Describe why actor network theory is a relevant theory

Assignment Help Computer Networking
Reference no: EM13881098

Assignment Task: Essay

"An actant in modern computing does not act in isolation." Discuss.

To achieve this:

Select TWO computing news stories of your choice, published anytime between 01/09/2015 and 01/02/2016. Analyse these using Actor Network Theory.

Your analysis should be written as an essay, and include the following points:

• Describe why Actor Network Theory is a relevant theory for studying computing.

• Name and categorise the actants in your stories. Describe how they are "acting" in the assemblage.

• Discuss how these actions can enhance management functions.

• Outline what larger issues/questions these actions raise. To achieve this, compare and contrast the viewpoints of a range of theorists and critics explored throughout the module.

• Conclude by summarising how your answers relate to the statement "An actant in modern computing does not act in isolation."

Deliverables

You will submit a single word processed document to Turnitin, of between 1350-1650 words.

Reference no: EM13881098

Questions Cloud

What unique problems underlie cross-cultural communication : What unique problems underlie cross-cultural communication? What are some common barriers to effective communication
Find the maximum temperature in the wire : A copper wire, 5 mm in diameter and 15 ft long, has a voltage drop of 0.6 volts. Find the maximum temperature in the wire if the ambient air temperature is 25°C and the heat transfer coefficient h is 5.7 Btu/hr · ft2 · F.
First lincoln bank agreed to defer all payments : 1.At January 1, 2013, Rothschild Chair Company, Inc., was indebted to First Lincoln Bank under a $20 million, 10% unsecured note.
Determine the total budgeted cost for the project : Estimate the cost for each activity, using the schedule and schedule for web based reporting system project - Determine the total budgeted cost for the project.
Describe why actor network theory is a relevant theory : Describe why Actor Network Theory is a relevant theory for studying computing. Name and categorise the actants in your stories. Describe how they are "acting" in the assemblage.
What kind of analysis might the board undertake : Apply the six decision-making steps presented in the chapter to the town's deci- sion. What objectives might the town pursue in making its decision? What addi- tional information would the planning board need in carrying out the various steps? Wha..
Create blog to which they will post observation of marketing : Create a Blog to which they will post their observations of marketing strategies and tactics. These can be current marketing events they have read about or observed in their professional or personal lives and that they can write as if they were an..
What characteristic describes of a virtual corporation : What characteristic describes each component of a virtual corporation?
Estimate the heat loss per hour per foot : Heat loss from an insulated pipe, a standard schedule 40, 2-in. steel pipe (inside diameter 2.067 in. and wall thickness 0.154 in.) carrying steam is insulated with 2 in. of 85% magnesia covered in turn with 2 in. of cork. Estimate the heat loss p..

Reviews

Write a Review

Computer Networking Questions & Answers

  Prototype interface design for a dss application

As an analyst, pretend that you have been charged with the task of redesigning the interface for the student enrollment system at your college. Based on your research and readings, what type of prototyping interface design approach would you recom..

  Give three network addresses to satisfy constraints

Subnet 3 is required to support up to 16 interfaces. Give three network addresses (of the form a.b.c.d/x) which satisfy these constraints.

  Explaining reconnaissance tools

Write down some popular reconnaissance tools?

  Assignment understanding of virtualization technology

Compare and contrast the Big 3 hypervisor options available in the market on the basis of factors such as: Features

  Who is kevin matnick?

Who is Kevin Matnick?

  What is the type or name of the message

The TCP or UDP port that a VoIP protocol uses must be kept open in a firewall so that the traffic can pass through. In this same file, what, TCP or UDP port is used in Frame 1

  What happened in an emergency before cell phones

What happened in an emergency before cell phones

  Describe how a user could discover that his isp is doing

Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VOIP system when those packets are going through this ISP's routers. Describe how a user could discover that his ISP is doing this

  In the previous unit you learned about the importance of a

in the previous unit you learned about the importance of a well-designed and constructed user experience in the

  Youre logged on locally to a users computer and your

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Explain the usage of your acl and is part of process

the network and has asked you to design the appropriate security to prevent unwanted traffic and to prevent illegal activities from occurring

  What windows server 2012 service and applications offer ipv6

What is the primary reason IPv6 has not completely replaced IPv4

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd