Information Technology Essays (Examples)

Studyspark

Study Document Study Document

Web 2 0 And Online Studio Education

Pages: 6 (1931 words) Sources: 5 Document Type:Research Paper Document #:53632130

… of content and collaboration over the web (Loannao, 2018). The internet, since then, started becoming the reservoir of knowledge, giving free access to information and educational resources (Loannao, 2018). Because of these developments, online courses and online education began and were incorporated in different educational fields as … eradicating the issue of distance in pursuing education (Bender, 2006). Higher education systems, especially the architectural and design courses, are moving towards integrating technology, transforming the traditional format of studying, but the studio courses have remained constant with the traditional style of education (Bender, 2006). Since distance … changed in order to incorporate the new social, economic, and technological changes (Pasin, 2017). Educational practices have changed due to the integration with technology, proving successful and efficient with the learning procedure and teaching style.
Traditional Design Studio is the kind of teaching environment that has a … (Nottingham, 2014).
Conclusively, as the……

References

References

Bender, D. M. (2006). Using Online Education Technologies to Support Studio Instruction. Educational Technology and Society.

Kurt, S. (2009). An analytic study on the traditional studio environments and the use of the constructivist studio in the architectural design education. Procedia Social and Behavioral Sciences, 401-408.

Loannao, O. (2018). Opening up design studio education using blended and networked formats. International Journal of Educational Technology in Higher Education.

Nottingham, A. (2014). Reshaping design education: teaching graphic design online and onsite. The University of Melbourne.

Pasin, B. (2017). Rethinking the Design Studio-Centered Architectural Education. A Case Study at Schools of Architecture in Turkey. The Design Journal.

Siddiqi, A. A. (2002). ARCHITECTURAL DESIGN STUDIO PROJECTS AND THE CHARADES OF CURRICULUM. The 6th Saudi Engineering Conference, KFUPM. Architecture Department, College of Environmental Design, KFUPM Dhahran.

Studyspark

Study Document Study Document

TikTok Platform And Application Walkthrough

Pages: 4 (1080 words) Sources: 5 Document Type:Essay Document #:92988115

… personalization for all its users. The end-users get recommendations based on their view history and the complementors, i.e., content creators and advertisers get information on the latest trends for targeting their content. This system of the network works efficiently because each set of the user affects the ……

References

Works-Cited List

Nieborg, David B., and Thomas Poell. "The platformization of cultural production: Theorizing the contingent cultural commodity." New Media & Society, vol. 20, no. 11, 2018, pp. 4275-4292.

Nieborg, David B., and Anne Helmond. "The political economy of Facebook’s platformization in the mobile ecosystem: Facebook Messenger as a platform instance." Media, Culture & Society, vol. 41, no. 2, 2018, pp. 196-218.

Plantin, Jean-Christophe, et al. "Infrastructure studies meet platform studies in the age of Google and Facebook." New Media & Society, vol. 20, no. 1, 2016, pp. 293-310.

Poell, Thomas and David Nieborg and José van Dijck. "Platformisation". Internet Policy Review 8.4 (2019). Web. 7 Mar. 2020.

Tiwana, Amrit. "The Value Proposition of Platforms." Platform Ecosystems, 2014, pp. 61-69.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case … cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element ins the operations of any given country because of today’s information age. The significance of cyberspace in a country’s operations is evident in its use at the operational level of modern warfare. At the … complex international problems in today’s world. Cyber espionage refers to the practice of obtaining secrets without the permission of the owner/possessor of the information.[footnoteRef:2] While it is a form of cyberattack, there is a proposition that cyber espionage is an acceptable state behavior. [1: Magnus Hjortdal, “China’s … 4, no. 2 (2011):1] [2:……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services … Archives and Records Administration (2016), it was found that “the VA has a large volume of unscheduled records, particularly those residing in electronic information systems.” In that regard, therefore, it would be prudent to implement a robust electronic records management system. Aziz, Mohammad, Mokhtar & Ambari (2017) … life cycle” (10733). The authors further observe that EDRMS ought to be considered critical infrastructure when it comes to the protection of valuable information and the efficient utilization of the same at the organizational or agency level. It therefore follows that a robust, efficient, and effective records … the records that the agency handles happen to be extremely sensitive – effectively meaning that it would be imperative to ensure that the data/information contained therein is not accessed……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… have become the greatest issue facing 21st century ethical leadership. Indeed, public and private sector organizations of all types routinely collect consumers’ personal information and use it in ways that are violative of the spirit if not the letter of the law, and the proliferation of the … Although the concept lacks definitional clarity, the term “privacy” is generally used to refer to “a person's ability to control access to personal information” (Cantor, 2006). More specifically, the right of privacy is defined by Black’s Law Dictionary (1990) as “The right to be let alone; the … with which the public is not necessarily concerned” (p. 1195).
In theory, then, privacy therefore refers to the capacity to determine what personal information is available to others. In practice, however, few people besides some miserable hermits living in caves can be regarded as enjoying this ability … protections, though, there has been……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

How technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms … turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital … taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Supply Chain Management In Ethiopia

Pages: 4 (1174 words) Sources: 4 Document Type:Article Review Document #:76860957

… industry, the garment industry, wood industry, textile, leather, food, and ceramics industries.
The biggest challenge facing these firms is simply the fact that technology has not advanced in the developing world to assist with supply chain integration. The firms interviewed across the nine different industries were all … with supply chain integration. The firms interviewed across the nine different industries were all still using telephone, verbal instructions and letters to relay information. There was no use of digital technology to facilitate and enhance communication. Data collection was all paper based, which means that information processing is extremely slow compared to what is possible in the developed world.
Thus, the biggest challenge is not that supply chain integration … that the tools needed to facilitate it are lacking in the developing world. The developed world may take it for granted that communication technology and information systems have advanced to the……

References

References

Afshan, N. (2013, December). The performance outcomes of dimensions of supply chain integration: A conceptual framework. Business: Theory and Practice, 14(4), 323.

Georgise, F. B., Thoben, K. D., & Seifert, M. (2014). Supply chain integration in the manufacturing firms in developing country: An Ethiopian case study. Journal of Industrial Engineering, 2014.

Prensky, M. (2001). Digital natives, digital immigrants part 1. On the horizon, 9(5), 1-6.

Spiess, J., T'Joens, Y., Dragnea, R., Spencer, P., & Philippart, L. (2014). Using big data to improve customer experience and business performance. Bell labs technical journal, 18(4), 3-17.

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

… method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This … scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its … Facebook accounts and their bank credit/debit cards so that the buying of eatables is made hassle-free. There are various benefits to using this technology at large scale events since getting the attendees' entries is made quickly, which can be scanning 20 people per minute at the gate … since getting the attendees' entries……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

...Information technology Introduction
The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapons of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. With the killing of several crewmen and the wounding of several more, the USS Cole Bombing was in reality just one more terrorist incident in an already growing line of attacks (both foreign and domestic) that revealed a pressing need for a counterproliferation strategy. When the USS Cole was hit in Aden harbor, the FBI began focusing on suspects who would later be tied to 9/11 and the spread of terror cells throughout the Middle East.[footnoteRef:2] It was not, of course, the only incident to spark that focus—but it was an important factor in the development of a new counterproliferation strategy that would inevitably become the plan……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Project Management Plan To Upgrade Hospital Equipment

Pages: 13 (3960 words) Sources: 5 Document Type:response paper Document #:39596809

… OF PROJECT CHARTER

Hospitals in the U.S. lose a total of $8.3 billion a year because of older and outdated communication methods and technology, according to a recent study published by the Ponemon Institute and Imperva (Healthcare Business, 2013). The primary cause for those losses was decreased … was decreased productivity of doctors and nurses, as well as longer patient stays. These days, healthcare providers have access to more electronic patient information, and that means it should be easier to share data within and outside the hospital to improve the quality of care and speed … care and speed up care delivery. Among the clinicians surveyed, each wastes an average of 45 minutes per day because of outdated communication technology. These were the biggest time wasters identified in the poll. This problem goes beyond only communication equipment and affects all kinds of outdated … identified in the poll. This……

References

References

Healthcare Business. (2013, May 15). Report: Hospitals waste billions using outdated technology. Retrieved from Health Care Business Tech:  http://www.healthcarebusinesstech.com/outdated-technology-wastes-money/ 

Lee, J. (2016, April 14). Top five risks of using outdated technology. Retrieved from Meridian:  http://www.whymeridian.com/blog/top-5-risks-of-using-outdated-technology 

Moran, W. J. (2019). Hospital Fundraising Best Practices. Retrieved from The Moran Company:  https://morancompany.com/hospital-fundraising-best-practices/ 

Parand, A., Dopson, S., A. R., & Vincent, C. (2014). The role of hospital managers in quality and patient safety: a systematic review. BMJ Open.

Pohjola, T., Suhonen, M., Mattila, K., & Meretoja, R. (2016). The work done in healthcare projects . Journal of Nursing.

Ponemon Institute. (2013). The Economic and Productivity Impact of IT Security on Healthcare. Imprivata.

Join thousands of other students and

"spark your studies".