Analyzing the Role of ICT in Economic Growth and Social Change
VerifiedAdded on 2020/05/16
|13
|4632
|78
AI Summary
The assignment focuses on different facets of Information Technology and Management, emphasizing practical insights into information systems, data analysis, AI, cybersecurity, project management, cloud computing, and communication technologies. Across ten weeks, students engage with specialized topics including data security practices, the evolution of AI and machine learning, and the implications of ICT for economic growth globally. Each weekly task encourages exploring scholarly resources, critically analyzing their relevance to IT concepts, and summarizing findings succinctly. The coursework is structured to build a comprehensive understanding by examining the dynamic interplay between technology and management principles.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There
is a table to complete for each task. Please fill in the information required. An
example of a completed task is below. Note the first response is good – so aim
for something like this. The second response is not acceptable, so if you submit
anything like it, you won’t pass the assignment! The reasons? Poor resource
selection (Wikipedia), no Harvard reference and a block cut and paste from the
site (no citation, no original content).
Week 1
Task The past decade has witnessed tremendous advances in computing,
wired and wireless communication, and storage technologies.
Discuss the main features and applications of two mass storage
technologies namely: direct-attachedstorageand network-
attached storage.
Summary Title and Reference:
NAS vs DAS: Which is Right For You?
Advantage Technology Solutions. 2015, online, NAS vs DAS: Which
is Right For You?, Viewed 22/01/2018,
<http://www.advantagetechnology.com.au/blog/nas-vs-das-which-is-
right-for-you>.
Summary:
Direct Attached Storage (DAS): It is a computer storage that has
been attached to a single server or computer through a cable without
using the network. The disks could be reside in the external cabinet
or inside server and in these both situations, the disks are always
connected directly to the storage controller of the server. However,
this blog explains that there is problem associated with the
application of this storage media as it can be supported to a limited
disk numbers. This blog suggested DAS as a best approach and well
suitable for the business environment as many files within the
business environment does not needs to be exchanged between the
multiple systems or applications. There are many advantageous
applications of the DAS as it can be a low cost implication for
addressing the storage needs. It can be much faster as compared to
the NAS because of cable connection and it does not even need IP
addresses to run.
Network Attached Storage (NAS): It has been represented as the
“file-level access storage architecture” that can be accessed from
anywhere via connecting it to the network. The main feature of NAS
is that it allows multiple systems to be connected and use the same
storage drive at the same time. It is a self-contained appliance that
has its own management interface, storage, and operating system
and it can be connected to the server in an easy manner through the
There are ten (10) tasks, one for each week: the tasks are detailed below. There
is a table to complete for each task. Please fill in the information required. An
example of a completed task is below. Note the first response is good – so aim
for something like this. The second response is not acceptable, so if you submit
anything like it, you won’t pass the assignment! The reasons? Poor resource
selection (Wikipedia), no Harvard reference and a block cut and paste from the
site (no citation, no original content).
Week 1
Task The past decade has witnessed tremendous advances in computing,
wired and wireless communication, and storage technologies.
Discuss the main features and applications of two mass storage
technologies namely: direct-attachedstorageand network-
attached storage.
Summary Title and Reference:
NAS vs DAS: Which is Right For You?
Advantage Technology Solutions. 2015, online, NAS vs DAS: Which
is Right For You?, Viewed 22/01/2018,
<http://www.advantagetechnology.com.au/blog/nas-vs-das-which-is-
right-for-you>.
Summary:
Direct Attached Storage (DAS): It is a computer storage that has
been attached to a single server or computer through a cable without
using the network. The disks could be reside in the external cabinet
or inside server and in these both situations, the disks are always
connected directly to the storage controller of the server. However,
this blog explains that there is problem associated with the
application of this storage media as it can be supported to a limited
disk numbers. This blog suggested DAS as a best approach and well
suitable for the business environment as many files within the
business environment does not needs to be exchanged between the
multiple systems or applications. There are many advantageous
applications of the DAS as it can be a low cost implication for
addressing the storage needs. It can be much faster as compared to
the NAS because of cable connection and it does not even need IP
addresses to run.
Network Attached Storage (NAS): It has been represented as the
“file-level access storage architecture” that can be accessed from
anywhere via connecting it to the network. The main feature of NAS
is that it allows multiple systems to be connected and use the same
storage drive at the same time. It is a self-contained appliance that
has its own management interface, storage, and operating system
and it can be connected to the server in an easy manner through the

existing Ethernet connection. This blog also explains the
advantageous application of the NAS, which states that non IT
persons can also use this storage media without having deep
knowledge, it does not lags because of server downtime. Active
directory is the most applicable objective of this storage media; it can
provide large storage to more than one computer, and many more.
Week 2
Task Real-time operating systems are operating systems that
guarantee a certain capability within a specified time
constraint.Discuss the main benefits of real-time operating
systems for the health sector.
Summary Title and Reference:
Real-Time Operating Systems Support Healthcare IoT
O'Dowd, E. 2017, online, Real-Time Operating Systems Support
Healthcare IoT, viewed 25/01/2018
<https://hitinfrastructure.com/news/real-time-operating-systems-
support-healthcare-iot>.
Summary:
Large benefits of the application of real-time operating system
(RTOS) and Internet of Things (IoT) has lead to the popularity of
these technologies within medical sectors. These technologies
are helpful in collecting and executing the real-time data and
process them for better and efficient output. The biggest
difference between the traditional operating systems and RTOS
is the consistency and reliability on the timing managed for the
completion of tasks and acceptance of the tasks through real
time data processing. These operating systems are being
implemented for controlling the devices within a dedicated
application for example medical imaging systems. These
operating systems allow the users to access the personal and
sensitive information within the defined response times that can
be adjusted in manner to fulfill the demands and needs of the
users. RTOSes can be a crucial aspect for the ICU wards as
every operation within this ward is critical and these operating
systems can be helpful in collecting the real time data and
execute the needed operation in an efficient manner. It can lay
vital role in the diagnostic part. Other advantage of this operating
system is that at the point of care it can provide real time
information to the patients and perform a much effective
diagnostic for them. O’Dowd explained how these operating
systems can be helpful in determining the “quantitative lab-
quality test results, which can be transferred automatically to an
information system.”
Real-time Data gathered with the help of these technologies can
also be beneficial in other aspects such as: decrease the costs,
improvement in the treatment’s outcome, enhancement in the
disease management system through real-time data execution.
This can also be helpful in reducing the errors, enhancement in
the patient experience, and enhancement in the drugs
advantageous application of the NAS, which states that non IT
persons can also use this storage media without having deep
knowledge, it does not lags because of server downtime. Active
directory is the most applicable objective of this storage media; it can
provide large storage to more than one computer, and many more.
Week 2
Task Real-time operating systems are operating systems that
guarantee a certain capability within a specified time
constraint.Discuss the main benefits of real-time operating
systems for the health sector.
Summary Title and Reference:
Real-Time Operating Systems Support Healthcare IoT
O'Dowd, E. 2017, online, Real-Time Operating Systems Support
Healthcare IoT, viewed 25/01/2018
<https://hitinfrastructure.com/news/real-time-operating-systems-
support-healthcare-iot>.
Summary:
Large benefits of the application of real-time operating system
(RTOS) and Internet of Things (IoT) has lead to the popularity of
these technologies within medical sectors. These technologies
are helpful in collecting and executing the real-time data and
process them for better and efficient output. The biggest
difference between the traditional operating systems and RTOS
is the consistency and reliability on the timing managed for the
completion of tasks and acceptance of the tasks through real
time data processing. These operating systems are being
implemented for controlling the devices within a dedicated
application for example medical imaging systems. These
operating systems allow the users to access the personal and
sensitive information within the defined response times that can
be adjusted in manner to fulfill the demands and needs of the
users. RTOSes can be a crucial aspect for the ICU wards as
every operation within this ward is critical and these operating
systems can be helpful in collecting the real time data and
execute the needed operation in an efficient manner. It can lay
vital role in the diagnostic part. Other advantage of this operating
system is that at the point of care it can provide real time
information to the patients and perform a much effective
diagnostic for them. O’Dowd explained how these operating
systems can be helpful in determining the “quantitative lab-
quality test results, which can be transferred automatically to an
information system.”
Real-time Data gathered with the help of these technologies can
also be beneficial in other aspects such as: decrease the costs,
improvement in the treatment’s outcome, enhancement in the
disease management system through real-time data execution.
This can also be helpful in reducing the errors, enhancement in
the patient experience, and enhancement in the drugs
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

management are some of the other beneficial factors of RTOS.
Week 3
Task Mobile Cloud computing has gained a wide acceptance for
organisations as well as individuals by introducing computation,
storage and software based services. Explain the security and
privacy issues in relation to the use of the mobile Cloud
computing in the finance sector.
Summary Title and Reference:
Security and privacy in mobile cloud computing
Suo, H., Liu, Z., Wan, J. and Zhou, K. 2013, online, Security and
privacy in mobile cloud computing, viewed at 25/01/2018,
<http://ieeexplore.ieee.org/document/6583635/>.
Summary:
According to Suo et al. (2018) explained the various advantages,
disadvantages and issues related to the mobile cloud computing
and highlighted the following parts:
Malware: Versatility and openness of the mobile terminal was a
point of attraction for the intruders and they could install malware
containing malicious codes and thus hamper the data or
information saved in the storage or unauthorized access to them.
These malwares can be installed in the device through the
network and thus could provide access to an unauthorized user
illegally that could lead to privacy and security of the individual.
Software Vulnerabilities: This includes the application software
and operating system and these vulnerabilities in both the
entities is capable of affecting the privacy and security of the
individuals sharing information through mobile cloud computing.
File transfer protocol is the common method of transferring the
file between the computer and the mobile phones and an
intruder with good knowledge of programming could easily get
access to the files being exchanged and could possibly expose,
manipulate and delete the data or information.
Others: Security awareness among the mobile users has been a
greater concern for the users and lack of such awareness could
possibly affect the privacy and security of the individuals.
Mobile Network Security: Due to the higher concentration of the
information stored and exchanged using the mobile network, it
has attracted the intruders and thus vulnerable to intrusion and
breaches. However, Certain companies have developed anti
software and anti-malware that can be applicable on the mobile
phones and still struggling to make the network immune from
intrusions.
Platform Reliability: Mobile Cloud platform has been not much
reliable due to the unauthorized access and currently incidents
occurring in the real world. Many incidents have proven that data
Week 3
Task Mobile Cloud computing has gained a wide acceptance for
organisations as well as individuals by introducing computation,
storage and software based services. Explain the security and
privacy issues in relation to the use of the mobile Cloud
computing in the finance sector.
Summary Title and Reference:
Security and privacy in mobile cloud computing
Suo, H., Liu, Z., Wan, J. and Zhou, K. 2013, online, Security and
privacy in mobile cloud computing, viewed at 25/01/2018,
<http://ieeexplore.ieee.org/document/6583635/>.
Summary:
According to Suo et al. (2018) explained the various advantages,
disadvantages and issues related to the mobile cloud computing
and highlighted the following parts:
Malware: Versatility and openness of the mobile terminal was a
point of attraction for the intruders and they could install malware
containing malicious codes and thus hamper the data or
information saved in the storage or unauthorized access to them.
These malwares can be installed in the device through the
network and thus could provide access to an unauthorized user
illegally that could lead to privacy and security of the individual.
Software Vulnerabilities: This includes the application software
and operating system and these vulnerabilities in both the
entities is capable of affecting the privacy and security of the
individuals sharing information through mobile cloud computing.
File transfer protocol is the common method of transferring the
file between the computer and the mobile phones and an
intruder with good knowledge of programming could easily get
access to the files being exchanged and could possibly expose,
manipulate and delete the data or information.
Others: Security awareness among the mobile users has been a
greater concern for the users and lack of such awareness could
possibly affect the privacy and security of the individuals.
Mobile Network Security: Due to the higher concentration of the
information stored and exchanged using the mobile network, it
has attracted the intruders and thus vulnerable to intrusion and
breaches. However, Certain companies have developed anti
software and anti-malware that can be applicable on the mobile
phones and still struggling to make the network immune from
intrusions.
Platform Reliability: Mobile Cloud platform has been not much
reliable due to the unauthorized access and currently incidents
occurring in the real world. Many incidents have proven that data
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

or information are not much safe on these networks and thus it is
not much reliable for the users.
Week 4
Task TCP/IPis consists of communication protocols used to transfer
packets between computer hosts within the network. In TCP/IP,
the transport layer is responsible for providing the application
layer with session and datagram communication services.
Discuss the common standards at the transport layer.
Summary Title and Reference:
Transport Layer Protocol
Cc.ntut.edu.tw. 2018, online, Transport Layer Protocols, viewed
25/01/2018,
<http://www.cc.ntut.edu.tw/~kwke/cn/tlp.pdf>.
Summary:
TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) are the two common standards for the transport layer
that are being helpful in the data communication between the
networks and the users. However, TCP is much reliable than the
UDP that makes is much accessible for the users in manner to
transfer the file in much safer way. TCP is capable of providing
the extensive flow control and error control in manner to make
sure that the data is successfully delivered to the users and
easily accessible to them. It is often denoted as the connection-
oriented protocol. Despite of being less reliable, UDP does not
provide error checking features for the UDP and has been
designed in manner to be applicable in the situations “when
extensive control features are not necessary.” It can also be
denoted as connectionless protocol. TCP is heavy-weight and it
does require three packets for the set up of a socket connection
before the exchange of the files between the users. TCP is
capable of handling the congestion and reliability control. TCP
handles the streaming of data through reading as a byte stream
without distinguishing indications and transmitting to the signal
message (segment) boundaries. The UDP streams data through
sending the packets individually and checking the integrity only
after the arrival of the file or packets containing data. The
packets in the UDP have definite boundaries those have been
honoured upon receipt and the meaning a read operation “at the
receiver socket will yield an entire message as it was originally
sent.”
UDP is light-weight and there is neither any ordering of the
message nor any tracking connections. It has been a small
transport layer designed on the type of IP. It does not also
provide the option for the flow control.
not much reliable for the users.
Week 4
Task TCP/IPis consists of communication protocols used to transfer
packets between computer hosts within the network. In TCP/IP,
the transport layer is responsible for providing the application
layer with session and datagram communication services.
Discuss the common standards at the transport layer.
Summary Title and Reference:
Transport Layer Protocol
Cc.ntut.edu.tw. 2018, online, Transport Layer Protocols, viewed
25/01/2018,
<http://www.cc.ntut.edu.tw/~kwke/cn/tlp.pdf>.
Summary:
TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) are the two common standards for the transport layer
that are being helpful in the data communication between the
networks and the users. However, TCP is much reliable than the
UDP that makes is much accessible for the users in manner to
transfer the file in much safer way. TCP is capable of providing
the extensive flow control and error control in manner to make
sure that the data is successfully delivered to the users and
easily accessible to them. It is often denoted as the connection-
oriented protocol. Despite of being less reliable, UDP does not
provide error checking features for the UDP and has been
designed in manner to be applicable in the situations “when
extensive control features are not necessary.” It can also be
denoted as connectionless protocol. TCP is heavy-weight and it
does require three packets for the set up of a socket connection
before the exchange of the files between the users. TCP is
capable of handling the congestion and reliability control. TCP
handles the streaming of data through reading as a byte stream
without distinguishing indications and transmitting to the signal
message (segment) boundaries. The UDP streams data through
sending the packets individually and checking the integrity only
after the arrival of the file or packets containing data. The
packets in the UDP have definite boundaries those have been
honoured upon receipt and the meaning a read operation “at the
receiver socket will yield an entire message as it was originally
sent.”
UDP is light-weight and there is neither any ordering of the
message nor any tracking connections. It has been a small
transport layer designed on the type of IP. It does not also
provide the option for the flow control.

Week 5
Task The Internet of Things (IoT) is a system of interrelated
computing devices that are provided with unique identifiers and
the ability to transfer data over a network without requiring
human-to-human or human-to-computer interaction. Discuss the
cyber security challenges faced by the health sector in this IoT
era.
Summary Title and Reference:
Five challenges of IoT in healthcare that put it at risk of failure
Chouffani, R. 2018, online, Five challenges of IoT in healthcare
that put it at risk of failure, viewed 26/01/2018
<http://searchhealthit.techtarget.com/tip/Five-challenges-of-IoT-
in-healthcare-that-put-it-at-risk-of-failure>.
Summary:
Chouffani (2018) explained about the challenges current
healthcare industries are facing due to the implementation of IoT
that can be listed as:
Lack of EHR System Integration: The data collected about the
patient’s condition including the glucose level, vital signs,
physical activity and others and this information do not travel to
the HER system. This information is generally not available to
the service providers or made easily available to them as it has
not been centralized.
Interoperability: These changes keep the IoT data in different
silos and patients are more likely to “collect different sets of
data” while using more than one medical devices that depends
on the purpose of the device. Because of the lack of options for
the adequate interoperability, data collected using the IoT
devices might remain locked for the individual system and thus
this lead to the loss of potential value to the care team of the
patient.
IoT data is meaningless if it is not within the full health record:
Most of the providers are supporting the collection meaningful
data related to the patient between visits, however it can be
made meaningful if the collected data can be viewed and
incorporated within the context of the full patient timeline and
chart.
Data Security: It is one of the greatest concern for all the
technologies using network for the exchange of the information
securing the information do required under HIPAA and has been
critical.
Constant Changes in connectivity and hardware technology: It is
the need of patients of the current situation that they need more
than one device to save and collect the data or information
related to the health condition of the patient and fulfil the needs
Task The Internet of Things (IoT) is a system of interrelated
computing devices that are provided with unique identifiers and
the ability to transfer data over a network without requiring
human-to-human or human-to-computer interaction. Discuss the
cyber security challenges faced by the health sector in this IoT
era.
Summary Title and Reference:
Five challenges of IoT in healthcare that put it at risk of failure
Chouffani, R. 2018, online, Five challenges of IoT in healthcare
that put it at risk of failure, viewed 26/01/2018
<http://searchhealthit.techtarget.com/tip/Five-challenges-of-IoT-
in-healthcare-that-put-it-at-risk-of-failure>.
Summary:
Chouffani (2018) explained about the challenges current
healthcare industries are facing due to the implementation of IoT
that can be listed as:
Lack of EHR System Integration: The data collected about the
patient’s condition including the glucose level, vital signs,
physical activity and others and this information do not travel to
the HER system. This information is generally not available to
the service providers or made easily available to them as it has
not been centralized.
Interoperability: These changes keep the IoT data in different
silos and patients are more likely to “collect different sets of
data” while using more than one medical devices that depends
on the purpose of the device. Because of the lack of options for
the adequate interoperability, data collected using the IoT
devices might remain locked for the individual system and thus
this lead to the loss of potential value to the care team of the
patient.
IoT data is meaningless if it is not within the full health record:
Most of the providers are supporting the collection meaningful
data related to the patient between visits, however it can be
made meaningful if the collected data can be viewed and
incorporated within the context of the full patient timeline and
chart.
Data Security: It is one of the greatest concern for all the
technologies using network for the exchange of the information
securing the information do required under HIPAA and has been
critical.
Constant Changes in connectivity and hardware technology: It is
the need of patients of the current situation that they need more
than one device to save and collect the data or information
related to the health condition of the patient and fulfil the needs
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

of the patients. Lack of network connectivity and hardware
availability could drag the user from availing 100% service from
the technology.
Week 6
Task Internet of Things (IoT) Cloud is a model designed to facilitate the
information society, enabling advanced services by interconnecting
physical and virtual things based on, existing and evolving,
interoperable information and communication technologies through
ennoblement of ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources. Explain the
importance of real time data capture capability, data visualisation, data
analytics, and API protocols in the application of IoT Cloud.
Summar
y
Title and Reference:
A survey of IoT cloud platforms
Ray, P. 2016, online, A survey of IoT cloud platforms, viewed
26/01/2018,
<https://www.sciencedirect.com/science/article/pii/
S2314728816300149>.
Summary:
Ray has performed research on 26 different IoT cloud platforms and
delivered the report that concludes that “heterogeneity management,
analytics, visualization, and research centric clouds do lack in overall
percentage at current scenario”. Real time data capture capability is
the vital aspect for the IoT cloud as collection of data at the real time
and real time execution of the data could lead to much efficient and
effective output for the society and the organizations. Real time data
collection enables the transparency between the user and service
providers related to the data and execute them for an efficient output.
Data visualizations is the most noticeable and tangible element for the
availability could drag the user from availing 100% service from
the technology.
Week 6
Task Internet of Things (IoT) Cloud is a model designed to facilitate the
information society, enabling advanced services by interconnecting
physical and virtual things based on, existing and evolving,
interoperable information and communication technologies through
ennoblement of ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources. Explain the
importance of real time data capture capability, data visualisation, data
analytics, and API protocols in the application of IoT Cloud.
Summar
y
Title and Reference:
A survey of IoT cloud platforms
Ray, P. 2016, online, A survey of IoT cloud platforms, viewed
26/01/2018,
<https://www.sciencedirect.com/science/article/pii/
S2314728816300149>.
Summary:
Ray has performed research on 26 different IoT cloud platforms and
delivered the report that concludes that “heterogeneity management,
analytics, visualization, and research centric clouds do lack in overall
percentage at current scenario”. Real time data capture capability is
the vital aspect for the IoT cloud as collection of data at the real time
and real time execution of the data could lead to much efficient and
effective output for the society and the organizations. Real time data
collection enables the transparency between the user and service
providers related to the data and execute them for an efficient output.
Data visualizations is the most noticeable and tangible element for the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IoT cloud platform that has make it a trending technology for the
current world from the car elements to the grocery chains. The IoT
application platform by DGLogik has been offering more than just the
visualization that can also be used for the same application. It enables
the users with the facility of better user interface and general
presentation in manner to accomplish the objectives through less
efforts and provide a better and efficient data collection and execution
method. Data analytics allows the sensors to exchange the signals
including information without any obstacle and allows other device to
decode the signal and execute the objective without any trouble. API
controls and other user interfaces are helpful in the management of
the commands and data exchanged by the gateways or the sensors. It
needs more than one API for the collection of the real time data
collection and execution in an efficient way. These are the
technologies those are boosting the functioning of the IoT cloud and
provide the users with an efficient and effective output.
Week 7
Task A Social Network Service (SNS) is a kind of web service for
establishing a virtual connection between people with similar
interests, backgrounds, and activities. However, there are
different security and privacy threats that target every user of
social networking sites. Provide five solutions to deal with these
security threats.
Summary Title and Reference:
Social Network Security: Issues, Challenges, Threats, and
Solutions
Rathore, S. 2017, online, Social Network Security: Issues,
Challenges, Threats, and Solutions, viewed 26/01/2018
<http://www.parkjonghyuk.net/lecture/2017-2nd-lecture/
forensic/s1.pdf>.
Summary:
There are many solutions those can be implemented as the
countermeasures for these threats and risks among which five
solutions are:
Water marking: It is a method of data embedding within a file in
manner to prove the ownership of the file of the media contained
in those files. Watermarking the multimedia files is a useful
measure that allow the users in the Social Network Securities to
trace the activities of the media files that includes manipulation,
modification or reuploading of the same media file over the
internet.
Co-Ownership: It is a model in the social network security that is
helpful in allowing more than one user to apply the policies
related to the privacy of the individuals in relation to the co-
ownership of the contents of the media files. Collaborative
privacy management, Clarke-tax mechanism, Multiparty
authorization mechanism, Object decomposition technique, and
Most highly voted option are some of the techniques.
current world from the car elements to the grocery chains. The IoT
application platform by DGLogik has been offering more than just the
visualization that can also be used for the same application. It enables
the users with the facility of better user interface and general
presentation in manner to accomplish the objectives through less
efforts and provide a better and efficient data collection and execution
method. Data analytics allows the sensors to exchange the signals
including information without any obstacle and allows other device to
decode the signal and execute the objective without any trouble. API
controls and other user interfaces are helpful in the management of
the commands and data exchanged by the gateways or the sensors. It
needs more than one API for the collection of the real time data
collection and execution in an efficient way. These are the
technologies those are boosting the functioning of the IoT cloud and
provide the users with an efficient and effective output.
Week 7
Task A Social Network Service (SNS) is a kind of web service for
establishing a virtual connection between people with similar
interests, backgrounds, and activities. However, there are
different security and privacy threats that target every user of
social networking sites. Provide five solutions to deal with these
security threats.
Summary Title and Reference:
Social Network Security: Issues, Challenges, Threats, and
Solutions
Rathore, S. 2017, online, Social Network Security: Issues,
Challenges, Threats, and Solutions, viewed 26/01/2018
<http://www.parkjonghyuk.net/lecture/2017-2nd-lecture/
forensic/s1.pdf>.
Summary:
There are many solutions those can be implemented as the
countermeasures for these threats and risks among which five
solutions are:
Water marking: It is a method of data embedding within a file in
manner to prove the ownership of the file of the media contained
in those files. Watermarking the multimedia files is a useful
measure that allow the users in the Social Network Securities to
trace the activities of the media files that includes manipulation,
modification or reuploading of the same media file over the
internet.
Co-Ownership: It is a model in the social network security that is
helpful in allowing more than one user to apply the policies
related to the privacy of the individuals in relation to the co-
ownership of the contents of the media files. Collaborative
privacy management, Clarke-tax mechanism, Multiparty
authorization mechanism, Object decomposition technique, and
Most highly voted option are some of the techniques.

Steganalysis: This is one of the effective measures that can be
applied to the media contents of the files in manner to identify
the malicious coding or programming implemented within the
contents of the files. There are many approaches and solutions
currently present in the market that can make it happen.
Digital Oblivion: This is another security measure that can be
implemented on the media files in manner to set an expiry date
on the files that is placed on the digital data stored in the files.
This will allow the users to not access the file after the expiry
date or time of the file and thus make it secured.
Encryption: It one of the popular techniques that is being
applicable in many sectors and allows user to embed unique
code over the files that can be opened only with the decryption
key. This will allow the users with decryption key.
Week 8
Task Big data has been considered to be a breakthrough technological
development over recent years. Big data is based on large
volumes of extensively varied data that are generated, captured,
and processed at high velocity. Discuss the main challenges as
well as the social and economic values for organisations in
adopting big data.
Summary Title and Reference:
Societal impacts of big data: challenges and opportunities in
Europe
Cuquet, M., Vega-Gorgojob, G., Lammerantc, H., Finnd, R. and
Hassan, U. 2017, online, Societal impacts of big data:
challenges and opportunities in Europe, viewed 26/01/2018,
<https://arxiv.org/ftp/arxiv/papers/1704/1704.03361.pdf>.
Summary:
There are three major challenges in the adoption of the Big dat
within the organisations that can be listed as: Managing Hadoop,
Scalability, and Data Talent Shortage. Most of the individuals are
not well aware with the software and technology involved in this
data collection and execution method and handoop requires the
extensive internal resource maintenances. The organizations
adopting big data will certainly feel the need of storage as the
demands are continuously increasing. It is important to consider
the scalability of the data while adopting Big data as the storage
will be need to scale up and down in future. Big data
implementation will only be a successful and profitable option, if
the organizations have skillful people who are well aware with
the technology’s output and requirements.
Big data can be a revolutionary technology for every business
sector including the Healthcare, Finance and Insurance, Public
Sector, Tetail, Media, Telecom, and Entertainment, Agriculture,
and many more. It is being expected that in future these sectors
applied to the media contents of the files in manner to identify
the malicious coding or programming implemented within the
contents of the files. There are many approaches and solutions
currently present in the market that can make it happen.
Digital Oblivion: This is another security measure that can be
implemented on the media files in manner to set an expiry date
on the files that is placed on the digital data stored in the files.
This will allow the users to not access the file after the expiry
date or time of the file and thus make it secured.
Encryption: It one of the popular techniques that is being
applicable in many sectors and allows user to embed unique
code over the files that can be opened only with the decryption
key. This will allow the users with decryption key.
Week 8
Task Big data has been considered to be a breakthrough technological
development over recent years. Big data is based on large
volumes of extensively varied data that are generated, captured,
and processed at high velocity. Discuss the main challenges as
well as the social and economic values for organisations in
adopting big data.
Summary Title and Reference:
Societal impacts of big data: challenges and opportunities in
Europe
Cuquet, M., Vega-Gorgojob, G., Lammerantc, H., Finnd, R. and
Hassan, U. 2017, online, Societal impacts of big data:
challenges and opportunities in Europe, viewed 26/01/2018,
<https://arxiv.org/ftp/arxiv/papers/1704/1704.03361.pdf>.
Summary:
There are three major challenges in the adoption of the Big dat
within the organisations that can be listed as: Managing Hadoop,
Scalability, and Data Talent Shortage. Most of the individuals are
not well aware with the software and technology involved in this
data collection and execution method and handoop requires the
extensive internal resource maintenances. The organizations
adopting big data will certainly feel the need of storage as the
demands are continuously increasing. It is important to consider
the scalability of the data while adopting Big data as the storage
will be need to scale up and down in future. Big data
implementation will only be a successful and profitable option, if
the organizations have skillful people who are well aware with
the technology’s output and requirements.
Big data can be a revolutionary technology for every business
sector including the Healthcare, Finance and Insurance, Public
Sector, Tetail, Media, Telecom, and Entertainment, Agriculture,
and many more. It is being expected that in future these sectors
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

will be well operate-able in efficient and effective manner through
adopting Big Data. There are many advantages and applications
of Big Data in transport and energy too in manner to get better
and efficient output. Currently, industries are being transformed
and almost all the sector is trying to find a solution for the
competitive environment that is almost affecting all the sectors. It
can be described as the key economic assets for the future that
can change the face of the industries through proper adoption.
Cuquet et al. explained the potential opportunities and benefits of
the Big Data in different social sectors and explained how much
beneficial it can be for the revolutionary change of the
organizations. However, there are some negative response of
this adoption and that is very low as compared to its beneficial
aspects and proper protection can make it a successful
technology.
Week 9
Task There has been a growing interest in the application of agile and lean
practices for software development. Discuss the benefits of agile and lean
practices and their impacts on project constraints.
Sum
mar
y
Title and Reference:
The Impacts of Agile and Lean Practices on Project Constraints: A Tertiary
Study
Nurdiani, I., Borstler, J. and Fricker, S. 2016, online, The Impacts of Agile
and Lean Practices on Project Constraints: A Tertiary Study, viewed
26/01/2018
<https://www.researchgate.net/publication/
304357957_The_Impacts_of_Agile_and_Lean_Practices_on_Project_Con
straints_A_Tertiary_Study>.
Summary:
Nurdiani, Borstler, and Fricker (2018) had done a tertiary study in manner
to identify the “impact of Agile and Lean Practice on project constraints”
and their findings clarify many aspects related to this research. They had
concluded that different Lean and Agile practices could lead to negative,
positive, or neutral impact on the measures considering the project
constraints. However, it can be said that both of the practices could lead to
various advantages such as adoption, certification, skilled workforce, and
best practice recognition. It can be a helpful approach to track record of the
achievements, delivery, and management of the project constraints.
Certification can be applied for the process of recruitment, identification
and filtering of the correct resources pool for the hiring concept. These
practices could also lead to the development of a pool with skilled labour
workforce within the organizations in manner to manage the confidence
that will be needing for the successful delivery of the new projects and will
thus lead to a reward system. Project managers could also implement
these practices for the accomplishment of the milestones within the
scheduled and budget of the project and deliver the project in a successful
and efficient manner. There are various tools that could be utilized in these
practices in manner to develop the software within the expected time and
adopting Big Data. There are many advantages and applications
of Big Data in transport and energy too in manner to get better
and efficient output. Currently, industries are being transformed
and almost all the sector is trying to find a solution for the
competitive environment that is almost affecting all the sectors. It
can be described as the key economic assets for the future that
can change the face of the industries through proper adoption.
Cuquet et al. explained the potential opportunities and benefits of
the Big Data in different social sectors and explained how much
beneficial it can be for the revolutionary change of the
organizations. However, there are some negative response of
this adoption and that is very low as compared to its beneficial
aspects and proper protection can make it a successful
technology.
Week 9
Task There has been a growing interest in the application of agile and lean
practices for software development. Discuss the benefits of agile and lean
practices and their impacts on project constraints.
Sum
mar
y
Title and Reference:
The Impacts of Agile and Lean Practices on Project Constraints: A Tertiary
Study
Nurdiani, I., Borstler, J. and Fricker, S. 2016, online, The Impacts of Agile
and Lean Practices on Project Constraints: A Tertiary Study, viewed
26/01/2018
<https://www.researchgate.net/publication/
304357957_The_Impacts_of_Agile_and_Lean_Practices_on_Project_Con
straints_A_Tertiary_Study>.
Summary:
Nurdiani, Borstler, and Fricker (2018) had done a tertiary study in manner
to identify the “impact of Agile and Lean Practice on project constraints”
and their findings clarify many aspects related to this research. They had
concluded that different Lean and Agile practices could lead to negative,
positive, or neutral impact on the measures considering the project
constraints. However, it can be said that both of the practices could lead to
various advantages such as adoption, certification, skilled workforce, and
best practice recognition. It can be a helpful approach to track record of the
achievements, delivery, and management of the project constraints.
Certification can be applied for the process of recruitment, identification
and filtering of the correct resources pool for the hiring concept. These
practices could also lead to the development of a pool with skilled labour
workforce within the organizations in manner to manage the confidence
that will be needing for the successful delivery of the new projects and will
thus lead to a reward system. Project managers could also implement
these practices for the accomplishment of the milestones within the
scheduled and budget of the project and deliver the project in a successful
and efficient manner. There are various tools that could be utilized in these
practices in manner to develop the software within the expected time and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

through embedding all the objectives firstly in document and then in real
experience. This blog state that these practices could possibly lead to
many advantageous aspects for the project and fulfil the needs and
requirements of the stakeholders through presenting an efficient and
effective project for them.
Week 10
Task The availability and implementation of information and communication
technologies (ICT) is increasingly vital to all dimensions of a nation’s
inclusive, equitable and sustainable economic development and
growth strategies. Discuss how ICT is fundamentally changing the
nature of economic, environmental, and social relationships globally.
Summar
y
Title and Reference:
Information and Communication Technology Use and Economic
Growth
Farhadi, M., Ismail, R. and Fooladi, M. 2012, online, Information and
Communication Technology Use and Economic Growth viewed
26/01/2018
<http://journals.plos.org/plosone/article?id=10.1371/
journal.pone.0048903>.
Summary:
Farhadi, Ismail, and Fooladi, (2018) explained the role of ICT in the
change of the nature of the environment, economic, and social
relationship globally and explained the positive impacts of this
implication. Implementation of ICT has break all the barriers of
communication between the individuals across any sector of the world
and it allows the interaction between the individuals 24*7. Various
index has been proposed in manner to emphasize on the economic
growth due to the implication of the ICT and all the countries are able
to grow and produce effective products and services to the consumers.
Globalization was introduced to the world in very early stages
however, and efficient and effective globalization was delivered
through the implication of the ICT only. This blog considered a sample
data of 159 countries that explained that it has played an important
role through providing communication between the individuals without
any barrier and thus enhance the economic condition of the countries.
The overall GDP can also be seen to increase after such implications
and vast use of the ICT among the citizens of the countries. Writers
conclude that “it seems necessary for all countries to increase their
ICT use index through increasing the number of internet users, fixed
broadband internet subscribers and the number of mobile subscription
per 100 inhabitants in order to boost economic growth.” This
implication helped in understanding the nature and practices of the
citizens from different background and thus implement them for the
personal benefits and advantages. ICT plays a vital role in the
development of the economic sectors, importantly during the
liberalization process and thus could be reflected in the economic
growth and international relationships. A country can utilize this
implication in an effective and efficient manner through facilitating
flexible and appropriate polices on the application of information and
communication technology.
experience. This blog state that these practices could possibly lead to
many advantageous aspects for the project and fulfil the needs and
requirements of the stakeholders through presenting an efficient and
effective project for them.
Week 10
Task The availability and implementation of information and communication
technologies (ICT) is increasingly vital to all dimensions of a nation’s
inclusive, equitable and sustainable economic development and
growth strategies. Discuss how ICT is fundamentally changing the
nature of economic, environmental, and social relationships globally.
Summar
y
Title and Reference:
Information and Communication Technology Use and Economic
Growth
Farhadi, M., Ismail, R. and Fooladi, M. 2012, online, Information and
Communication Technology Use and Economic Growth viewed
26/01/2018
<http://journals.plos.org/plosone/article?id=10.1371/
journal.pone.0048903>.
Summary:
Farhadi, Ismail, and Fooladi, (2018) explained the role of ICT in the
change of the nature of the environment, economic, and social
relationship globally and explained the positive impacts of this
implication. Implementation of ICT has break all the barriers of
communication between the individuals across any sector of the world
and it allows the interaction between the individuals 24*7. Various
index has been proposed in manner to emphasize on the economic
growth due to the implication of the ICT and all the countries are able
to grow and produce effective products and services to the consumers.
Globalization was introduced to the world in very early stages
however, and efficient and effective globalization was delivered
through the implication of the ICT only. This blog considered a sample
data of 159 countries that explained that it has played an important
role through providing communication between the individuals without
any barrier and thus enhance the economic condition of the countries.
The overall GDP can also be seen to increase after such implications
and vast use of the ICT among the citizens of the countries. Writers
conclude that “it seems necessary for all countries to increase their
ICT use index through increasing the number of internet users, fixed
broadband internet subscribers and the number of mobile subscription
per 100 inhabitants in order to boost economic growth.” This
implication helped in understanding the nature and practices of the
citizens from different background and thus implement them for the
personal benefits and advantages. ICT plays a vital role in the
development of the economic sectors, importantly during the
liberalization process and thus could be reflected in the economic
growth and international relationships. A country can utilize this
implication in an effective and efficient manner through facilitating
flexible and appropriate polices on the application of information and
communication technology.

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



