Monday, December 30, 2019

We Are Too Dependent On Computer Systems Essay - 952 Words

We Are Too Dependent on Computer Systems It is said by Ray Kurzweil that in 15 years, computers will be smarter than the whole human race (Khomami). Is there any shred of truth to that statement and if so is it a problem? As a society, we are very dependent on software systems and computer technologies. We would be rendered almost completely helpless without our laptops, internet, and smart phones. While they generally make our lives easier, we have grown to need software technologies to an unhealthy extent. Starting from an early age, people depend on software. Children sit in their car seat and ask for mommy’s tablet to play games; often times children choose computer games over playing outside. Because smart phones are simply handheld computers, pre-teens, teenagers, and many adults are glued to their phones for a solid portion of the day. They have what is now called â€Å"checking habits† by a study in the journal Personal and Ubiquitous Computing (Khomami). This is where a person checks their applications or emails about every 10 minutes for about a minute or so. There is no reason to do it such as a notification or text, it’s just frequently checking to see what updates have happened while you were away. According to Kleiner Perkins Caufield Byers s annual Internet Trends report, people check their phones on average 150 times a day (Stern).The study asserts that it is an unconscious habit that is only another form of addiction (Khomami). TheShow MoreRelatedEssay about Societys Dependence on Computers919 Words   |  4 PagesComputers are everywhere, and they are used for everything, and in every type of business have we become too dependent on computers? The younger generation particularly has seized on the strange communication through the Internet. Using chat groups on different subjects they are taking in school, they conduct live conversations by keyboard through the internet. Since computers have been invented, so many people everywhere find themselves dependent on computers. Computers are appearing almost aboutRead MoreOverdependence on Computer1160 Words   |  5 PagesArgumentative Writing Topic: We are becoming overwhelmingly dependent on computers. Is thisdependence on computers a good thing or should we be more suspicious of their benefits? Introduction Computers are, without a doubt, a useful tool that many of us use every day. Sincetheir invention, people far and wide have become increasingly dependent oncomputers. Computers have found their way into just about every aspect of our lives, and in most cases, they make things easier for us. They allow usRead MoreAre we too Dependent on Computers?1091 Words   |  4 PagesToday we live in a modern age where technological development is one of the greatest gifts to humanity. Technology is the making, modification, usage, and knowledge of tools, machines, techniques, crafts, systems and methods of organization, in order to solve a problem, improve a pre-existing solution to a problem, achieve a goal, handle an applied input/output relation or perform a specific function (Wikipedia). It also refer to the collection of such tools, including machinery, modifications, arrangementsRead MorePeople Depend Too Much on Computers and Technology Essay692 Words   |  3 PagesPeople Depend Too Mu ch On Computers and Technology Are we too dependent on computers? The answer is yes! In today’s society, people use computers in business, education, and in the entertainment world. Almost everything we do and every aspect of our life is affected by modern technology with computers at the top of the list. People obsess over computers. The computers do everything for us so we don’t have to use our brains anymore. People are losing their jobs due to the computers moving into theRead MoreEssay on People Have Become Overly Dependent on Technology880 Words   |  4 PagesBilguun Tugs-Amgalan Everett LeGrande English 1 5/April/2011 People have become overly dependent on technology Humans have been called the animals which make things, and at no time in history has this been so obvious as the present. Today, every human activity is dependent upon various tools, machines, and systems, from growing food to providing shelter to communication, healthcare, and entertainment. Some machines, like the tractor, speed up and make more efficient activities that humans haveRead MoreDependent on Computers884 Words   |  4 PagesAre we too dependent on computers? When we talk about computers, people often relate computers with modern technologies. Computer is a tool that helps us make things in our life easier. People use computers in business, public services, educations, even entertainment. Our daily activities are more and more based closely on the working of computer. Almost everything we do is affected by modern technology and computers. I would say that I agree that people nowadays depend on computers too muchRead MoreMobile Phone and People1469 Words   |  6 PagesTERM PAPER The production and sale of cigarettes should be made illegal. People have become overly dependent on technology. University students should pass the English proficiency test before graduation Argumentative Essay : People have become overly dependent on technology. Topic: People have become overly dependent on technology 1. Introduction (paragraph 1) A.Hook: Computer, hand phones, Internet, and latest gadgets such as GPStacking devices are not anymore unusual thing in our  dailyRead MoreSociety s Technology On Technology875 Words   |  4 Pagesimaginable; so much that everyone thinks that society is becoming too dependent on technology. â€Å"Technological progress is like an axe in the hands of a pathological criminal.† Albert Einstein. Even before today’s advancement in technology Albert Einstein made perfect sense with this statement. Today’s society seems to be unable to live without TV, internet, cell phones, and computers. Our society, being so dependent on technology, without it we will lack information, be delayed or shutdown, and will loseRead MoreComputer Makes People Become Lazy1111 Words   |  5 Pageshappened with my quiz. After we checked all the answers, my teacher realized that her computer made a making mistake. Therefore I realized that even a computer made mistake; computers may have revolutionized the way we live and work, but what would happen if they all suddenly crashed? As we increasingly rely on computers to get through the day, the question begs to be asked: have we become too dependent on computers? People has one thing that distinct with other is thinking. We create everything to makeRead MoreTechnology : We Can No Longer Live Without It?1217 Words   |  5 PagesTechnology: We can no longer live without it. Society has come a long way with the use of technology. In 1876, the first phone arose. 95 years later the personal computer was also invented in 1971. Now 45 years later we have the capabilities of both in the palms of our hands. It used to take us weeks to communicate with someone a few cities away. It now only takes a few seconds to communicate with someone in a completely different country. Where it used to take hours to research information in

Sunday, December 22, 2019

The Development of AI in The AI Revolution is on by...

When the earth began there was no life, it was a world of fire and oceans of lava, after thousands of year’s life began in the ocean and soon came onto land. The land creatures developed into dinosaurs which ruled the world for thousands of years until a meteor wiped them out and a great ice age came. Once the ice age ended monkeys came and from them humans. We have been around for two thousand years and now we have created artificial intelligence which is becoming more and more integrated into our ever increasingly complicated world to make it simpler but have humans also created the next cycle of evolution? The AI Revolution is on by Steven Levy is about Artificial intelligence (AI). Levy writes about how the AI came around and how it affects our daily life. Levy explains impeccably how its developers strayed away from imitating human intelligence, and how it is integrated into our society. Levy has been reporting on digital technology for over twenty five years and his arti cles have been published in many distinguished magazines according to Writing and Reading Across the Curriculum. Levy’s article begins by talking about how robots are used in ware houses that are linked to a main computer that tells the robots what they need to get. The ware house is organized in small groups of products spread out threw out it, this way the robots don’t have to travel as far to get the product but to a human it looks like a random pile or stuff that isn’t sorted at all. Levy goes onShow MoreRelatedComputer Evolution Evidenced in the essays Toward An Intelligence Beyond Man’s by Robert Jastrow and The AI Revolution Is On by Steven Levy660 Words   |  3 Pagesworm to human. By the incredibly fast rate of technology improvement, Jastrow thought computer will evolve in a much shorter period of time. In the essay The AI Revolution Is On by Steven Levy, the author stated how new vision of computer intelligence are differ from the past years’, and how useful they are in today’s daily life. Levy used Diapers.com as an example of AI’s application in real world. Like other big companies warehouse, it use robots by Kiva Systems to organize the warehouse andRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesCase Incident 1 Multitasking: A Good Use of Your Time? 264 Case Incident 2 Bonuses Can Backfire 265 3 9 The Group Foundations of Group Behavior 271 Defining and Classifying Groups 272 Why Do People Form Groups? 272 Stages of Group Development 274 The Five-Stage Model 275 †¢ An Alternative Model for Temporary Groups with Deadlines 276 Group Properties: Roles, Norms, Status, Size, Cohesiveness, and Diversity 277 Group Property 1: Roles 277 †¢ Group Property 2: Norms 280 †¢ Group PropertyRead MoreLibrary Management204752 Words   |  820 PagesTotal Quality Management (TQM) . . . . . . . . . . . . . . . . . 80 Policy Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Sources of Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Effective Policy Development . . . . . . . . . . . . . . . . . . . . . 84 Implementing Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Steps in Making Decisions . . . . . . . .Read MoreFundamentals of Hrm263904 Words   |  1056 PagesManager Marketing As sistant Production Manager Senior Production Editor Freelance Development Editor Senior Designer Interior Design Senior Media Editor Senior Photo Editor Production Management Cover Design Cover Credit George Hoffman Lise Johnson Sarah Vernon Amy Scholz Laura Finley Dorothy Sinclair Sandra Dumas Susan McLaughlin Kevin Murphy Laura Ierardi Allison Morris Hilary Newman mb editorial services David Levy  ©Michael Eudenbach/Getty Images, Inc. This book was set in 10/12 ITC Legacy

Saturday, December 14, 2019

Investigating Education through Research (IETR) Free Essays

string(128) " of in a focus group situation are the processing of confidential material and sensitivity to the feelings of each contributor\." Introduction This report reviews the article Every Child Matters written by Straker and Foster (2009) and explores the need for multi agency collaboration in the ‘children’s workforce’ within an English multi disciplinary child based setting. to ensure that the ECM outcomes are met consistently through efficient in service direction of staff at multi tiered levels. This paper argues that if the outcomes of ECM are to be met, that staff working within these areas must work collaboratively. We will write a custom essay sample on Investigating Education through Research (IETR) or any similar topic only for you Order Now It is anticipated that only by receiving appropriate and effective multi-agency training that consistency and continuity of the broad ECM aims can be achievedSome elements of this article are applicable to my UMP in that the function of ECM broad aims relate to inclusive/inclusion and inclusivity for all children and young people. Some authors represented in this article will be appropriate and significant to my research and may be used as underpinning and reinforcement to my main policy Special Educational Needs Disability Act (SENDA). The assessment criteria used to evaluate this journal article are: Context/significance of the research report Has the significance of the article been explained and justified? Methods/methodology used Have different research methods/methodologies been used effectively? Ethics Has good ethical practice been facilitated prior or during the research? Veracity /process of the research How reliable are the findings? Influenced by ever changing political issues, Government structures, cultural values and economic factors the authors translated policy guidelines into practical solutions using qualitative methods of research and underpinning citations from multiple theorists to evaluate the level of understanding, participation and clarity of the five Every Child Matters (ECM)(DfEs,2003) broad aims. Every Child Matters: Change for Children (ECM) (DfES, 2003) is a legislatedinitiative set up by the Government with the intention of ensuring that every young person regardless of circumstance or environment is to be given the underpinning they require to: be healthy; stay safe; enjoy and achieve; make a positive contribution; and achieve economic wellbeing. (ibid) Every Child Matters went on to propose a framework of desirable outcomes for children which might form the basis of common assessment systems, shared working practices, and, above all, shared goals for childhood professionals (DfES, 2003: 9). A year later, the Government legislated, in the Children Act, 2004, to: create integrated children’s services departments by combining education and child and family social care functions; Bring these new services together with health and other childhood services by establishing children’s Trusts locally; Develop a set of shared working practices across these services and increase the mutual understanding and common skills base of childhood professionals. Submitted to Manchester University(no date) Dyson et al. This paper argues that there are flawsidentified byresearchers and theorists. Sloan (2006,12) states (t)o date there continues to be tensions and rivalries between agencies about their professional knowledge, roles and specialisms. The loss of agency specialism and the responsibilities that go with this are potentially traumatic for professionals going through the transition from single agency to multi agency work (Anning et al. 2005,72). Straker and Foster (2009) argue that as well as training and the ECM agenda, there are issues surrounding professional identity and differentiation. This is substantiated by Macdonald, (1995,35) It challenges, to invoke Bourdieu’s notion, the various folklores which are attached to different professional arenas and hence seeks to force open social closures which different groups of workers try to uphold as they defend their professional and personal identity (cf Macdonald,1995,35 cited in Straker and Foster 2009) The content, research methods and findings of this article will be evaluated within this document.. Content The evaluation criterions for this review are: Has the significance of the article been explained and justified? Have different research methods/methodologies been used effectivelyHas good ethical practice been facilitated prior or during the researchHow reliable are the findings? The significance of the article is to establish the level of clarity of the ECM broad aims and multi agency collaboration within children’s services departments. Every Child Matters: Change for Children (2004) identified flaws in the effective protection of children from some departments. These concerns are further backed up by the Bercow Report [2008] which also pinpoint five major ideas – problemsthat require rectifying to enable adjustments and enhancement to develop. The recommendationsfrom this report are gathered under these five themes: Communication is crucial Early identification and intervention are essential; A continuum of services designed around the family is needed; Joint working is critical; and The current system is characterised by high variability and a lack of equity. (ibid) Straker and Foster’s review clearly identifies the focus of the research and the points the paper seeks to address. The methods of research were identified as being via focus group and semi structured interviews. The mixed personnel samples were discussed and their purpose was explained. Ethical considerations were identified and appropriate protocol was evident in text. The study findings and results were clarified with recommendations for future action. The researcher concurs with the findings of ECM(2004) and the Bercow Report (2008) from reading associated literature Victoria Climbie’ Report by Lord Laming (2003)and from media coverage regarding failings of services responsible for the care for children.e.g. The case of baby P . Reform is essential to ensure no repetition of these failings. Ethical considerations for focus groups are the same as for most other methods of social research (Homan 1991). When selecting and involving participants the researchers must ensure that full information about the purpose of contributions is given. Implications of appropriate ethics consideration was contained in the written body of this text. It should be stated that none of the participants were known to the researchers prior to these interviews and focus groups, and that, in order to maintain anonymity, participants are identified by letters (Cohort 1) and numbers (Cohort 2) throughout the below discussion. Straker Foster (2009. P.124) Honesty and keeping the contributor enlightened about the expectedoutcomes of the exercise is apparent within the paper. Good practice prohibits candidates to be pressured into communicating information, there was no implication of this in the article. Ethical considerations to be aware of in a focus group situation are the processing of confidential material and sensitivity to the feelings of each contributor. You read "Investigating Education through Research (IETR)" in category "Essay examples" Clarification of how contributions will be used and shared by personnel involved in the exercise must be established prior to the activity. Confidentiality must be a focus to be communicated to the group as a priority this avoids any sensitive material being leaked. Analysts have a duty to conceal data from the participants This paper indicates that pseudonyms were used. This complies with the principles of British Educational Research [BERA]. According to Hammersley and Traianou,(2007)c ommonly recognized ethical principles include harm, autonomy, privacy, reciprocity and equity. If social research is to remain of benefit to society and the groups and individuals within it, then social researchers must conduct their work responsibly and in light of the moral and legal order of the society in which they practice. They have a responsibility to maintain high scientific standards in the methods employed in the collection and analysis of data and the impartial assessment and dissemination of findings.[SRA 2003, 13]. Literature Review A literature review outlines the scope of the subject area, trends, themes and prior research that demonstrate awareness of work carried out on the issue/topic covered. The article sets out to explore the need for multi agency collaboration within the ‘children’s workforce’. The aim to pilot and assess the overall understanding of policy interpretation in this area. The effectiveness of training to inform and guide these agencies to a joint, collaborative service with less overlap. The literature review was initially wide including general texts such as ECM,(2003), Children’s Workforce Development Council (2007), Victoria Climbie’ Report by Lord Laming (2003) and Reid, (2005,13). The focus then narrowed drawing on the comments of Allnock et al.(2006,35-7), Atkinson et al.(2007) and Moran et al, (2006) then finally focussing on the topic aims. Issues surrounding multi agency collusion are not new. The potential benefits have been discussed repeatedly by Government reports e.g. DfEE (1999) and Atkinson et al.( 2002), Atkins, Jones and Lamont (2007) Bloxham (1996) and Payne(1998) all agree that there are possible advantages of shared Practice. The review of literature by the authors suggested anticipated problems with strategy implementation resulting in inconsistencies and overlapping of roles across childcare teams to meet the broad aims of the ECM –Change for Children policy,(2204). Allnock et al. (2006,35-7) in summing up the research within this document identifies the need for more clarification of role where there is full coverage for all areas without overlap. The focus therefore was for the implementation of strategies that addressed Government policy consistently. The literature review within this article is appropriate; references display deepness and wideness which is clear and concise. Several appropriate references were used in the introduction which gives a broad understanding of policy, statute and the need to work in collaboration to meet the desired outcomes of the ECM: Change for Children (2004). This literature review is good as it gives a wide overview of the subject, informed analysis of findings, identified variables and offered recommendationsfrom the findings. The spotlight on content and relevance is evident. Critique and collaboration of other policy is also discussed within the paper. The authors state clearly that other theorists and participants concur that it is a ‘two way street’ where united collaboration will only take place when all Government partners and child care professionals share the same ethos, receive appropriate guidance and training and communication is effective . Straker and Foster’s, (2009) could have used the recommendations from the Bercow Report to evaluate and substantiate their own findings. The literature review concludes by identifying that whilst training has been identified as being a potential asset it is still sporadic this may be due to resisting the opportunities, lack of vision to move with changes or basically that it is not available to certain sectors or personnel. Different sectors within this subject are identified as requiring further investigation these are those that require professional identity (clarification of role) and differentiation (what the role involves for the individual).It is also identified that through ECM professional development and training that these obstacles could be overcome. Methods and findings Research is defined by two categories qualitative and quantitative Qualitative research is drawn from many sources. This is primarilydue, as Lancy (1993) points out, to the fact that â€Å"†¦ topic, theory, and methodology are usually closely interrelated in qualitative research[p.3].† Both research methods usedin this journal article were qualitative. Qualitative methods are helpful not only in giving rich explanations of complex phenomena, but in creating or evolving theories or conceptual bases, and in proposing hypotheses to clarify the phenomena. (Shwartz, 2000). Quantitative research examines the variables of statistical information. This type of research uses controlled systems in order to prove or disprove a theory. Basic research is primary this type of research is information or data from a chosen subject that requires further explanation or clarification with the intention of gaining more clarification and understanding. The results are not immediate or short term. On one hand there is research which is qualitative with no scientific element in the experiential perception, it is the questioning why in the humanistic sense and the other which is more analytical and questions the relationship amid irregulars being qualitative and /or quantitative research to prove or disprove a hypothesis. However debate between researchers remains as to what is valid research. Applied research Applied research communicates outcomes on multiple layers. This type of research scrutinizes issues in genuine context the aim being the provision of a realistic resolution which usually comes from fundamentalstudy in this case Every Child Matters: Change for Children[ECM] [2004]. Applied research can capture why policy accomplishment is delayed or suspended. The example being the variables of policy interpretation, policy understanding and what trainees want their learning experience to be and how to implement changes in the workplace. This is clearly identified within the reviewed journal article. Primary research consists of interviews and eye witness accounts etc. Which are taken from observational methods. Whereas secondary research could use books, Government documents etc. This method uses the findings of others for the advancement of knowledge. Secondary and primary research is effective when used together as it shows variety and veracity of information and data. The article reviewed used both methods to give weight and impact to the research thus providing depth and breadth. The researchers aim was to build an accredited, tiered pathway of training. The nature of the research and the distinctive challenges of shared vision and leadership for the Children’s Service workforce is very diverse in its makeup. There were observed identified differences in this pilot research. Straker and Foster (2009) research set out to answer the questions on the effectiveness of ECM aims within children’s services, the implementation within different tiers and multi agency training. The chosen research methodology was focus group ; strength of this method is the ability to inform many people in a limited time a weakness of this method is cost and time constraints. Semi structured interview encourages two way dialogue but the interviewer must be articulate and confident; this can a weakness if not. The framework of the questions from both research methodologies cited above was to establish how far the rhetoric of ECM and the effect of translation over the mult i faceted children and family service. The sampling strategy was opportunistic 3 cohorts of participants from various fields working within children’s services. Opportunistic sampling allows new strands of information to be pursued allowing the length and width of research to be explored.(Journal of Mixed Method Research January 2007 1:77- 100). The piloting of research is to establish reliability and validity in this case by asking the same questions to different cohorts. It is the tool to measure the level of knowledge or participation in an subject in this instance ECM and multi agency collaboration and training. Researchers will sometimes see if the measure yields different scores for two groups who are expected to differ in the construct. Harter and Pike (1994). Social enquiry when correctly executed can result in effective results for all, this type of research is grounded foundation to build on for the benefit an enhancement of the subject/s being studied. Social enquiry is predicated on the belief that greater access to well grounded information will serve rather than threaten the interests of society. Nonetheless, in planning all phases of an inquiry, from design to presentation of findings, social researchers should consider the likely consequences for society at large, groups and categories of persons within it, respondents or other subjects, and possible future research. [SRA 2003, 17] Focus groups allow the collating of data from personnel at various levels within educational settings the diversity of their backgrounds and their original outlooks allow the researchers opportunity to obtain information from varying perspectives and backgrounds. With an individual survey or interview, a respondent’s input will be limited to the ideas and issues that he/she thinks of at the time of the session. The only prompts to trigger these ideas are the specific questions on the survey and/or the comments from the interviewer. In a focus group participants benefit from the ability to build on each other’s ideas and comments, typically providing more extensive input than would otherwise be possible. In contrast to written or online surveys and phone interviews, focus groups present the possibility of observing nonverbal behavior. Wiesenfelder,(no date) Focus groups are particularly useful when there are power differences between the participants and decision makers or professionals, when the everyday use of language and culture of particular groups is of interest, and when one wants to explore the degree of consensus on a given topic (Morgan Kreuger, 1993). Kitzinger (1994) argues that interaction is the crucial feature of focus groups because the interaction between participants highlights their view of the world, the language they use about an issue and their values and beliefs about a situation. Interaction also enables participants to ask questions of each other, as well as to re-evaluate and reconsider their own understandings of their specific experiences. Stavrou, (2002) states that it is useful in qualitative research as unreconstructed logicor the inflexible science of reasoning and is used to understand what is real: the quality , meaning, context or image of reality in what people actually do, not what they say they do [as in the collection of quantitative data] Stavrou, [2002]. Although having many benefits alongside other investigation methods limitations are evident. The researcher, or moderator, for example, has less control over the data produced (Morgan 1988) than in either quantitative studies or one-to-one interviewing. This gives little control leaving a predominantly open ended outcome with an unpredictable predetermined conclusion. A predicted outcome is not the aim of a focus group the diversity of the subjects within the group prohibits this. More positively, focus groups may pose some difficulty in assembly. Obtaining a representative sample may be a challenge as focus groups may not be an option for certain members of personnel. Such as people who have confidence issues, the less eloquent, those with speech delays or learning difficulties. The authors of the journal article did not indicate that the above was an issue for the participants taking part but if this were the case the reviewer would have expected the choice of research method to accommodate the diversities within the sample. To address some of the weaknesses of a focus group supporting research strategies were implemented. Semi structured interviews are focused two way conversations that are used to give and receive information. This method is conducted with an open framework which differs from a questionnaire where questions are formulated prior to the interview starting. The research methodology of semi- structured interview commences with generalized questions or topics Key themes explored include roles and responsibilities, their perceptions of the ECM agenda, and its impact on their practice as well as their relationships with other agencies. Straker Foster(2009. P.124) This then forms the basis of a more specific line of questioning which does not require forward planning. In effect this gives the researcher ‘’carte blanche’’ to create most of the questions during the process giving the interviewer the opportunity to probe so allowing depth of detail or the opportunity to discuss delicate/conflicting issues 1-1’’ Wengraf (2001.P.194-5) Semi structured consultations may be recorded by prior agreement in compliance with theethic code. This affords more accuracy if supported with notation as back up. The latter ensures that all questions are addressed and ifthere are mechanical glitches there is supporting evidence. The disadvantages of this research method are concluding the interview through visual clues e.g. closing books tidying up papers which may hamper the flow of the process thus turning the interviewee off . Wengraf, [2001. 11] as above states that ending an interview appropriately can lead to the emergence of a whole new area of information. A further pitfall of this method is that the transcribing and analysis of data can prove time consuming and the opportunity to get side tracked with anecdotes and generally inappropriate information is a possibility. In any research thefirst questions that you should ask are: Has this been done beforeDoes these data already existIf so, is there value-added in doing this againRand, [2009, 16] Whilst these methods offer breadth and depth my opinion is that it would be easy to keep to the structure as other information may come up that could side track the research event. The principle of the research was the exploration of need for multi agency collaboration within children’s services. The research focused on three sets of personnel working within different branches of the children’s care framework, ethical considerations were followed and informed consent was documented as being obtained. The sample used was diverse in its make up ranging from junior tosenior management levels. The desirable model of practice was taken from the ECM, (2004) shared goals. The article included semi structured interviews and focus groups to establish the levels of understanding and participation within their specialism. The methods chosen proved to be limited and the sample size although diverse in makeup was small which may hamper the overall picture of awareness in this field of enquiry. Data interpretation and analysis The authors of this journal article identified that whilst there was marked amountof similarities in opinionwithin the groups any disparity in opinions was thought to be as a result of the lack of clarity of ECM outcomes and involvement therein, this is underpinned by relevant references from Annig et al ; Sloan( 2006) .The researchers in this study identified that participant’s roles and responsibilities varied considerably and this determined the responses of the individual groups. The article therefore implies that other tiers would benefit from the knowledge and understanding of their peers roles within the sector. Multi-channel collusion: Happens at dissimilar tiers: information transmitted to personnel from different disciplines; co-operation and joint working on a case-by-case basis; co-ordination and formalised joint working; coalition at the level of joint structures; and integration of organisations merging to create a new identity Horwath and Morrison, [2007]. The findings of the research agrees with Horwath and Morrison, [2007]. The diversity of the groups and the differing tiers gave depth and breadth of insight into the levels of participation and understanding of the ECM framework. The study ranged from a wholly positive attitude from cohort one to cohort two, who whilst still positive did feel confident in highlighting negative and problem areas. Cohort three displayed a an eclectic mix of groups one and two. It was interesting to viewthe responses of the individual groups even though each sample group was mixed in level academically and professionally the responses in group 1 and 2 were on the whole identified as being positive. Disparities were identified in group 2 due to gaps [they felt] in understanding of the ECM framework for some employees this was proving problematic. The dynamics in group 3 was a mixture of positive and negative responses/comments in line with the other two groups sampled. The same comments from individuals during the tasks was encouraging, the mention of shared values, the understanding of other professional roles and a feeling of belonging as a result of this training exercise was a positive step . Conclusion The research concluded that key issues that emerged were communication, leadership and consistency in practice. Communication is considered to be of paramount importance in promoting the awareness of knowledge and the clarification of the work that other agencies do. Leadership was defined as being a multi tiered facet which has the ability to empower, promote a shared vision and purpose. This was acknowledged as a being a strength in shared collaboration only when colleagues were willing to change and adapt practiceto new agendas. Whilst the participants in the focus group acknowledge the needs of effective communication, good leadership in order to work collaboratively interpretation of the outcomes of ECM and overlap of role still appears to be problematic areas. Problem areas were also identified, these included lack of consistency in practice, the inability for some employees to move forward with new ideas and policy directives, lack of clarity in job description and poor perc eption. These findings are reasonably founded as other researchers early in the article indicate similar findings and are broadly reiterated by others participating in this research. These findings are presented in the form of statements that identify the participant by pseudonym but highlight the accurate job title. Many sources of appropriate documentation were used to support this journal article. Theory is used to embed and underpin throughout the article. The literature used created a chronological picture of policy and the multi strand approach to addressing the issue of lack of clarity and cooperation within children’s services. The description of research participants and levels was appropriate to enable the reader to establish the reasoning behind the research that was to be identified. Ethics guidelines were documented as being followed appropriately. Some reinforcement of ethical paperwork in the appendices would have been useful. Policy and practice mis- match is identified as an ongoing concern across the children’s services sector. This exercise has identified the focal characteristics of focus group and semi structured interviews research methodology, with emphasis being on the interaction and oscillation of participants which only qualitative methods of research can facilitate. Participants who do engage in focus groups often obtain value from the experience but realistic deliberation of time consuming focus group situations from the researchers point of view could be daunting. Lack of chance to complete the required elements involved within the allotted constraints can be a deterrent. The process of these types of research can be more collaborative than other forms of study and can be an empowering process for participants and an exciting challenge for social researchers wanting to gain a different perspective on their field of interest. (Harrell and Bradley 2009 cited in Rand, 2009) The initial questions identified earlier in this article have been answered and reasoning behind the findings has been discussed. The theory was used to substantiate the outcomes from the article. References Article Pros Advantages and Disadvantages of Qualitative Research Methods http://www.Article Pros.com./php?Andrew Schwartz Accessed 5/3/11 http://www.articlesnatch.com/Article/Advantages-And-Disadvantages-Of-The-Qualitative-Research-Methods/208266 accessed 14/11/10 http://www.dcsf.gov.uk/bercowreview/docs/7771-DCSF-BERCOW.PDF accessed 29/10/10 http://www.dcsf.gov.uk/everychildmatters/about/guidance/dutytocooperate/accessed 24/10/10 DfEs,(2003) Every Child Matters. Cm. 5860 (London: The Stationery Office). DfES (2003a) Every Child Matters. Cm. 5860 (London: The Stationery Office) Every Child Matters-Change for Children. (2004) Homepage . http://www.everychildmatters.gov.uk/accessed 5/3/11 Gibbs, A. (1997) Social Research Update University of Surrey Issue 19. http://www.sru soc.surrey.ac.uk/SRU 19 html accessed 5/3/11 Hammersley, M. and Traianou, A. (2007) Ethics and Educational Research. London: TLRP. http://www.tirp.org/capacity/rm/wt/traianou/ accessed 5/3/11 Harrell,M. AND Bradley,M. (2009) Data Collection Mehtods: Semi Structured Interviews and Focus Groups.http://www.rand.org/pubs/technical_reports/2009/RAND_TR718.pdf accessed 14/11/10 Harter and Pike, (1994) cited in Lodico, G. Spaulding, D.T., Voegtle, H. (2010) Methods of Educational Research from Theory to Practice. San-Francisco: Jossey-Bass Homan R (1991) Ethics in Social Research. Harlow: Longman Horwath, J. and Morrison, T. (2007) Collaboration, integration and change in children’s services: Critical issues and key ingredients, Child Abuse and Neglect, 31, 55-69. http://www.evidencnet.pbworks.com/Developing-the-workforce-for-practice-in-integrated-children%E2%/80%99s-services accessed 5/3/11 Kitzinger J. (1994,1995) ‘The methodology of focus groups: the importance of interaction between research participants’, Sociology of Health 16 (1): 103-21. http://www.soc.surrey.ac.uk/sru/SRUU19.html accessed 5/3/11 Lancy,D.F. [1993]. Qualitative research in education: An introduction to the major traditions. New York: Longman. Manchester University(no date) Dyson et al. http://www.education.manchester.ac.uk/research/centres/cee/publications/Fileuploadmax10Mb.136260.en.doc Mixed Methods Sampling: A Typology with Examples, Journal of Mixed Method Research January 2007 1:77-100 Morgan D.L. (1988) Focus groups as qualitative research. London: Sage Morgan and Kruger, (1993) Social Research Update. ( no date)Issue 19 University of Surrey. http://www.soc.surrey.ac.uk/sru/SRUU19.html Morgan D.L. and Kreuger R.A. (1993) ‘When to use focus groups and why’ in Morgan D.L. (Ed.) Successful Focus Groups. London: Sage. Kitzinger, (1994) Social Research Update.( no date) Issue 19 University of Surrey. http://www.soc.surrey.ac.uk/sru/SRUU19.html Qualitative Report, (1995) Vol. 2: 3. http://www.nova.edu/ssss/QR/QR2-3/shank.html accessed on various dates Social Research Association ethical guidelines http://www.thesra.org.uk/documents/pdfs/ethics03.pdf accessed 7/11/10 Social Research Update issue 19 University of Surrey http://www. Soc.surrey.ac.uk/sru/SRUU19html accessed 5/3/11 SRA,(2003,17) http://www.research.shu.uk/ethicsethinicity/docs/newdoc/LearnedSocietiesReviewdraft.pdf Stavrou, S. (2002) Youth Delinquent Surveys: A Methodology Paper http://www.unhabitat.org/downloads/docs/1845_23210_Aki_methodology_paper.pdf accessed 27.11.10 Straker, Katherine Foster, Rob [2009] ‘Every Child Matters: Every challenge met?’ Journal of Vocational Education Training, 61:2, 119-132 Wengraf, Tom (2001). Qualitative research interviewing. London: Sage. Wiesenfelder, H. (no date) What are the Benefits of Focus Groups. http://www.ehow.com/about_5042427_benefits-focus-groups.html How to cite Investigating Education through Research (IETR), Essays

Friday, December 6, 2019

The Security Threats in Smart Devices Free-Sample for Students

Question: Discuss about the Security Threats in Smart Devices. Answer: Introduction Information Security has become important for every business organization and users those are using Information Technology applications. With the advancement of IT, various issues of security and privacy are encountered such as hacking, phishing, identify theft, DDoS attacks etc. It is essential to control these security issues by using advanced security techniques. There are different applications of Information Technology and smart devices are one of them. Smart devices are electronic devices and connect with other devices and network by using different wireless protocols such as NFC, Bluetooth, 3G, and Wi-Fi etc. These wireless protocols operates at autonomous and interactive extent. Smart devices are used for both home and business purposes and examples of these devices are Home Surveillance Devices, Hazard Detection Devices, Cooking Devices, and Computer Systems. Smart Phones etc. There are some features that make these devices smart such as easy to use, trusted, reliable, secur e and fast. Whether smart devices are secured, but still there are some essential security threats found in smart devices. The purpose of making this report is to discuss about Security Threats in Smart Devices. The essential points that we will discuss in this report are challenges, problems, technologies applications, relevant technologies and real life impact of security threats of smart devices. Challenges of Security threats in Smart Devices The security threats in Smart Devices cause various challenges for users and developers of these devices. These challenges are discussed as below: Unauthorized Access Unauthorized access of information is performed by hackers to access data from smart devices and their networks while sending and receiving data by users. It is vulnerable security threat of smart devices and it has become an essential challenge to control. Information that is accessed in unauthorized way can be misused by hackers. Lack of Experience The security threats are getting more advanced and due to that it is challenging for security professionals to control these security threats. Besides this, most of the security professionals have experienced in market of network devices not in hardware and software components of devices. This lack of experience has made security and privacy of smart devices a challenging factor for developers. Problems of Security Threats in Smart Devices Security threats in smart devices cause various essential problems for users of smart devices. These problems are related to leakage of content due to lack of security of smart devices, damage of devices due to virus attacks and risk of breach of personal and financial data of customers that is transferred over network (CUJO Smart Firewall, 2017). Relevant Technologies It is necessary to resolve above discussed challenges and problems of security threats in smart devices. To achieve this relevant technologies are required to use at developers extent. The effective relevant technologies that can be used for handling above discussed challenges and problems of security threats in smart devices are, use of encryption, anti-virus, firewall and security patches. Encryption is a type of cryptography and it is used to encrypt sensitive information that is transferred by users and developers from one device to another. It is an effective way to secure data of smart devices from hacking and phishing attacks. Another relevant technology to control security threats of smart devices is use of anti-virus. Anti-virus software has capability to detect and remove virus from these devices. Different virus attacks such as malware, DDoS attacks etc. are implemented by hackers, but if virus has installed into these devices then any virus attack can be controlled easily . Next relevant technology for resolving security threats of smart devices is firewall. It is an in-built software solution into operating system and it gives alert to user about unknown entity that has entered into system and at action of user, it can also block that vulnerable entity. In this way, by using these relevant technologies, security threats of smart devices can be managed (United States, 2017). Applications of Technologies These above discussed technologies have wide range of applications. Every individual and organization those are using smart devices or any other application of Information Technology, they can use above discussed technologies for security purposes (Fortune.com, 2017). Clarification about Vague Areas and Research Questions The security threats of smart devices are commonly encountered by IT users and they know about impacts of these security threats. But still there are some vague areas of security threats in smart devices and it is related to specific reasons of occurrence of security threats in devices. By developers various advanced security techniques are used, then why these security issues occur. Question 1: What is the effective way to resolve issue of security in smart devices? Answer: The most effective way to resolve issue of security threats in smart devices is to maintain security and privacy of database and network of these devices effectively by using advanced security techniques (Techopedia.com, 2017). Question 2: What is the reason of lack of Security in Devices? Answer: The major area of lacking of security in smart devices is area of development. The use of weak algorithms and less secure programming languages and tools lead to high level security threats in devices (Veracode, 2017). Discussion This segment of report is concerned with summarization of issue that has given in forum or blog that has used for making this report (Schaefer, 2017). Issues or Security Threats of Smart Devices discussed in Forum The main issues or security threats of smart devices that are addressed in this forum of report are Network Spoofing, Phishing Attacks and Unsecured Wi-Fi. Network Spoofing is a big security issue for smart devices and this technique of data theft is used by hackers to implement unauthorized data access from different networks. Under this technique, hackers set up fake access points and these points are similar to Wi-Fi Networks. It is a way to trap users by hackers (The State of Security, 2017). Phishing attack is also one of vulnerable security issues of smart devices. In phishing attacks, sensitive information of users is obtained by hackers and this information can be username, passwords, and other personal and financial information of users. It is very popular attack among cyber criminals (Fortune.com, 2017). To implement this attack, hackers use malicious software and fake emails with virus attachments. When user opens these emails then virus enters into their systems and access data from database. Next issue or security threat of smart devices is use of unsecured Wi-Fi. Wi-Fi is unsecured when no password is used to protect its access. In case of open Wi-Fi, anyone can access it without permission and hackers can misuse it to access user connected devices with this Wi-Fi (Searchsecurity.techtarget.com, 2017). Important Issues not addressed in Forum As we have discussed some main issues or security threats of smart devices in above segment that must be seriously considered by developers and users of smart devices to get prevention. But there is an essential issue that is not addressed in this forum i.e. Broken Cryptography. Hackers are now using advanced tools to broke security of cryptography and access data from databases. Impact of Security Issues on Real Life There is no doubt that above discussed security threats or issues of smart devices put bad impact on real life of its users. The major security threats that put influence over customers of smart devices are malware attacks, spyware and hacked cryptography (The Windows Club, 2017). Impact of Malware Attack Malware is most vulnerable attack implemented by hackers on databases and networks of users. It is a just small script of program sends by hackers on your system and after its implementation it can damage your system and database. It is bit difficult to control malware attack that is why security experts are hired to control malware attack (Security Intelligence, 2017). Impact of Spyware Attack Another impact of security threats of smart devices on rela life of its users is spyware. Spyware can be installed into systems for its tracking to get information regarding its whereabouts and patterns etc. (InfoSec Resources, 2017) Impact of Hacked Cryptography Cryptography technique of information security is hacked when less secured algorithms are used by app developers. Due to this weakness, hackers can easily hacked encrypted format of information and can use data for their purposes. These are some main issues or security threats of smart devices that put its bad influence on personal and business information of customers and they feel insecure to send data through these devices. Therefore, it is responsibility of developers of smart devices to be careful about these threats and must use security tools and techniques that can provide help to get rid of this problem (The Windows Club, 2017). Important Lesson Learnt from Discussion The important lesson that we have learnt from this whole discussion about security threats of smart devices is that security issues are getting more vulnerable and hackers are inventing new ways to hack our devices and systems. Therefore, for security professionals or developers, it is necessary to be aware about these issues of security and must use advanced security techniques and tools and strong programming algorithms to get prevention. Users purchase smart devices with surety of security and privacy of their sensitive information. But if this will not be provided to them by development companies of smart devices then their trust will be broken. That is why both at users and developers level security maintenance is required. Conclusion After this whole discussion we can say that smart devices can only be beneficial for users if these will maintain security of information stored into it. Therefore, it is responsibility of developers to use better security paradigms and also provide knowledge to users about security maintenance at their level. These will be better ways to handle security threats in smart devices and in other IT applications. References Security Intelligence. (2017). Smart Devices: Think Like a Hacker to Uncover Vulnerabilities. Retrieved 11 May 2017, from https://securityintelligence.com/smart-devices-hacker-vulnerabilities/ CUJO Smart Firewall. (2017). 4 Security Challenges Facing the Internet of Things - CUJO. Retrieved 5 April 2017, from https://www.getcujo.com/internet-of-things-security-device-cujo/challenges/ Kaspersky Lab United States. (2017). Kaspersky Personal Family Security Software. Retrieved 11 May 2017, from https://usa.kaspersky.com/internet-security-center/threats/mobile-device-security-threats#.WON5s2clHIU Inc.com. (2017). 7 Crazy 'Smart' Devices You Didn't Know You Needed. Retrieved 11 May 2017, from https://www.inc.com/edward-cox/7-crazy-smart-devices-you-didnt-know-you-needed.html Fortune.com. (2017). The 7 most useful smart home devices. Retrieved 11 May 2017, from https://fortune.com/2014/10/04/the-7-most-useful-smart-home-devices/ Techopedia.com. (2017). What is a Smart Device? - Definition from Techopedia. Retrieved 11 May 2017, from https://www.techopedia.com/definition/31463/smart-device Searchsecurity.techtarget.com.(2017). Phishing. Retrieved 11 May 2017, from https://searchsecurity.techtarget.com/definition/phishing The State of Security. (2017). 6 Common Phishing Attacks and How to Protect Against Them. Retrieved 11 May 2017, from https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/ The Windows Club. (2017). Security threats in Smart Devices and Privacy Issues. Retrieved 11 May 2017, from https://www.thewindowsclub.com/security-threats-smart-devices-privay-issues The Windows Club. (2017). Security threats in Smart Devices and Privacy Issues. Retrieved 11 May 2017, from https://www.thewindowsclub.com/security-threats-smart-devices-privay-issues Veracode. (2017). Smart Devices Pose Many Challenges to IoT Security Is Your Company Up to the Challenge? Retrieved 11 May 2017, from https://www.veracode.com/blog/2015/06/smart-devices-pose-many-challenges-iot-security-your-company-challenge-sw Schaefer, J. (2017). Smart Devices - What Makes Them Smart? | IoT For All. IoT For All. Retrieved 11 May 2017, from https://iot-for-all.com/smart-devices-what-makes-them-smart/ InfoSec Resources. (2017). Security Challenges in the Internet of Things (IoT). Retrieved 11 May 2017, from https://resources.infosecinstitute.com/security-challenges-in-the-internet-of-things-iot/#gref Fortune.com. (2017). The 7 most useful smart home devices. (2017). Retrieved 11 May 2017, from https://fortune.com/2014/10/04/the-7-most-useful-smart-home-devices

Monday, November 25, 2019

A critical review of literature on the importance of social media in branding The WritePass Journal

A critical review of literature on the importance of social media in branding 1.0 Introduction A critical review of literature on the importance of social media in branding ). On the contrary it can be said that more and more retailers and business are becoming increasingly aware of the social media and are waiting to exploit the potential that social marketing offers (Olivas-lujan, 2013) 1.1 Background Spend on social media by the businesses are on the rise. Recent study by the IAB (Internet Advertising Bureau) shows that in the first half of 2014 in the UK alone, there has been a rise of 53% in the spend on social media by businesses with a total contribution of  £242.5 million (Somerville, 2014). Another study by IAB on FMGC sector consisting of more than 4500 survey responses and 800 interviews showed that 90% of the customers would use social media to refer the brands to peers, 4 in 5 customers would buy products that have good social media coverage and 83% would be willing to try products that are popular in social media (Anon, 2013). Similarly, a research conducted by Mass Relevance that provides social media curation platform to clients found that 59% of the consumers will more likely trust a brand that has presence in the social media and 64% of the consumers interviewed have already made purchases based on social media presence and reviews (Chaney, 2012). Appendix 1 shows the social media advertising effects on consumers (Source: Neilsen Survey: Anon, 2012) 1.2 Motivation From the above, it can be understood that social media has a profound impact on the consumers’ choice of brands and that it is key to engage effectively with customers. There is a lot of literature that discusses about the social media impact on consumers, why businesses should engage with customers, exploiting social media to provide value add etc. The main aim of this research is to look into various key researches in this area and to provide a critical review on the literature. The critical review aims to see if: The problems are identified clearly The literature provides a balanced view There are gaps in the literature 1.3 Research Process The success of the research is admittedly determined by measuring the extent to which each of the research objectives is met. The following steps are followed during this research to ensure its success. These steps are as follows: Firstly, a background into the research and its motivations is given. Following this, the key literature in this area is thoroughly investigated. This is intended to ensure that all aspects of the research are identified and that the challenges or gaps in the current literature are clearly understood. Next, the literature is critically analysed to see if the problems are identified and if it provides a balanced view of the topic. It also looks into the research methodology to see if the methods used are consistent with the qualitative and quantitative methods and also checks for what has not been provided. Finally, this research concludes by providing a conclusion that is supported by evidence presented in the literature. It also makes recommendations where appropriate. In summary, this chapter has provided a brief overview of the research, addressed the key challenges or gaps in the literature and justified the need to conduct this research. This chapter has also set the background and motivations for the research in order to enable the reader to better understand the subsequent chapters. The central question for the research has addressed here, and the reader now also understands the problem statements that have led to this research. 2.0 Literature Review This research discusses about social media and its effect on branding and consumers. But what is social media? The term social media can be defined as â€Å" Many online tools that allow people with similar interests to share information, learn from others, or network in an open process. The information found on these sites is commonly referred to as ‘user-generated content’, which means anyone is able to post with minimal restrictions or oversight.†(Wilson, 2010) Drury (2007) discusses how marketers of various businesses can effectively engage in social media marketing. The paper gives a fairly comprehensive view on what social media is and the role of marketing in social media. It discusses about how social media can be monetised by the marketers. The paper lists out opportunities that can be tapped for commercial benefits and also emphasises on the mobile marketing strategy and describes the success criteria for measuring success. The paper however has the following drawbacks: It is very much general and has no qualitative or quantitative measures to define the success criteria. It gives a good overall picture but it would have been better if the context of the paper was more towards assessing the impact or the Return on Investment (ROI) of a specific sector or business. It lacks specific examples and also does not mention any strategy for implementation or even list challenges that organisations face while implementing good strategies for social media marketing. Michaelidou et al (2011) in their research discuss about social media marketing’s impact on small and medium B2B brands. They discuss in detail the adaption of social media networking as a marketing platform to be able to achieve the brand objectives and also the perceptions around the barriers of using social marketing networks. The research paper makes use of email surveys to understand the usage of social media by small and medium scale businesses that operate in the UK and the main drivers that motivate SMEs to adapt to the new channel of marketing. It clearly states the motivation of the research, giving appropriate background to the research and the method used for the research is depicted concisely. The research analyses the findings from the email survey and discusses the methods used for analysis. It provides a broad range of information and also clearly identifies the shortcomings in the business implementation of social media networking practices. It discusses how t hese pitfalls can be overcome and provides details for further improvement areas and scope for additional research in the future. The drawbacks of the paper are: Sample size: The sample size of the survey could have been more and also various other methods for obtaining the review could have been used. This would have ensured that the B2B base was thoroughly covered. Focus: The focus is on B2B businesses alone. It would have been interesting to see the results if the research was extended to B2C as well for small and medium scale enterprises. Some researches focus specifically on skills gap in digital marketing within specific industries. One such research concentrates on the communications industry (Royle and Laing, 2014). The research discusses the need for having the necessary skills in digital marketing arena and stresses on the growth and popularity of digital/social media marketing. The research explores the various gaps in the industry for digital marketing with a specific emphasis to communications sector and provides a best practice guide for the industry. It details the challenges that organisations face while implementing social media marketing and discusses the need to have evaluation criteria and metrics to critically analyse the success of social marketing strategies and campaigns within organisations. The paper talks about the key challenges that businesses face while trying to merge traditional marketing practices with that of social marketing. The rationale for the research is clearly mentioned and the li terature review is comprehensive. The conceptual framework is clearly detailed and the methodology used for developing the framework is precise. The research makes use of focus groups and interviews to be able to gauge the skill gap in the industry. The drawbacks of this research are: Limited sample size: The research could have used more samples to be able to analyse effectively the findings. Given that the research has already narrowed down by industry, it would have been good to get a more detailed view of the industry and a larger sample would have facilitated this. A study by Harvard Business Review (Edelman, 2010) discusses how the internet and the social marketing has changed not only the way businesses operate but also how consumers choose their products. It takes the reader through the funnel metaphor which was earlier being used by marketers to understand how consumers choose their products and how this has moved to a more open-ended approach whereby consumers no longer follow a methodical approach of selecting products. It stresses how important it is for brands to be able to connect with the consumers and studied the consumers’ decisions across five different industries namely automobiles, skincare, insurance, mobile telecommunications and electronics in three different continents. Based on the results of the study, it proposed a four-stage model that focuses on today’s consumers using social media for advocating products and also purchasing based on the reviews and advocacy received. The research takes the reader through t he entire customer journey and tells the businesses what it should not focus its energy and resources on. Providing statistical information about various surveys enables the businesses to identify the key areas that it should concentrate on to be able to build a good brand image online. Though the research is comprehensive it lacks in the following: Framework: It does not suggest what needs to be done and a framework for implementing those. The key focus is on what not to be done and it leaves it to the businesses to work on the best strategy. Sample size and analysis: The research does not disclose the sample size or indicate clearly the analysis method used to come to the conclusion. This section worked on identifying key research in the literature and also provided a critical review of each of the researches identified. 3.0 Conclusion Though there is a lot of literature on various aspects including but not limited to effects of social media on small and medium scale enterprises, identification of skill gaps in social media with specific emphasis to certain industries, general study on implementation challenges, perception of social media on businesses, barriers to adaptation of social media by businesses etc. it can be found that there is not much literature that specifically talks about a common framework for adapting to social media marketing along with the challenges that businesses might face and the evaluation criteria. Similarly while most of these researches make use of one or more methods for data collection, it is not very comprehensive. There is a gap in the current literature in terms of data collected from a wide range of sources using a bigger sample set. Given that technology has enabled a higher reach to customers, it would be good to get a larger sample to be able to effectively analyse the results . In many cases, the limitations of the research scope could be worked on to be able to get more information on the above mentioned areas. In short, it can be said that the social media marketing and the research around it are yet to attain the maturity level and there is a lot of scope for research that would aid businesses to effectively handle and manage social media marketing concerns and overcome challenges in a seamless and stress-free manner. 4.0 References Tuten, 2008: Advertising 2.0: Social Media Marketing in a Web 2.0 world, Greenwood publishing group. Qualman, 2012: Socialnomics: How social media transforms the way we live and do business, John Wiley Sons Livas-Lujan, 2013: Social Media in Strategic Marketing, Emerald Group publishing limited Somerville, 2014: 18 Digital Marketing Trends you may not have heard about, The Fresh Egg blog accessed at: freshegg.co.uk/blog/18-digital-marketing-trends-for-2014 Anon, 2013: IAB Social Media Effectiveness Research, IAB UK accessed at: iabuk.net/research/library/iab-social-media-effectiveness-research Chaney, 2012: Brands should use social media to engage consumers, amplify messages and promote trust, Digital intelligence today accessed at: http://digitalintelligencetoday.com/brands-should-use-social-media-to-engage-consumers-amplify-messages-and-promote-trust-survey-says/ Anon, 2012: State of the Media, The social media report, Neilsen Wilson, 2010: Social Media and Small Business Marketing, University Business Printing and press, USA Drury, 2007: Opinion Piece: Social Media: Should marketers engage and how can it be done effectively?, Journal of Direct, Data and Digital Marketing Practice Michaelidou et al, 2011: Usage, Barriers and measurement of social media marketing: An exploratory investigation of small and medium B2B brands, Elsevier Royle and Liang, 2014: The digital marketing skills gap: Developing a digital marketer model for communication industries, Elsevier Edelman, 2010: Branding in the digital age: You’re spending your money in all the wrong places, Harvard Business Review

Thursday, November 21, 2019

US politics Essay Example | Topics and Well Written Essays - 750 words

US politics - Essay Example The United States still pollutes more than any other nation, and still represents the epitome of a consumerist society: producing little more than nothing, and consuming a large quantity of the world’s goods. The Environmentalist movement, even though it has achieved mainstream status, remains unable to show progress in curbing these trends. In fact, the mainstream status of the movement puts the movement itself in some jeopardy. That is, the Environmentalist movement in the United States has been quite â€Å"successful†, but not successful in the way many of the original environmentalists and conservationists had hoped: commercially successful, which many believe has corrupted the movement beyond repair. American Environmentalism took root in the open frontiers of the untamed West in the 19th century when principles of conservation ran contrary to abusive practices in mining and railroad construction. The role of the environment in American politics changed in 1901 when President Roosevelt instituted practices, like the Reclamation Act, to conserve land and resources across the country (Silveira, 2003). The split between conservation (using resources efficiently) and preservation (not using resources at all) fragmented the environmentalist movement in the 20th century, which provided a source of diversity among these groups. Early environmentalism was an upper-class movement to preserve resources for recreation (Silveira, 2003). Modern Environmentalism primarily began in 1962 with the publication of Silent Spring by Rachel Carson, which detailed the devastation of industry on nature. Taken with other social movements in the 1960s, the Environmentalist movement became one more means to infuse particular values into society as a whole. However, rather than attempting social change during this time, Environmentalists sought government intervention to protect the

Wednesday, November 20, 2019

Social Network as Facebook is Not Safe from Hackers Essay

Social Network as Facebook is Not Safe from Hackers - Essay Example Social networks such as Facebook result to the interconnection of millions of people from all over the world thus bringing diversities and similarities in close interactions. In this regard, Facebook offers an effective opportunity for people from different backgrounds to identify their similarity and therefore converge through chart rooms and groups or pages; for instance, the Facebook group of people opposed to the Revolutionary Armed Forces of Colombia is one such example of how people of similar interests converge on social media. However, this joining of different people with similar interests makes such individuals in those groups vulnerable to different forms of abuses at the same time. Hackers with ill intentions of compromising and sabotaging information communication systems have emerged and greatly undermined the reliability and security of information, and Facebook, like other communication systems, is not safe from hacker activities. Hacking refers to the unwarranted acc ess of other people’s online databases and directories; hackers are targeting personal information in personal Facebook accounts such as passwords, confidential data, secrets, among other things, with malicious intentions whose sole purpose is to harm the victims, thus breaching individual privacy on social networks. With the growing number of internet users, the highly porous nature of information systems, and features of service providers including the social networking sites that make it possible for unwanted users to access other peoples’ databases, social networks as Facebook are not safe from hackers. There are numerous reasons and explanations why Facebook is not safe from hackers; for instance, nowadays there is increasing use of social network for business transactions and advertising, even though the platform is strictly meant for personal relationships (Lu?sted 10). In this case, hackers abuse social network as businesses by stealing vital information such a s company trade secrets or operational blue prints thereby compromising the businesses. Investigations into cybercrimes are curtailed by the mere fact that the internet has transformed the world into a global village thus allowing hackers to commit crimes from any location of the world and go scot-free. Cyberspace security has also been largely compromised by the increasing internet population in addition to the aspect of anonymity that allows users to disguise themselves on social networks such as Facebook using fake account details while seeking to commit cybercrimes. New inexperienced Facebook users are particularly vulnerable to hacker attacks because they are yet to learn how to utilize the complex security features of the internet on the platform. Hackers can take advantage of the privileged personal information stolen from private accounts on Facebook to cause untold havoc and damage to personal and business relations; for instance, hackers may impersonate individuals to comm it cybercrimes or damage reputations of individuals. Perhaps the most serious consequence suffered by victims of hacking activities is the loss or destruction of vital information thereby compromising the entire systems network. Research Statistics provide evidence of the hackers and hacker activities, for instance, a recent research by the Privacy Clearing House reports indicate that over 1oo million records have been compromised since February 2005, and over 80 million cases were due to web hacking attacks. A similar research at Acunetix reports findings that about 75% of cyberspace attacks occur at the web

Monday, November 18, 2019

How are the principles that underlie the process of motivational Essay

How are the principles that underlie the process of motivational interviewing relate to social change and community development - Essay Example ient that the interviewer is attentive, empathetic and genuinely desires to be a facilitator of attitudinal and behavioural change to improve the socio-psychological adjustment of the client and improve their general lifestyle. Hence, the interviewer becomes, essentially, a positive change agent for the client (Miller, Yahne and Tonigan 2003). Individuals, within a social context, that have maladaptive or unhealthy behaviours detract from the development of a cohesive and well-functioning community. This is why enacting long-term behaviour change and improving socio-psychological adjustment is so critical, as deviant behaviours, anti-social attitude, or other negative behaviours can pose risk or danger to a broader community population. In an idealistic society, the goal is to ensure that all society members within a community have an attitude that promotes teamwork, alliance and partnership, though this is not a tangible reality in many societies throughout the world. This essay explores the processes of motivational interviewing and its potential benefits or contributions to achieving social change and developing positive communities with an emphasis on how MI is properly facilitated to achieve these desirable and encouraging advantages. The main premise of MI is to maintain a non-adversarial attitude with the client, be completely without confrontational stance and illustrate complete non-judgmental behaviours (Miller and Rollnick 2002). The premise of MI is to break-down the barriers which are driving client uncertainty and ambivalence that allow for continuation of unhealthy or maladapted behaviours. In motivational interviewing, the mentor serves as a resource for assisting the client in resolving the factors that drive ambivalence without being directly persuasive. The interviewer serves only as a director that facilitates discussion about what is revealed within the client’s inner world and provides therapeutic discourse to nurture the client’s

Friday, November 15, 2019

Development Of A Digital Diary Project

Development Of A Digital Diary Project Maintaining information about the person has been troublesome business for mankind lately as he was being introduced to hundred of new persons in his day to day life. Compiling information about the students in a school and college might be really a rarely willing job. Our project aims to those jobs for maintaining information of the people so we named it as a Digital Diary project. As soon as the program is being executed user just need to follow the instruction and have the information entered to the software then software manage the information being entered and save them for the future reference of the user. Though lots of information management software is presently available in market, this is the initial step and would be updated in the days to come. Introduction: Computer is an advanced/modern electronic device, which takes raw data as input then processes these data as per given instruction then gives output (result) and store in for the future references. It is also a problem-solving machine, which can processes both numerical and non numerical information. It is a totally user dependent device. It has no its own brain. So it cannot think its own. C is the general purpose, structured programming language of computer consisting of terms that resemble algebraic expressions. Designed as other high level structured programming languages such as Pascal and Fortran, C has got additional features that allows it to be used at a lower level computer languages. This flexibility let the C be featured as system programmer or applications programmer. C is characterized by the ability to write very concise source programs which are virus free in nature so the programmed designed in C language has got purity and perfection. Though with the help of small instruction and extensive library functions enhance the basic instruction and encourage its user to write additional library function on their own. Such A programming language code has been adapted for the effectual running of our program, Digital Diary. Digital Diary aims for the storage of the personnel details. This Diary helps as the remainder of person name his/her home address, phone number, email address etc. People gives propriety to looks now a days so a bit of graphics has been added to the content rather than making old fashioned black n white look. Every single effort has been done to add aura to the program and to attract lots of users as possible. As been discussed this program is being build in C laboratory or C program so it doesnt consist of any viruses that may effect the computer but is 100% free from those harming worms and bugs. With the help of this program people can save all his/her friends group and contact for the future references. Objectives and Scopes The few objectives of this program are listed as follows: Main objectives of this program is to aid users from memorizing all those names of owns contact address. Users can easily add the contact detail in the program so have increase efficiency in the user working procedure. To minimize the work loads of office personnel in school, colleges and offices by letting them get rid of the problem of memorizing the piles name of students or coustomers. To convey message to software developing companies about the potential of software developers in Nepal. As Loads of software are present currently for managing the database system but those software are bulky and occupies large amount of storage disk size and are tedious and need trained man power for effective use but the Digital Dairy designed by us is very much simple and cost low disk space and unskilled man power with nominal knowledge of English can accomplish thorough the program. So the office needing customized type software can easily have these software installed for their management. Methodology: Preliminarily we have done survey through out the Kathmandu valley to know about the colleges and schools who might required our software being installed and found lots of colleges having their own MS Access designed management software and for the database management. But some school near remote areas till this date have been using the old fashioned database management so we aim our project to those remote schools and have planned to develop this software. Then we started making basic workflow plan for effective completion of the project. We made the system analysis and designed basic framework to aid in our work. We then started the job of coding of the program for overall management of database of persons which include name of the person, address of the person, his/her email id and telephone number, roll no or reference number. Options like searching the required database by strings were made into effect in the program for easy location of the database of the person. Option like adding and deleting record along with modification option were present in the program for effective availability. Though the coding was done, there were lots of errors in the program, so for the tracking of the bugs in the program debugging were done and then tested for multiple times till the desired output is obtained. When testing and debugging were done the program was finally ready to be used or being distributed. Task to be completed Duration System Analysis 2 days Designing 1 week Coding 1 week Testing and Debugging 3 days Expected Output As for the title suggest, this Digital Diary supports for the proper maintaining of the database. It helps the user to have full record of the people he has been with along with their contact address, phone numbers, email id and reference number. This program also helps in inbuilt search for the required data base. The expected output here is being discussed along with some screenshots of the program. Initially after the program is being executed it shows the name of the institution using it along with the address of the institution. Below the Name of the institution it publishes the name of the publishers followed by list of software developers. When we enter any key the page would be executed to the second page where option are being given using switch system. Option for add remove, modify, search, list are being executed here. The database management page would appear as follows. Here name, roll no, Faculty, telephone number, address email id would be printed. Through which we have to pass the value. Every time after adding contact the confirmation dialogue will be appeared asking for continuing or else. Conclusion This project is based upon C programming so we had add our best effort to implement all the knowledge we have gained so far in C programming. Working on this project had enhanced our knowledge and skills in C and will surely help us in future. Thus, we hope Digital Diary be a great success.

Wednesday, November 13, 2019

Computers in Homeland Security :: Department of Homeland Security Technology

Computers in Homeland Security The DHS, Department of Homeland Security, uses a color coded system for informing the general public of what state of readiness the country should be in, in case of a terrorists threat. The system they use is a five color system, with each color representing a different step in readiness. Green means low risk of terrorist attacks, blue is Guarded, or general risk of a terrorist attack, yellow means elevated, or significant risk of a terrorist attack. Orange means high risk of an attack, while red means severe risk of an attack. Today the country is always on either orange or red. Since President Bush has been in office the country itself, has been on high alert of an attack (http://www.whitehouse.gov/news/releases/2002/03/20020312-5.html). As part of this paper I took a poll of how many people know about the use of homeland securities and to also see if they knew the meaning of the colors of our alert system. -Question 1 was if a person knew if computers were used in homeland security. -Question 2 was if they knew what the colors used in homeland security meant. Names Question #1 Question # 2 Jack yes yes Jill no no Tom no no Andrew yes yes Edrick yes yes Mike yes yes Dustin no no Jorge yes yes Shayla no no Malika no no Cheriene no no Martha yes yes Chris no no Tim no no Tomas no no Jude no no Jimmy yes yes Kristina yes yes Jackie no no Tosin yes yes Warren yes yes Sam yes yes Cory no no Marshall no no As technology has increased the importance of computers being involved with homeland security has increased significantly. They have started to use computers for ways to check passenger baggage. Notice how when someone goes through an airport they have to walk through several metal detectors. These detectors are run by computers in order to check what people have on them. Another way computers are used is a complex system of watch lists and security triggers. These lists are what the airport security uses to decide who to take under heavy watch. Since more that 600 million people fly a year. They hope that a computer system called CAPPS 2 can help to check about 5% of the people who fly each year. Another thing that Homeland security uses computers for is surveillance. This is probably the most used place for computers in Homeland Security. With surveillance, there has been a big discovery in cyber optics.