How can the computer system described in the story

Assignment Help Computer Network Security
Reference no: EM131039873

Assignment Brief

Learning outcomes

- Collect, analyse, present and comment upon business to be examined in data this assessment

- Identify the relationship between computer hardware and software.

- Describe the most common types of software programmes and explain how they may be used to enhance management functions.

Assignment Tasks

Your assignment consists of one task (worth 100% of the total marks for the
assignment).

Assignment Task 1: Essay

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage." Discuss this statement by following the tasks below.

Select TWO computing news stories of your choice, published anytime between 01/02/2016 and 15/04/2016. Analyse these using Actor Network Theory.

Your analysis should be written as an essay, and include the following points:

- Describe why Actor Network Theory is a relevant theory for studying computing.

- Name and categorise the actants in your stories. Describe how they are "acting" upon other actants in the assemblage. Include the connection between the hardware and software actants, as well as other categories of actants.

- Discuss how the actions of the software actants can enhance management functions within the computing news stories.

- How can you link your analysis to some of the larger issues/questions raised due to the constant use of computing within modern society. Discuss some of advantages/disadvantages of contemporary computing. To achieve this, compare and contrast the viewpoints of a range of theorists and critics explored throughout the module.

- Conclude by summarising how your answers relate to the statement "Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage".

- Add an appendix which includes definitions of at least four computing terms or concepts used in your assignment. One of these terms MUST be software.

Suggested essay structure

Cover Page
Assignment title, module code, student name, student number and submission date.

Table of Contents

A list of headings and page numbers.

Introduction (about 10% of the essay)

Refer to the statement your essay is designed to explore:

"Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage."

- Explain how you intend to address the statement.
- What issues/topics are you going to explore?
- What argument will you make?

Main body (about 80% of the essay)

- Introduce your theory - what is Actor Network Theory, define key terms and give
2-3 reasons why it is suitable for studying computing.

- Computing News Story 1 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 1 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

Computing News Story 1 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Computing News Story 2 - identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural
Computing News Story 2 - describe and analyse how some of these actants are acting on each other (the push/pull of actants - when an actant ‘acts' on another actant, how does this change/modify the behaviour of the actant being ‘acted upon')

- Computing News Story 2 - how can the computer system described in the story be seen to enhance management - whether of self, or a business etc

- Outline the issues raised by how these actants are acting, e.g. is Big Data being generated? If so, what does Morozov say are the issues? Are human behaviours being adjusted - if so, what does Nicholas Carr say about that, e.g. effect of Internet on our ability to deeply think? Do the stories describe an innovative combination of technology plus free time? If so, what does Clay Shirky say about that in his theory of "cognitive surplus"? Each week we will look at yet another author/theorist, and what they consider the "big issues" of computing - use these as much as possible to create debate and counter-debate. ie include some techno-optimistic views and some techno-pessimistic views and include the views of some of the relevant theorists/authors discussed in the module (or some others that you have found with your own research)

Use a chain of paragraphs to EXPLORE AND DEVELOP your ideas/argument.

You will probably have 3 to 4 main ideas. Break each idea into paragraphs, possibly 2 per idea. Perform substantial amounts of analysis and point making in each paragraph.

In each paragraph the reader is asking you to explain:
- What is this paragraph about?
- What is your argument on this?
- What is your evidence? What does it mean?
- How does it link to the essay title?
- How does it link to the topic in the next paragraph?

It is not sufficient simply to describe a situation. Analysis and a critical approach are essential. Charts, diagrams and tables can be used to reinforce your arguments.

Conclusion (about 10% of the essay)
Refer back to the statement your essay is designed to explore " Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfil the aims of the assemblage". How can we identify if an actant is acting? Did you see that happening in your stories? Was A.N.T. an appropriate theory to use for your analysis? Did you meet the challenge you set yourself in your introduction?

- Do not introduce any NEW material here.

- Summarise your ideas/argument (you might also have done this in your
introduction)

- Restate what you consider to be the main points

- Make it clear why those conclusions are important or significant.

- In your last sentence: link your conclusions or recommendations back to the title.

References

All the named sources you have quoted from or reproduced in your report. Please use The Harvard System for all references. Details for the Harvard System can be found on the student portal.

Reference no: EM131039873

Questions Cloud

Achieve the organization larger mission : A leader who works to fulfill subordinates' needs and goals as well as to achieve the organization's larger mission; the needs of others are placed above the leader's own needs.
State and explain storage management strategies : What are the operations of page replacement algorithm?
Who is your member of congress : Select a controversial topic, such as gun control, climate change, reproductive rights, or animal rights, and go online to find two organizations representing different sides of the debate (for example, the NRA at hnp://www.nra.org and the Brady C..
Explain the importance of feedback and rewards : Explain the importance of feedback and rewards. Also, give an example of a time in which you received feedback (positive or negative) and/or rewards. Explain what that did for you in terms of motivation. Please utilize your text to further emphasize ..
How can the computer system described in the story : Identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural - describe and analyse how some of these actants are acting on each other
Personal interests for the good of the group : A leader who motivates people to transcend their personal interests for the good of the group; characterized by the ability to bring innovation.
What is the banc one problem : How should Banc One manage its interest rate exposure and what role do derivatives play in its interest-rate risk management?Hint:
Introduce new weight loss drug to the market : Metabical wants to introduce a new weight loss drug to the market. As indicated in the Metabical: Positioning and Communications Strategy for a New Weight Loss Drug case, Barbara Printup must make several decisions. She must determine a positioning s..
Examine an organization : Your task in this assignment is to examine an organization that has had a problem/issue with managing diversity. Within the context of this assignment, "problem" can be defined as charges of discrimination-gender, race, age, disabilities, sexual o..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd