How can the computer system described in the story

Assignment Help Computer Network Security
Reference no: EM131039873

Assignment Brief

Learning outcomes

- Collect, analyse, present and comment upon business to be examined in data this assessment

- Identify the relationship between computer hardware and software.

- Describe the most common types of software programmes and explain how they may be used to enhance management functions.

Assignment Tasks

Your assignment consists of one task (worth 100% of the total marks for the
assignment).

Assignment Task 1: Essay

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage." Discuss this statement by following the tasks below.

Select TWO computing news stories of your choice, published anytime between 01/02/2016 and 15/04/2016. Analyse these using Actor Network Theory.

Your analysis should be written as an essay, and include the following points:

- Describe why Actor Network Theory is a relevant theory for studying computing.

- Name and categorise the actants in your stories. Describe how they are "acting" upon other actants in the assemblage. Include the connection between the hardware and software actants, as well as other categories of actants.

- Discuss how the actions of the software actants can enhance management functions within the computing news stories.

- How can you link your analysis to some of the larger issues/questions raised due to the constant use of computing within modern society. Discuss some of advantages/disadvantages of contemporary computing. To achieve this, compare and contrast the viewpoints of a range of theorists and critics explored throughout the module.

- Conclude by summarising how your answers relate to the statement "Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage".

- Add an appendix which includes definitions of at least four computing terms or concepts used in your assignment. One of these terms MUST be software.

Suggested essay structure

Cover Page
Assignment title, module code, student name, student number and submission date.

Table of Contents

A list of headings and page numbers.

Introduction (about 10% of the essay)

Refer to the statement your essay is designed to explore:

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage."

- Explain how you intend to address the statement.
- What issues/topics are you going to explore?
- What argument will you make?

Main body (about 80% of the essay)

- Introduce your theory - what is Actor Network Theory, define key terms and give
2-3 reasons why it is suitable for studying computing.

- Computing News Story 1 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 1 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

Computing News Story 1 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Computing News Story 2 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 2 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

- Computing News Story 2 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Outline the issues raised by how these actants are acting, e.g. is Big Data being generated? If so, what does Morozov say are the issues? Are human behaviours being adjusted - if so, what does Nicholas Carr say about that, e.g. effect of Internet on our ability to deeply think? Do the stories describe an innovative combination of technology plus free time? If so, what does Clay Shirky say about that in his theory of "cognitive surplus"? Each week we will look at yet another author/theorist, and what they consider the "big issues" of computing - use these as much as possible to create debate and counter-debate. ie include some techno-optimistic views and some techno-pessimistic views and include the views of some of the relevant theorists/authors discussed in the module (or some others that you have found with your own research)

Use a chain of paragraphs to EXPLORE AND DEVELOP your ideas/argument.

You will probably have 3 to 4 main ideas. Break each idea into paragraphs, possibly 2 per idea. Perform substantial amounts of analysis and point making in each paragraph.

In each paragraph the reader is asking you to explain:
- What is this paragraph about?
- What is your argument on this?
- What is your evidence? What does it mean?
- How does it link to the essay title?
- How does it link to the topic in the next paragraph?

It is not sufficient simply to describe a situation. Analysis and a critical approach are essential. Charts, diagrams and tables can be used to reinforce your arguments.

Conclusion (about 10% of the essay)
Refer back to the statement your essay is designed to explore " Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage". How can we identify if an actant is acting? Did you see that happening in your stories? Was A.N.T. an appropriate theory to use for your analysis? Did you meet the challenge you set yourself in your introduction?

- Do not introduce any NEW material here.

- Summarise your ideas/argument (you might also have done this in your
introduction)

- Restate what you consider to be the main points

- Make it clear why those conclusions are important or significant.

- In your last sentence: link your conclusions or recommendations back to the title.

References

All the named sources you have quoted from or reproduced in your report. Please use The Harvard System for all references. Details for the Harvard System can be found on the student portal.

Reference no: EM131039873

Questions Cloud

Achieve the organization larger mission : A leader who works to fulfill subordinates' needs and goals as well as to achieve the organization's larger mission; the needs of others are placed above the leader's own needs.
State and explain storage management strategies : What are the operations of page replacement algorithm?
Who is your member of congress : Select a controversial topic, such as gun control, climate change, reproductive rights, or animal rights, and go online to find two organizations representing different sides of the debate (for example, the NRA at hnp://www.nra.org and the Brady C..
Explain the importance of feedback and rewards : Explain the importance of feedback and rewards. Also, give an example of a time in which you received feedback (positive or negative) and/or rewards. Explain what that did for you in terms of motivation. Please utilize your text to further emphasize ..
How can the computer system described in the story : Identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural - describe and analyse how some of these actants are acting on each other
Personal interests for the good of the group : A leader who motivates people to transcend their personal interests for the good of the group; characterized by the ability to bring innovation.
What is the banc one problem : How should Banc One manage its interest rate exposure and what role do derivatives play in its interest-rate risk management?Hint:
Introduce new weight loss drug to the market : Metabical wants to introduce a new weight loss drug to the market. As indicated in the Metabical: Positioning and Communications Strategy for a New Weight Loss Drug case, Barbara Printup must make several decisions. She must determine a positioning s..
Examine an organization : Your task in this assignment is to examine an organization that has had a problem/issue with managing diversity. Within the context of this assignment, "problem" can be defined as charges of discrimination-gender, race, age, disabilities, sexual o..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the means attackers use to compromise systems

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

  Data encryption as a method of protecting data

Which one of the following statements is most correct about data encryption as a method of protecting data

  Identify part of attack that exploited a local vulnerability

Identify one part of the attack that exploited a local vulnerability. This is the most common type of vulnerability exploited in the attack.

  Logical and physical topographical layout of planned network

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  Identify the three different kinds of access control

Identify the three different kinds of access control, which one most resembles a Windows OS environment, military. What are the three authentication factors. Provide an example for each one.

  Discuss ways to reduce risk in the network

Discuss 2 ways to reduce risk in the network. Who do you think is responsible for keeping the network safe to the administrator, the users, or both? Why

  Describes the characteristics and motivations of the threat

Describes the characteristics and motivations of the threat. Details, as much as possible, how the attack progressed through each phase of the Cyber Kill Chain.

  Personal information security through public wi-fi

Write paper on Personal information security through public Wi-Fi

  Analyze ing solution for providing security

Read the case study titled "ING Life". Analyze ING's solution for providing security to determine if the solution is adequate or inadequate

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  Describe data link control

Describe data link control

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd