business.
The resource has provided various technique which are used in extracting this data
and the way it can be utilized in the organization.
The resource has been useful because it has provided some insight when it
comes to the data mining technique for extracting the data. I have learnt the process of
extracting data and how useful such data can be for an organization.
13
Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
bluecloudsolutions.com. How Tasnim Ahmed went from Jobless to making $100k with Apps.
Accessed At: https://www.bluecloudsolutions.com/blog/making-100k-with-apps/
Summary:
This is a resource about how Tasnim Ahmed gained huge amount of money from the
development of the mobile Apps. This individual created various apps such as the games like Smash
Santa. Additionally, in the year 2013 he was selling the source code of one of his application to the
Bluecloud Solutions which was regarded as the Avalanche Mountain and he gave it for reskinning.
I have selected this resource article since it provide an example of an
exceptional mobile developer who was jobless but he was able to turn this around and
make various mobile product and be able to gain a lot of revenue from these
application. The resource offers some insights on to the development of the mobile
application which could be used by different users.
The major key point focus of this resource has been on Tasnim Ahmed who
has contributed to the development of the mobile app. He has been successful and an
icon as a developer to enumerate. This resource highlights the reskinning of the apps
and the benefits they provide.
The resource has been very useful since it provide information and at the same
time a motivational one on the work of Tasnim Ahmed who has been able to succeed
from the development of the mobile app. He was jobless at the time and was able to
gain huge income from these apps.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
bluecloudsolutions.com. How Tasnim Ahmed went from Jobless to making $100k with Apps.
Accessed At: https://www.bluecloudsolutions.com/blog/making-100k-with-apps/
Summary:
This is a resource about how Tasnim Ahmed gained huge amount of money from the
development of the mobile Apps. This individual created various apps such as the games like Smash
Santa. Additionally, in the year 2013 he was selling the source code of one of his application to the
Bluecloud Solutions which was regarded as the Avalanche Mountain and he gave it for reskinning.
I have selected this resource article since it provide an example of an
exceptional mobile developer who was jobless but he was able to turn this around and
make various mobile product and be able to gain a lot of revenue from these
application. The resource offers some insights on to the development of the mobile
application which could be used by different users.
The major key point focus of this resource has been on Tasnim Ahmed who
has contributed to the development of the mobile app. He has been successful and an
icon as a developer to enumerate. This resource highlights the reskinning of the apps
and the benefits they provide.
The resource has been very useful since it provide information and at the same
time a motivational one on the work of Tasnim Ahmed who has been able to succeed
from the development of the mobile app. He was jobless at the time and was able to
gain huge income from these apps.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
14
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference: Electronic Health Record systems
perspectives.ahima.org. Impact of Electronic Health Record Systems on Information
Integrity: Quality and Safety Implications. Accessed At:
http://perspectives.ahima.org/impact-of-electronic-health-record-systems-on-
information-integrity-quality-and-safety-implications/
Summary:
This resource is about how the adoption of the electronic health record system
has brought many benefits but as well as unintended consequences to the human life
in the even they are not implemented. They could lead to jeopardize of the integrity of
the data which consequently lead to the errors which could endanger on the safety of
the patient as well as some legal implications.
I have selected this resource because it examines on the effects of the
unintended consequences of the use of the EHR system in regards to the quality of the
care as well as solutions to which to address on some of the errors which are brought
by the electronic health systems.
The major point which are discussed in the resource is on the consequences of
improper implementation of the electronic health systems. The resource has also
highlighted on the risks which are associated to this system and it has also provide on
some of the solutions to undertake in case there are errors.
The resource has been useful because it has offered some insights on how the information
technology may bring negative outcomes in case they are not implemented well.
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference: Electronic Health Record systems
perspectives.ahima.org. Impact of Electronic Health Record Systems on Information
Integrity: Quality and Safety Implications. Accessed At:
http://perspectives.ahima.org/impact-of-electronic-health-record-systems-on-
information-integrity-quality-and-safety-implications/
Summary:
This resource is about how the adoption of the electronic health record system
has brought many benefits but as well as unintended consequences to the human life
in the even they are not implemented. They could lead to jeopardize of the integrity of
the data which consequently lead to the errors which could endanger on the safety of
the patient as well as some legal implications.
I have selected this resource because it examines on the effects of the
unintended consequences of the use of the EHR system in regards to the quality of the
care as well as solutions to which to address on some of the errors which are brought
by the electronic health systems.
The major point which are discussed in the resource is on the consequences of
improper implementation of the electronic health systems. The resource has also
highlighted on the risks which are associated to this system and it has also provide on
some of the solutions to undertake in case there are errors.
The resource has been useful because it has offered some insights on how the information
technology may bring negative outcomes in case they are not implemented well.
15
16
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.