Information Systems and Computer Applications
INFORMATION SYSTEMS AND COMPUTER APPLICATIONS
Introduction to the World of Computers
Importance of Data mining-blog
http://www.rsrit.com/blog/2015/07/04/why-data-mining-is-so-important/
In recent times data mining has gained recognition facilitated byfirms’ need to derive the relationships between various aspects oftheir business operations and the trends in the market. Data miningenables companies to critically analyze and relate information abouttheir customer needs, the level of competition and other markettrends more easily. This article provides crucial provides knowledgeon data mining which is a less complex process but an application ofartificial intelligence and computer interpretations to provide keybusiness information from a collection of data.
Email security-guardian post
https://digitalguardian.com/blog/what-email-security-data-protection-101
The increased use of email as a medium of communication in thebusiness world and among individuals has led to informationinsecurity. The medium has provided an avenue for the spread ofmalware, spam or even phishing attacks that lead to loss of privateinformation to unauthorized people or entry into organizationsnetwork to access private information that can be used to destroy acompany’s reputation. I chose this example since it highlights thedangers of using emails and the security measures available to ensurethe safe use of email address.
Computer Hardware and software
Express article- the reinvention of intel computer card
http://www.express.co.uk/life-style/science-technology/751320/ces-2017-intel-compute-card-tiny-computer
The dynamism in the hardware industry today is increasing, and theneed to minimize the size of the computers and mobile phones is onthe rise. The introduction of compute card by intel Corporation whichcan perform basic needs of a computer in addition to being able toconnect to several other computers within a single hub provides agood example to such emerging trend in the hardware industry. I chosethis topic as it supports Moore’s law on computer miniaturizationprocess which is still valid today as new and small hardwarecomponents are being invented to facilitate portability.
Elements of a mobile software application- 3scale article
https://www.3scale.net/2014/04/five-elements-software-engineering-mobile-part-1/
The mobile software application is a fast growing market with newsoftware applications and updates on the existing applications beingmade on a daily basis. However, in programming mobile applications,it is essential to have a sound understanding of the mobile phonesoftware compatibility, the target market of the software, securityissues, and functionality of the application and ease of use. I chosethis article as it provides insight to the market and technicalinformation to software programmers and Information Technologystudents on how to develop and sell the best mobile applications
The Internet and World Wide Web
Online banking-Article on cnron.com
http://smallbusiness.chron.com/importance-ebanking-business-26188.html
The business environment today is information based, and adoption ofInternet banking provides a competitive edge to the companies.Adoption of internet banking enables employees to access fast, secureand accurate routine banking services such as funds transfer,deposits making and elimination of errors in cash handling. Inauditing process, the internet banking services provide accurate andreliable data on cash management. I chose this topic as it providesknowledge to business organizations on the importance of security andspeed in transactions process. Also, the relevance of the bankinginformation data in auditing is presented in the article.
Wearable Article-the Best Fitbit to Buy
https://www.wareable.com/fitbit/what-fitbit-tracker-should-you-buy
Human health and fitness have been of great concern in recent times.Regular exercise and monitoring of how the exercise helps in botfitness are the major business of Fitbit Company. The companyprovides a range of products that facilitates accurate capture ofinformation on various training aspects like the heartbeat, number ofstrides made and the fat reduction rate. Products are available for avariety of parameters measurement, and although priced differently,generally the prices are fare and affordable. I chose this article asin integrates the importance of training, body fitness, healthyliving and use of technology in monitoring these body aspects.
Network and Internet Security
Journal on Virtual Network Security- Posted on Springer link
https://link.springer.com/article/10.1186/s13174-014-0015-z
The organization of the interlinked computers in a businessorganization creates efficiency in communication, sharing ofinformation and consultations across all functions. Internalnetworking minimizes the cost of communication and maintenance ofmaintenance of technologies in internal communication. However,virtual networking requires maximum security across the network,continuous maintenance and checks as it is prone to cybercrime andaccess to private information to the organization which can lead toloss of critical information to competitors. I chose this article asit highlights the importance of virtual networking in businessorganizations and the threats thereof.
A blog posted on Bayometric.com-Increasing the Importance ofBiometric Security
https://www.bayometric.com/increasing-importance-of-biometric-security/
With increased technology, physical security and control in businessorganizations have been on the rise. Passwords to protect keyinformation and secure physical premises are no longer enough toprotect an organization and its business intelligence information.Biometric identification has been the modern secure and safe way ofensuring the security of information and secluded areas within anorganization. The choice of this topic was necessitated by the needto show the link between the between innovations in the securityaspects of information and access to private premises and how thesehave been made possible by increased technological advancement.
Computer Privacy and Security
A Journal on System and Methods of Destruction
https://www.google.com.cy/patents/WO2008004120A2
Mobile phones, iPhones, and tablets have today become more portablewith increased data storage and fast processing speed. Given this,individuals use these devices to store and share private information.The trend has seen most people use mobile applications to performtasks previously possible through computers leading to increasedreliability of the devices on daily lives. However, security of thestored data in the devices when for example lost or misplaced hasbeen a major concern to individuals. The journal was chosen toprovide as it provides a system to facilitate tracking anddestruction of private data in stolen or misplaced gadgets.
An article on Computer Security
http://its.ucsc.edu/security/training/intro.html
There is increased computer crime where people want to harvest andsell email address and passwords or want to send scam mails toindividuals or create traffic to steal private information. Thishappens to computers that are not properly protected by strongpasswords or automatically updating software. To curb this, computerowners should share encrypted mails, use modern technologies inprotecting personal computers to ensure controlled access to privateinformation stored in the computers. This article was chosen since itprovides caution on computer security and the measures taken to curbthe situation.
Intellectual Property Rights and Ethics
An article on Stopfake.gov-Misappropriation on IntellectualProperty
https://www.stopfakes.gov/article?id=What-Intellectual-Property-Misappropriation-Constitutes-a-Crime
Intellectual property is not part of the physical owner which makesit difficult for individual to recognize when a violation of thatright has been done by a second party. The proof of this rests uponthe realization of the violation and investigations leading to aconfirmation of occurrence of such an act. The USA Congress anddifferent states have continuously enacted laws to protectintellectual rights and provide mitigations for any violation. Ichose this article since it provides encouragement to individuals tokeep investing on intellectual property as the law protects them fromtheft or misuse.
A blog Ethics on Media Manipulation
https://www.thebalance.com/the-ethics-of-magazine-photo-manipulation-in-the-media-2315338
The use of photo manipulation in magazines to generate sales in mediaadverts has been on the rise in recent times. This has beennecessitated by the need to create more appealing photos and messageto the target audience. However, photo manipulation is only allowedto the extent that the parties involved are not hurt by the actionsof the second part. The content of the photos and the adverts shouldnot violate the laws of the country. I chose this article since itcombines the ethics in photo manipulation and the extent to which itis accepted and the consequences of manipulation.
Health, Access, and the Environment
An Article on Workstation Ergonomics
https://www.onestopergonomics.com/pages/computer-workstation-ergonomics
Comfort in the workplace is paramount to the health of employees.Ergonomic design and computer posture are essential in ensuringemployee health and safety. Furniture used in computer assemblyshould also provide the necessary comfort to the computer user.Computer components such as the screen, ergonomic keyboard trays,arms rests are important. When choosing this ergonomic structure, thecost to be incurred has to be considered to ensure it is economical.I chose this topic as it provides employees with knowledge on healthmatters while using computers.
A blog-Green Computing
http://greencomputingisgood.blogspot.co.ke/2011/03/benefits-of-green-computing.html
Going green has been the current innovate way on how organizationshave embraced technology. Also, companies have realized benefits ofgoing green to public relations, reduced costs and lowering emissionsfrom manufacturing activities. Green computing in the applicationhelps in reducing overall environmental impact by adoptingtechnologies to lessen the impact on the environment. The rapidgrowth of technology has provided adequate alternatives to thecompanies to improve the environmental conservation. I chose thistopic as it provides the alternative ways in which companies canreduce impacts of their activities on their environment.
Emerging Technologies
Salesforce Blog-artificial Intelligence
https://www.salesforce.com/blog/2016/09/artificial-intelligence-helps-small-businesses.html
Technological advancement has improved the manner in whichorganizations analyze business information. Decision making has beenmade easy since accurate data is available from various applicationsoftware installed in computers. Also, artificial intelligence helpsin designing the structure of business to ensure marketcompetitiveness and improve sales. Virtually, they accommodate allbusiness operations but have the ability to narrow down to simpleexecutable tasks that managers can leverage on. I chose this topic asit highlights the importance of artificial intelligence andtechnology in business operations
Article on how Smart Home Works
http://home.howstuffworks.com/smart-home3.htm
Efficiency and comfort brought by the smart home applications cannotbe overlooked. Today many people are moving in jobs or on vacations.By use of technology, an individual can control all home appliancesincluding lighting and electronic appliances such as a television.Access to homes while away provides comfort in life in addition tothe safety involved in using smart home applications. From thecomfort of an office, employees can easily monitor their homes. Ichose this article as it highlights the importance and advantages ofsmart home applications.
References
Ergonomic Design for Computer Workstations – Ergonomic Computing ||OneStop Ergonomics. (2017). Onestopergonomics.com. Retrieved 1 April2017, fromhttps://www.onestopergonomics.com/pages/computer-workstation-ergonomics
Bays, L., Oliveira, R., Barcellos, M., Gaspary, L., & MauroMadeira, E. (2015). Virtual network security: threats,countermeasures, and challenges. Journal Of Internet Services AndApplications, 6(1).
Bortenschlager, M., & Willmott, S. (2017). The Five ElementsOf Software Engineering For Mobile (Part 1). 3scale APIManagement Platform. Retrieved 1 April 2017, fromhttps://www.3scale.net/2014/04/five-elements-software-engineering-mobile-part-1/
Charara, S. (2017). Best Fitbit 2017: How to choose the righttracker for your goals. Wareable. Retrieved 1 April 2017,fromhttps://www.wareable.com/fitbit/what-fitbit-tracker-should-you-buy
Ergonomic Design for Computer Workstations – Ergonomic Computing|| OneStop Ergonomics. (2017). Onestopergonomics.com.Retrieved 1 April 2017, fromhttps://www.onestopergonomics.com/pages/computer-workstation-ergonomics
How Artificial Intelligence Is Helping Small Businesses Today.(2017). Salesforce Blog. Retrieved 1 April 2017, fromhttps://www.salesforce.com/blog/2016/09/artificial-intelligence-helps-small-businesses.html
How Artificial Intelligence Is Helping Small Businesses Today.(2017). Salesforce Blog. Retrieved 1 April 2017, fromhttps://www.salesforce.com/blog/2016/09/artificial-intelligence-helps-small-businesses.html
Increasing Importance of Biometric Security. (2017).Bayometric. Retrieved 1 April 2017, fromhttps://www.bayometric.com/increasing-importance-of-biometric-security/
Introduction to Computer Security. (2017). Its.ucsc.edu.Retrieved 1 April 2017, fromhttp://its.ucsc.edu/security/training/intro.html
Moore, M. (2017). CES 2017 – Intel may have just COMPLETELYreinvented the computer. Express.co.uk. Retrieved 1 April2017, fromhttp://www.express.co.uk/life-style/science-technology/751320/ces-2017-intel-compute-card-tiny-computer
Patent WO2008004120A2 – System and method for data destruction.(2017). Retrieved 1 April 2017, fromhttps://www.google.com.cy/patents/WO2008004120A2
Retrieved 1 April 2017, from Patent WO2008004120A2 – System andmethod for data destruction. (2017). Google Books. Retrieved 1 April2017, from https://www.google.com.cy/patents/WO2008004120A2
The Ethics of Magazine Photo Manipulation. (2017). TheBalance. Retrieved 1 April 2017, fromhttps://www.thebalance.com/the-ethics-of-magazine-photo-manipulation-in-the-media-2315338
The Importance of E-banking in Business. (2017).Smallbusiness.chron.com. Retrieved 1 April 2017, fromhttp://smallbusiness.chron.com/importance-ebanking-business-26188.html
What Intellectual Property Misappropriation Constitutes a Crime? |STOPfakes.gov – Intellectual Property Rights Resources andAssistance. (2017). Stopfakes.gov. Retrieved 1 April 2017,fromhttps://www.stopfakes.gov/article?id=What-Intellectual-Property-Misappropriation-Constitutes-a-Crime
What is Email Security? Data Protection 101. (2017). DigitalGuardian. Retrieved 1 April 2017, fromhttps://digitalguardian.com/blog/what-email-security-data-protection-101
Why Data Mining Is So Important. (2017). RSRIT.Retrieved 1 April 2017, fromhttp://www.rsrit.com/blog/2015/07/04/why-data-mining-is-so-important/
No related posts.