How can the computer system described in the story

Assignment Help Computer Network Security
Reference no: EM131039873

Assignment Brief

Learning outcomes

- Collect, analyse, present and comment upon business to be examined in data this assessment

- Identify the relationship between computer hardware and software.

- Describe the most common types of software programmes and explain how they may be used to enhance management functions.

Assignment Tasks

Your assignment consists of one task (worth 100% of the total marks for the
assignment).

Assignment Task 1: Essay

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage." Discuss this statement by following the tasks below.

Select TWO computing news stories of your choice, published anytime between 01/02/2016 and 15/04/2016. Analyse these using Actor Network Theory.

Your analysis should be written as an essay, and include the following points:

- Describe why Actor Network Theory is a relevant theory for studying computing.

- Name and categorise the actants in your stories. Describe how they are "acting" upon other actants in the assemblage. Include the connection between the hardware and software actants, as well as other categories of actants.

- Discuss how the actions of the software actants can enhance management functions within the computing news stories.

- How can you link your analysis to some of the larger issues/questions raised due to the constant use of computing within modern society. Discuss some of advantages/disadvantages of contemporary computing. To achieve this, compare and contrast the viewpoints of a range of theorists and critics explored throughout the module.

- Conclude by summarising how your answers relate to the statement "Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage".

- Add an appendix which includes definitions of at least four computing terms or concepts used in your assignment. One of these terms MUST be software.

Suggested essay structure

Cover Page
Assignment title, module code, student name, student number and submission date.

Table of Contents

A list of headings and page numbers.

Introduction (about 10% of the essay)

Refer to the statement your essay is designed to explore:

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage."

- Explain how you intend to address the statement.
- What issues/topics are you going to explore?
- What argument will you make?

Main body (about 80% of the essay)

- Introduce your theory - what is Actor Network Theory, define key terms and give
2-3 reasons why it is suitable for studying computing.

- Computing News Story 1 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 1 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

Computing News Story 1 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Computing News Story 2 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 2 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

- Computing News Story 2 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Outline the issues raised by how these actants are acting, e.g. is Big Data being generated? If so, what does Morozov say are the issues? Are human behaviours being adjusted - if so, what does Nicholas Carr say about that, e.g. effect of Internet on our ability to deeply think? Do the stories describe an innovative combination of technology plus free time? If so, what does Clay Shirky say about that in his theory of "cognitive surplus"? Each week we will look at yet another author/theorist, and what they consider the "big issues" of computing - use these as much as possible to create debate and counter-debate. ie include some techno-optimistic views and some techno-pessimistic views and include the views of some of the relevant theorists/authors discussed in the module (or some others that you have found with your own research)

Use a chain of paragraphs to EXPLORE AND DEVELOP your ideas/argument.

You will probably have 3 to 4 main ideas. Break each idea into paragraphs, possibly 2 per idea. Perform substantial amounts of analysis and point making in each paragraph.

In each paragraph the reader is asking you to explain:
- What is this paragraph about?
- What is your argument on this?
- What is your evidence? What does it mean?
- How does it link to the essay title?
- How does it link to the topic in the next paragraph?

It is not sufficient simply to describe a situation. Analysis and a critical approach are essential. Charts, diagrams and tables can be used to reinforce your arguments.

Conclusion (about 10% of the essay)
Refer back to the statement your essay is designed to explore " Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage". How can we identify if an actant is acting? Did you see that happening in your stories? Was A.N.T. an appropriate theory to use for your analysis? Did you meet the challenge you set yourself in your introduction?

- Do not introduce any NEW material here.

- Summarise your ideas/argument (you might also have done this in your
introduction)

- Restate what you consider to be the main points

- Make it clear why those conclusions are important or significant.

- In your last sentence: link your conclusions or recommendations back to the title.

References

All the named sources you have quoted from or reproduced in your report. Please use The Harvard System for all references. Details for the Harvard System can be found on the student portal.

Reference no: EM131039873

Questions Cloud

Achieve the organization larger mission : A leader who works to fulfill subordinates' needs and goals as well as to achieve the organization's larger mission; the needs of others are placed above the leader's own needs.
State and explain storage management strategies : What are the operations of page replacement algorithm?
Who is your member of congress : Select a controversial topic, such as gun control, climate change, reproductive rights, or animal rights, and go online to find two organizations representing different sides of the debate (for example, the NRA at hnp://www.nra.org and the Brady C..
Explain the importance of feedback and rewards : Explain the importance of feedback and rewards. Also, give an example of a time in which you received feedback (positive or negative) and/or rewards. Explain what that did for you in terms of motivation. Please utilize your text to further emphasize ..
How can the computer system described in the story : Identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural - describe and analyse how some of these actants are acting on each other
Personal interests for the good of the group : A leader who motivates people to transcend their personal interests for the good of the group; characterized by the ability to bring innovation.
What is the banc one problem : How should Banc One manage its interest rate exposure and what role do derivatives play in its interest-rate risk management?Hint:
Introduce new weight loss drug to the market : Metabical wants to introduce a new weight loss drug to the market. As indicated in the Metabical: Positioning and Communications Strategy for a New Weight Loss Drug case, Barbara Printup must make several decisions. She must determine a positioning s..
Examine an organization : Your task in this assignment is to examine an organization that has had a problem/issue with managing diversity. Within the context of this assignment, "problem" can be defined as charges of discrimination-gender, race, age, disabilities, sexual o..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  What are guest-hopping attacks

Identify the security advantages of cloud-based solutions.

  Explain how significant is wireless networking to your

question 1 how important is wireless networking to your company? would your company improve the salesservice process

  Define and describe voip and virtual private networks and

1. list and describe the principal internet services.2. define and describe voip and virtual private networks and

  Can this many users be supported under circuit-switching

A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 20 Mbps, must share a link of capacity 100 Mbps.

  Why do modern encryption algorithms use keys?

Why do modern encryption algorithms use keys?

  What is net neutrality and why is it so important

What is Net Neutrality and why is it so important for organizations today?

  The main stream discussion of cybersecurity journals

Cyberwarfare has been in the main stream discussion of cybersecurity journals and conference proceedings for a few years. The Stuxnet attack in the cyberspace has taken many of politicians and security professionals into much deeper concerns of th..

  Cryptography problem

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret

  What if ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd