How can the computer system described in the story

Assignment Help Computer Network Security
Reference no: EM131039873

Assignment Brief

Learning outcomes

- Collect, analyse, present and comment upon business to be examined in data this assessment

- Identify the relationship between computer hardware and software.

- Describe the most common types of software programmes and explain how they may be used to enhance management functions.

Assignment Tasks

Your assignment consists of one task (worth 100% of the total marks for the
assignment).

Assignment Task 1: Essay

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage." Discuss this statement by following the tasks below.

Select TWO computing news stories of your choice, published anytime between 01/02/2016 and 15/04/2016. Analyse these using Actor Network Theory.

Your analysis should be written as an essay, and include the following points:

- Describe why Actor Network Theory is a relevant theory for studying computing.

- Name and categorise the actants in your stories. Describe how they are "acting" upon other actants in the assemblage. Include the connection between the hardware and software actants, as well as other categories of actants.

- Discuss how the actions of the software actants can enhance management functions within the computing news stories.

- How can you link your analysis to some of the larger issues/questions raised due to the constant use of computing within modern society. Discuss some of advantages/disadvantages of contemporary computing. To achieve this, compare and contrast the viewpoints of a range of theorists and critics explored throughout the module.

- Conclude by summarising how your answers relate to the statement "Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage".

- Add an appendix which includes definitions of at least four computing terms or concepts used in your assignment. One of these terms MUST be software.

Suggested essay structure

Cover Page
Assignment title, module code, student name, student number and submission date.

Table of Contents

A list of headings and page numbers.

Introduction (about 10% of the essay)

Refer to the statement your essay is designed to explore:

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage."

- Explain how you intend to address the statement.
- What issues/topics are you going to explore?
- What argument will you make?

Main body (about 80% of the essay)

- Introduce your theory - what is Actor Network Theory, define key terms and give
2-3 reasons why it is suitable for studying computing.

- Computing News Story 1 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 1 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

Computing News Story 1 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Computing News Story 2 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 2 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

- Computing News Story 2 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Outline the issues raised by how these actants are acting, e.g. is Big Data being generated? If so, what does Morozov say are the issues? Are human behaviours being adjusted - if so, what does Nicholas Carr say about that, e.g. effect of Internet on our ability to deeply think? Do the stories describe an innovative combination of technology plus free time? If so, what does Clay Shirky say about that in his theory of "cognitive surplus"? Each week we will look at yet another author/theorist, and what they consider the "big issues" of computing - use these as much as possible to create debate and counter-debate. ie include some techno-optimistic views and some techno-pessimistic views and include the views of some of the relevant theorists/authors discussed in the module (or some others that you have found with your own research)

Use a chain of paragraphs to EXPLORE AND DEVELOP your ideas/argument.

You will probably have 3 to 4 main ideas. Break each idea into paragraphs, possibly 2 per idea. Perform substantial amounts of analysis and point making in each paragraph.

In each paragraph the reader is asking you to explain:
- What is this paragraph about?
- What is your argument on this?
- What is your evidence? What does it mean?
- How does it link to the essay title?
- How does it link to the topic in the next paragraph?

It is not sufficient simply to describe a situation. Analysis and a critical approach are essential. Charts, diagrams and tables can be used to reinforce your arguments.

Conclusion (about 10% of the essay)
Refer back to the statement your essay is designed to explore " Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage". How can we identify if an actant is acting? Did you see that happening in your stories? Was A.N.T. an appropriate theory to use for your analysis? Did you meet the challenge you set yourself in your introduction?

- Do not introduce any NEW material here.

- Summarise your ideas/argument (you might also have done this in your
introduction)

- Restate what you consider to be the main points

- Make it clear why those conclusions are important or significant.

- In your last sentence: link your conclusions or recommendations back to the title.

References

All the named sources you have quoted from or reproduced in your report. Please use The Harvard System for all references. Details for the Harvard System can be found on the student portal.

Reference no: EM131039873

Questions Cloud

Achieve the organization larger mission : A leader who works to fulfill subordinates' needs and goals as well as to achieve the organization's larger mission; the needs of others are placed above the leader's own needs.
State and explain storage management strategies : What are the operations of page replacement algorithm?
Who is your member of congress : Select a controversial topic, such as gun control, climate change, reproductive rights, or animal rights, and go online to find two organizations representing different sides of the debate (for example, the NRA at hnp://www.nra.org and the Brady C..
Explain the importance of feedback and rewards : Explain the importance of feedback and rewards. Also, give an example of a time in which you received feedback (positive or negative) and/or rewards. Explain what that did for you in terms of motivation. Please utilize your text to further emphasize ..
How can the computer system described in the story : Identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural - describe and analyse how some of these actants are acting on each other
Personal interests for the good of the group : A leader who motivates people to transcend their personal interests for the good of the group; characterized by the ability to bring innovation.
What is the banc one problem : How should Banc One manage its interest rate exposure and what role do derivatives play in its interest-rate risk management?Hint:
Introduce new weight loss drug to the market : Metabical wants to introduce a new weight loss drug to the market. As indicated in the Metabical: Positioning and Communications Strategy for a New Weight Loss Drug case, Barbara Printup must make several decisions. She must determine a positioning s..
Examine an organization : Your task in this assignment is to examine an organization that has had a problem/issue with managing diversity. Within the context of this assignment, "problem" can be defined as charges of discrimination-gender, race, age, disabilities, sexual o..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data

  How does anti-virus software detect malware

What is a malware? List four harm that malware can cause to an information system. How does Anti-virus software detect malware. What is the difference between Polymorphic and Metamorphic malware. Explain in details the difference between worm and vir..

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  It security audit planning

Use the Web to conduct research on IT Security Audit Planning. Write a report which explains the Scope Definition

  Calculate the value of the symmetric key

Explain your solutions for avoiding such attacks. Calculate the value of the symmetric key and the values of R1 and R2 in the Diffie-Helman Protocol for the set of given values.

  Determine what the risk to an organisation

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles.

  Build on the systems development selected in week 2 and

build on the systems development selected in week 2 and design 1 to 2 user interfaces. explain how the user interface

  A digital evidence and computer crime and technology and law

Digital Evidence, Computer Crime, Technology and Law- As digital criminals have become more sophisticated, security-related incidents have become substantially more diverse in nature, and their impact on society is increasingly more destructive.

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  Principles and theory of security management

so far this week we have discussed three types of security: retail, institutional, and industrial. I think that there is a little bit of confusion still about what the differences are between each of these types of security because we are looking..

  Effects of security controls

The three effects of security controls are prevention, detection, and recovery. Briefly explain how these effects are related to the known good state

  New product development and product enhancement teams

As the new technical communications manager for International Gadgets (IG), you have developed a good idea of the various internal and external audiences for communications across the enterprise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd