Technology Impact Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

...Technology impact Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services … would also have embed audit trails.
E: Measurement Plan
There are several metrics that I would use to measure the effectiveness of the technology following its implementation. It is important to note that of key relevance on this front is whether the technology solution is technically sound, whether it was achieved on budget, and whether it was completed on time. Two of the metrics, i.e. adherence … the metrics, i.e. adherence to schedule and budget would come in handy in the evaluation of implementation success. The technical soundness of the technology solution, on the other hand, would be of great relevance in the measurement of the effectiveness of the technology following implementation. In this case, the concern would be whether the technology solution has achieved……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

… and software. Also, a key feature of cloud computing is its capacity to diminish the financial burden that is placed on firms in technology adoption. The authors also demonstrate that cost reduction can be achieved through the capability to shift from a CAPEX cost structure to an … capabilities devoid of incurring the expenses associated with enforcing these systems and applications within their own IT divisions.
Attaran, M. (2017). Cloud Computing technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International technology and Information Management, 26(1), 112 – 137.
In recent times, cloud computing has emanated as a significant technology that could contribute to the operational efficacy of an IT platform through the provision of infrastructure and software solutions for the entire IT … computing model can render numerous instantaneous advantages to companies, including the eradicated necessity for maintaining a server, no need for setting……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security … the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer … Filip, 2010). Internal information security auditing enhances the likelihood of implementation of suitable security measures for averting such breaches and reducing their adverse impact.
Security risks
Two classes of risks exist, against which corporate information systems require protection: logical and physical. The latter, more to do with … dealing with central information systems.……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Internet Influence On Adolescents

Pages: 5 (1568 words) Sources: 6 Document Type:Essay Document #:37510468

How Internet Addiction impact Teens Health
Introduction
The hypothesis of this study is that the Internet influence on adolescence can be negative in terms of mental, social … if Internet engagement is not moderated.
This research is important because more and more studies are showing that teenagers are getting addicted to technology, to mobile devices, to social media, and that they have not developed important communication skills needed for the real world. Thus, they are … However, the study was limited by the fact that it only looked at those three variables and did not include others that might impact the young person’s level of loneliness or depression—such as family life, support network, religious or philosophical beliefs, socio-economic status and so on. It ……

References

References

Agarwal, A. K., Verma, A., & Agarwal, M. (2017). Internet victimization and depression among adolescents, 14(3), 60-62.

Cheung, J. C. S., Chan, K. H. W., Lui, Y. W., Tsui, M. S., & Chan, C. (2018). Psychological well-being and adolescents’ internet addiction: A school-based cross-sectional study in Hong Kong. Child and Adolescent Social Work Journal, 35(5), 477-487.

Festinger, D. S., Dugosh, K. L., Clements, N., Flynn, A. B., Falco, M., McLellan, A. T.,& Arria, A. M. (2016). Use of the internet to obtain drugs without a prescription among treatment-involved adolescents and young adults. Journal of child & adolescent substance abuse, 25(5), 480-486.

Görzig, A. (2016). Adolescents’ viewing of suicide-related web content and psychological problems: Differentiating the roles of cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 19(8), 502-509.

Law, Y. M. (2019). Family factors and internet addiction among junior secondary school students in Hong Kong. Hong Kong Polytechnic University, Doctoral Dissertation.

Sajeev Kumar, P., Prasad, N., Raj, Z., & Abraham, A. (2015). Internet addiction and substance use disorders in adolescent students-a cross sectional study. J. Int. Med. Dent, 2, 172-179.

Studyspark

Study Document Study Document

Social Media S Negative Effect On Emotions

Pages: 8 (2307 words) Sources: 9 Document Type:Essay Document #:82396601

… explores different works and studies to show that the frequent use of social media can affect life satisfaction, happiness, well-being, and self-esteem.
Negative impact of social media and self-esteem
A recent publication by Thomas Goldhar on the web revealed that the frequent use of social media results ……

References

Works cited

Berry, Natalie, et al. \\\\\\\\\\\\"Social media and its relationship with mood, self?esteem and paranoia in psychosis.\\\\\\\\\\\\" Acta Psychiatrica Scandinavica 138.6 (2018): 558-570.

Conick, Hal. Marketing\\\\\\\\\\\\'s Ethical Line Between Social Media Habit and Addiction. American Marketing Association, 2017.

Do?an, U?ur. \\\\\\\\\\\\"Effects of social network use on happiness, psychological well-being, and life satisfaction of high school students: Case of facebook and twitter.\\\\\\\\\\\\" Egitim ve Bilim 41.183 (2016), 217-231.

Goldhar, Thomas. The Negative Impacts that Social Media Have On Our Self-Esteem. Medium.com, 2018. Web.

Hu, Elise. \\\\\\\\\\\\"Facebook makes us sadder and less satisfied, study finds.\\\\\\\\\\\\" In Isaac Gillman Online lives, offline consequences: Professionalism, information ethics and professional students. Interface on the Internet 9.1 (2009) 484-485.

Konnikova, Maria. “How Facebook Makes Us Unhappy.” Annals of technology. The New Yorker, 2013. Web.

Kross, Ethan, et al. \\\\\\\\\\\\"Facebook use predicts declines in subjective well-being in young adults.\\\\\\\\\\\\" PloS one 8.8 (2013): e69841.

Orben, Amy, Tobias Dienlin, and Andrew K. Przybylski. \\\\\\\\\\\\"Social media’s enduring effect on adolescent life satisfaction.\\\\\\\\\\\\" Proceedings of the National Academy of Sciences 116.21 (2019): 10226-10228.

Studyspark

Study Document Study Document

Critical Information Literacy

Pages: 1 (280 words) Sources: 2 Document Type:Essay Document #:59120688

… in cybersecurity. The hard defenses like firewalls and antivirus protection can be bypassed by innovative attackers, but training against cyberattacks will limit their impact. By protecting passwords, using strong passwords, and using two-factor authentication it is possible to defend against social engineering cyberattacks, however they may come.
……

References

References

Breda, F., Barbosa, H., Morais, T. (2017) Social engineering and cyber security. Conference Paper.

Kaspersky (2020) What is social engineering? Kaspersky Labs. Retrieved April 15, 2020 from  https://usa.kaspersky.com/resource-center/definitions/social-engineering 

Studyspark

Study Document Study Document

TikTok Platform And Application Walkthrough

Pages: 4 (1080 words) Sources: 5 Document Type:Essay Document #:92988115

… app is considered significant in the technological market. It also wields infrastructural power over its third-party developers and can have a significant economic impact based on……

References

Works-Cited List

Nieborg, David B., and Thomas Poell. "The platformization of cultural production: Theorizing the contingent cultural commodity." New Media & Society, vol. 20, no. 11, 2018, pp. 4275-4292.

Nieborg, David B., and Anne Helmond. "The political economy of Facebook’s platformization in the mobile ecosystem: Facebook Messenger as a platform instance." Media, Culture & Society, vol. 41, no. 2, 2018, pp. 196-218.

Plantin, Jean-Christophe, et al. "Infrastructure studies meet platform studies in the age of Google and Facebook." New Media & Society, vol. 20, no. 1, 2016, pp. 293-310.

Poell, Thomas and David Nieborg and José van Dijck. "Platformisation". Internet Policy Review 8.4 (2019). Web. 7 Mar. 2020.

Tiwana, Amrit. "The Value Proposition of Platforms." Platform Ecosystems, 2014, pp. 61-69.

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

Clinical Decision Support and Electronic Health Records
Introduction
Information technology has revolutionized nearly every aspect of life, from how people recreate to how they work. This is no less true in the field … into this issue with respect to HIPAA, privacy/confidentiality and security issues; and how patient safety, the nursing role and electronic medical records are impact.
Clinical Informatics Concepts in the 21st Century
Controlling the flow of information to promote efficiency, security, and safety is the number one priority … of need for continuity of care, which necessarily depends upon continuity of information (Kleib & Nagle, 2018).
Database Systems and Analytics and Their impact on Nursing Research
Database systems require that nurses understand the concept of analytics as well. Nursing research is no different from any other … be the case that as technological advances are made, the need to be able to handle, process, interact with, command,……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

How technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms … turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital … taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Join thousands of other students and

"spark your studies".