Architecture and Design Implications for Data Usage

Comparisons between the architecture alternatives covered in readings and the two schools

In both cases, the architecture allows entry of data at one point and the output of the computed data (information) at another point. In both cases, data are cleansed to ensure that data computed are free from missing data and other errors. In both cases, there are special identifiers used to identify the entries. These identifiers are unique, and they ensure there is no data redundancy. In both cases, there is a repository, which is a central store for data collected. It is from this repository that data are searched and extracted (De Chaves, Uriarte & Westphall, 2011).

Evaluation of the alternatives

It would be prudent to adopt an architecture that will satisfy the data usage needs of the merged organization (Loshin, 2008). The college and school were previously independent, thus had different data usage needs. The system being used in the community college manages students information. Besides, it has the traditional accounting, inventory, payroll, and human resources components. The features included in this architecture are good but lack customization.

Besides, the traditional features make it unfit for the merged organization. The system being used in the technical school is better than the one being used in the community college. This system has been customized by students to satisfy the needs of their data usage. The system has better applications that have been customized over time. If it is adopted by the new institution (after merging the two), then it can efficiently serve the institution and ensure proper data usage. Both systems can also be replaced with a commercial off-the-shelf (COTS) system. The COTS systems are sold by software vendors who design software. They are customized to satisfy the needs of a client.

Recommendation for the alternative

The system being used by the technical school could have been a perfect alternative were it not for its support and compatibility challenges. A commercial off-the-shelf (COTS) system would be the most likely alternative to meet the data usage needs of the merged organization. This would be bought from software vendors, and it will not solve the challenges that were experienced with the systems in the two institutions. The COTS system would be customized to meet the needs of the organization (De Chaves et al., 2011).

The customization would be done by the data usage requirements. These requirements are student information, human resources, payroll, and accounting systems. Also, the COTS system would not have compatibility, support, and maintenance challenges. The system would be used, in the merged organization, to meet the needs of students, personnel, and stakeholders. The COTS system to be adopted must be chosen wisely because this is a new organization with enhanced data usage needs different from those in previously independent schools and colleges.

Potential benefits and challenges associated with adopting the COTS system

Implementing the COTS system would meet the data usage needs of the merged organization. The implementation process would also ensure that all stakeholders are involved, thus its full adoption and utilization (Loshin, 2008). The students information, payroll, human resources, and accounting information would be automated and ease the process of data usage in the merged organization. However, the adoption would face the challenge of facing resistance from some members who were used to the old systems (Loshin, 2008). Also, it may prove difficult to implement the COTS system, especially when the developers of the system are not directly involved. It is a technical challenge that must be addressed right from the planning stage.

References

De Chaves, S. A., Uriarte, R. B., & Westphall, C. B. (2011). Toward an architecture for monitoring private clouds. Communications Magazine, IEEE, 49(12), 130-137.

Loshin, D. (2008). Master data management. Burlington, MA: Morgan Kaufmann.

Automation and the Future of the Welfare State

Introduction

A theme of AI development takes a notable place in science fiction books, movies, and video games, but it is not limited by them. Skynet from the Terminator franchise became self-aware and almost succeeded in the destruction of humanity. In Mass Effect 2, EDI successfully operates a state-of-the-art space ship at full efficiency even after the total loss of the human crew. However, friendly or not, AI can significantly affect the real-life future of humanity on multiple levels, especially in social and economic spheres.

Moreover, it is already happening in our time, and the most prominent business owners already show their concerns about AI making humans redundant. Elon Musk argued that Twenty years is a short period of time to have something like 12-15 percent of the workforce be unemployed (qtd. in McGaughey 1). The founder of eBay, Pierre Omidyar, states, automation is replacing traditional jobs and that may make employment far less stable and reliable for supporting a livelihood (qtd. in McGaughey 2). A Universal Base Income (UBI) is often proposed as a solution to this issue, but it has multiple severe drawbacks and difficulties in implementation. The idea might seem lucrative for the unemployed, however, the introduction of UBI might come at a heavy price of extra taxation, cuts of welfare programs, and possible social tensions.

Understanding AI Development

A terrifying, highly-capable, and self-aware AI still remains a part of science fiction. Nevertheless, it is crucial to understand that even the initial steps of AI development are already impacting human civilization. The vast majority of contemporary AI technologies belong to the narrow or specialized category, which means they are only suitable for particular, usually mundane tasks. An AI does not have to think; it can be inferior to humans in any other area and still make them redundant since it only needs to do the specific things you are paid to do (Ford 230). Therefore, concerns about human positions in the labor market seem to be justified.

The AI development can theoretically continue up to a point where it comes out of human hands and transforms into an AI-driven cycle of self-improvement, which will produce an infinitely superior alien intellect. This assumption may sound unrealistic, even fictional, but according to Stephen Hawking and his co-authors, dismissing that possibility can turn out into the worst mistake of our history (qtd. in Ford 229). Governments and corporations develop AI technologies to gain a competitive advantage, and a strive for improvement can lead to results worse than growing unemployment rates.

Ways to Tackle Unemployment Caused by Automation

The problem of automation-caused unemployment and social disturbances is surprisingly old. As one US president said: To even stand still we have to move very fast since too many machines are throwing people out (qtd. Ford 249). This statement was made by John F. Kennedy almost 60 years ago. The examples of unemployment supposedly driven by technological advancement can be found even earlier. For instance, the Luddites and Tolpuddle martyrs from England protested against wage cuts and the replacement of human workers with machines in the 18th and 19th centuries (McGaughey 21). The Luddites resisted by breaking the machines, while the workers from Tolpuddle founded a prototype union. Nowadays, the experts suggest several main ways to tackle the unemployment caused by automation.

Firstly, modern employees are encouraged to study harder and get a better education to stay competitive. Ford (252) compared this situation with a pyramid that constantly produces technically overqualified employees. As a result, the market is full of trained staff with limited working opportunities for them. Secondly, business owners and scholars advocate for the introduction of UBI, which would serve as a cushion in case of job loss. This mechanism, while sounding humane and benevolent, requires detailed studying.

Universal Base Income  How Would It Work

In general, the experts and scholars provide several roadmaps of how UBI would be implemented and what groups of the population would receive it. The word universal suggests that every citizen would receive that income; however, it is mostly not the case. Kearney and Mogstad (5) studied several UBI proposals in the USA, and only one out of six included all US population. The other five proposals had specific eligibility criteria, the most common was age restriction to 18+ or 21+ citizens.

The reason behind restrictions and eligibility criteria can be found in a staggering amount of funds, which would be necessary for the mass introduction of UBI. This statement is true both for the USA and European countries. In the American case, an annual UBI of $10 000 would cost $2,5 trillion per year or more than half of the US budget (Kearney and Mogstad 3). Ford (273) basically suggests implementing a progressive scale of taxation to fund the basic income program. Pulkka (2) admits that the European workforce will have a hard time adjusting to changes in skills. Nevertheless, he elaborates a very conservative approach to the introduction of UBI since a monthly payment of ¬1000 would require raising the Finnish national tax rate to 60%. Unsurprisingly, the citizens of European countries were much more favorable to fair redistribution of wealth than to basic income (Dermot and Weisstanner 5). Automation is already influencing the labor market, but with such unclear roadmaps, the introduction of UBI looks challenging, to say the least.

Universal Base Income The Arguments Against

The idea of UBI raised many concerns among the experts, who provided several kinds of arguments against it. They claim that UBI will be unable to ease social tensions caused by unemployment and ensure minimum living standards for vulnerable social groups. Another concern is possible funding sources of UBI since its introduction will come with a heavy taxation burden. Even an increase in tax rates or implementation of new taxes might be insufficient to fund the UBI program. Therefore, the arguments against UBI can be divided into ethical and economic categories.

The first category comes from the existing ethical approach to paid work. According to Sage and Diamond (29), due to the value and importance of work in the eyes of society, the unemployed recipients of UBI will still experience social isolation and low wellbeing. Furthermore, UBI will only underline a social division between highly qualified employees and unemployed UBI recipients. The only feasible way to address it would be finding a job (and probably losing a basic income) or enjoying a life of a non-contributing slacker.

Economic issues with UBI introduction are not solely related to taxation since it could probably come at the price of other social programs or means of redistribution. In the US case, funding a basic UBI would require radically increase taxes and sacrifice all other social programs (Kearney and Mogstad 15). In that sense, the idea of basic income could even seem unfair, as people who decided to drop out from the workforce might receive support instead of elderly people and children. A situation like that serves as an example of another matter that should be considered if UBI will ever be seriously discussed on a political level.

Conclusion

Automation is swiftly coming into human life, and humanity can witness how it reshapes societys social and economic spheres. The consequences of further AI development are truly unpredictable, fascinating, or even terrifying. Even the narrow, specialized AI in the form of robots is already making certain professions redundant. Universal Basic Income (UBI), one of the proposed means of helping the unemployed, seems somewhat controversial. While it looks tempting to receive a safety cushion from the state, the challenges of basic incomes introduction force to consider other alternatives to help the unemployed. In current circumstances, the introduction of the UBI looks hardly feasible or practical both from financial and social points of view.

Works Cited

Dermont, Clau, and David Weisstanner. Automation and the Future of the Welfare State: Basic Income as a Response to Technological Change?. Political Research Exchange vol. 2, no. 1, 2020, pp. 112.

Ford, Martin. Rise of the Robots: Technology and the Threat of a Jobless Future. Basic Books, 2015.

Kearney, Melissa S., and Magne Mogstad. Universal Basic Income (UBI) as a Policy Response to Current Challenges. Report, Aspen Institute, 2019, pp. 119.

McGaughey, Ewan. Will Robots Automate Your Job Away? Full Employment, Basic Income, and Economic Democracy. Centre for Business Research, University of Cambridge, Working Paper 496, 2018, pp. 134.

Pulkka, Ville-Veikko. A Free Lunch with Robots  Can a Basic Income Stabilise the Digital Economy?. Transfer: European Review of Labour and Research vol. 23, no. 3, 2017, pp. 295311.

Sage, Daniel, and Patrick Diamond. Europes New Social Reality: The Case Against Universal Basic Income. Foundation for European Progressive Studies, 2017, pp. 139.

Protecting Browsers from DNS Rebinding Attacks

Summary

This article focuses on security threats on the internet. It reveals how a browser is an important part of security in any computerized device. The same-origin principle in the security of browsers is the point of focus. The authors state that it prevents malicious websites from accessing personal machines (Jackson et al., 2009, p.2). The main type of threat that is focused on in the article is the DNS rebinding attack, which is said to confuse the browser into allowing the malicious websites (Jackson et al., 2009, p. 2). An attacker is able to compromise the security system using the DNS attack. The article also states some examples of DNS attacks that have existed over the years.

Some of the defence mechanisms that are used against DNS attacks are also highlighted in the paper, with the main one being DNS Pinning (Jackson et al., 2009, p. 2). Browser plug-in has made pinning a less effective measure in controlling DNS attacks (Jackson et al., 2009, p. 2). The authors propose some defence mechanisms that may be used to prevent attacks from the DNS attacker, including modifications to some of the most widely used plug-ins in terms of their socket access policies (Jackson et al., 2009, p. 3). The DNS attacker is stated to circumvent firewalls using a DNS attack. The use of DNS resolvers is viewed as a way of preventing the attacker from resolving the IP addresses from internal to external ones (Jackson et al., 2009, p. 4). Jackson et al. (2009, p. 4) claim, Without the ability to resolve attacker.com to an internal IP address, the attacker cannot use DNS rebinding to circumvent firewalls. They also propose the use of DNS wall, which is an open-source method of implementing the proposed resolver.

Another method that the article focuses on the prevention of DNS attacks is the protection of individual servers. The authors state that the attack may be defended through the validation of HTTP host header (Jackson et al., 2009, p. 4). When requests are found to contain an unexpected host header, these individual servers reject them (Jackson et al., 2009, p. 4). The authors proceed to discuss some of the existing policies to provide security for network access, as well as the DNS rebinding vulnerabilities that are present for each of the security measures (Jackson et al., 2009, p. 4). Jackson et al. (2009) conducted experiments whose results are listed in the article. The defences that are potentially applicable for the various vulnerabilities are investigated, with several defences against these attacks being highlighted. The article also describes some of the works that have been done in relation to the DNS attacks together with their prevention.

Analysis

The article contributes to the subject of internet security. One of the major contributions involves highlighting the importance of internet security with the advanced use of this tool in our daily lives. The DNS rebinding attack is one of the attacks that affect many vulnerable internet users. Most of the users lose their vital information and documents because of a single attack. The authors state some of the ways that can be used in the prevention of DNS rebinding attacks together with those that have been used in the past (Jackson et al., 2009, p. 4).

The authors propose some of the simple futuristic methods of preventing the attacks and/or eliminating vulnerabilities in the networks. These contributions are important in the prevention of the attacks that pose a threat to internet users. The article has a number of strengths with reference to the way it addresses the problem of internet security. It is straightforward in terms of focusing on the main problem. The authors provide results based on the experiments done to establish the usefulness of the proposed defence mechanisms against the DNS rebuild attacks.

Just like some of the literary articles that exist in this field, several weaknesses are evident in the article. One of the major weaknesses of this article is the use of professional language that may prove complex for the average reader. Although the authors are accurate and specific, they indulge in internet security jargon without focusing on the explanation of some of the terms used in the article. However, these terms are not difficult for the individuals that have had training and skills or added knowledge in this field.

The limitation in this article and the work that Jackson et al. (2009) performed are listed at the end of the article. The authors state some of the limitations to the use of the proposed methods in the prevention of DNS rebinding attacks (Jackson et al., 2009, p. 22). For example, they state that some servers are unaware of their own hostname. This means that the use of host header checking may not be an appropriate method of preventing the attacks (Jackson et al., 2009, p. 22). The authors also state that some of the older versions of the plug-ins may have vulnerabilities that make it hard to protect the systems in place. The plug-ins can enable the bypass of firewalls that are supposed to protect against the DNS attacks (Jackson et al., 2009, p. 22). The update of the plug-ins, such as Flash Player, is said to be one way of overcoming the problems that are posed by the outdated programs (Jackson et al., 2009, p. 22).

The article is an example of an accurate piece of work. However, some improvements can be made to ensure that it makes a better contribution to the intended field. One of the necessary improvements is the simplification of the language used in the article. The authors need to ensure that the average reader can decipher the content to his or her advantage. They also need to eliminate the limitations to the study that they conducted and/or propose ways of overcoming these limitations in future studies.

Comparison with Previous Articles

The article is similar to most of the articles discussed in class. The article is generally organized, just like most of the discussed articles. It adds to the methods of preventing internet threats that have been discussed in class. However, the ideas are different from those discussed in other articles. The techniques are an improvement to previous articles. The authors provide a bibliography with a variety of articles that add to the concepts discussed in the paper. One of the papers that may be useful to classmates is Attacks against the Netscape Browser by Roskind (Jackson et al., 2009, p. 26).

Discussion and Conclusion

The internet is a vital source of information in the present information age. It has transformed every part of our lives. A major concern is the security threat posed by individuals with malicious intents on the internet. The article focuses on the DNS rebinding attack as one of the major forms of attacks against internet users. Does the DNS attack pose a problem for internet users? What are the consequences that are likely to follow any attack? Is it possible to trace the perpetrators of the attacks? These issues constitute some of the questions that should be answered by the authors. They also need to establish why the attackers are always ahead of the security developers.

Reference List

Jackson, C., Barth, A., Bortz, A., Shao, W., & Boneh, D. (2009). Protecting browsers from DNS rebinding attacks. ACM Transactions on the Web, 3(1), 1-26.

Farmhispania Firms Digital Transformation Strategy

Introduction

Digital business transformation is the strategy of using digital technology to strengthen business operating models and revolutionize a companys goods and consumer engagement; it involves developing innovative goods and processes that provide value and linking people to objects, information, and interactions. It is more than just procuring software and hardware. Thus, it is about transforming organizations via digital technology in order to significantly increase the productivity and profitability of the business. The purpose of this report is to analyze Farmhispanias condition and propose, from a holistic perspective, the strategies necessary to carry out the companys digital transformation.

Current Situation of Farmhispania

Farmhispania is a pharmaceuticals firm that specializes in the production and distribution of Active Principal Ingredients (APIs) used by the pharmaceutical sector. They have a long list of goods, and several of them are leading brands internationally, such as Metformin HCI, amongst the most common Type II antidiabetic drugs. The Statement of profit and loss for the 2020 financial year showed revenues of 80 million euros (15 percent greater than FY2019), EBITDA of 17 million euros (22 cent growth over FY2019), and a Net Earnings of 14 million euros (18 percent higher than FY2019).

The firm employs 450 people of approximately average 47.4 years of age in two sites in Spain: the first one is situated at Montmeló while the other is based in Zaragoza. The enterprise is developing a Strategic Plan over the next 5 years, 2022-2025, and during their assessment of the current, they discovered that their Information technology old systems are restricting the companys growth and potential advancement into new markets or product lines, either organically or through acquisitions. As a result, they must identify and develop the strategies required to achieve one of the primary objectives: the companys digital transformation.

The only technology that the manufacturer has adopted so far is Enterprise resource planning software called Microsoft Dynamics Business Central developed by Microsoft. Business Central is a low- and medium business management system that streamlines and simplifies business procedures while also assisting in managing your company. It is a highly customizable and feature-rich platform that helps businesses manage all aspects of their operations, including finances, production, sales, shipment, project planning, and operations.

Companies can quickly add new features that are specific to their operating location and can be adapted to support even the most specialized businesses.

Strategies for Digital Transformation

Strategy is a series of deliberate decisions made by a company to consistently develop competitiveness in the marketplaces where it is or would at the present, as well as to change to their circumstances. The following strategies need to be applied to Farmhispania to achieve digital transformation at the manufacturer.

Information System

An information system is an integration of information technologies and workers tasks that uses technology to assist business operations, administration, governance, and decision-making at various levels of an enterprise. The daily running of corporations and practically every business line inside an enterprise rely on technology. The current information system architecture is inadequate for the manufacturing business since it is centralized only at the headquarters at Montmeló. The other production facility at no information system installed and as a result, conducts the manufacturing process independently. They need to procure are a more advanced system that can capture all the production processes, employees as well as customers.

The current ERP software, Windows Dynamic Business Central is complicated for the employees of Farmhispania whose average age is 47.4 years. This Windows ERP misses a crucial part of the business, that is the customers. This software is not easy to use hence most users at the company have difficulty in executing simple tasks such as the generation of invoices to customers. In addition, since the company wants to expand it should switch to advanced ERP software because Windows ERP is very slow. In fact, it is best suited for small companies located at one facility.

The currently installed system lacks Customer Relationship Management (CRM) capability. Consumer engagement and retention are at the center of a CRMs functionality, helping the company to keep solid interactions and track prospective customers. Everything will be in one place: a straightforward, customizable dashboard that tells you about a clients previous interactions with you, the progress of their orders, and any remaining customer support issues. CRM will allow Farmhispania to build stronger bonds with its consumers, collaborators, affiliates, and suppliers.

Cloud Computing

Cloud computing, also known as Software as a Service (SaaS), provides users with web connectivity to software programs that are run on distributed computing resources. The computing features that are shared include processing capacity, bandwidth, and storage media. These software applications are housed in off-site data centers that support a variety of applications across several platforms. Since Farmhispania is located at two locations and seeks to expand to new locations there is a need for all locations to be integrated through cloud computing. A good starting point is the incorporation of the current windows ERP software for Zaragoza as well. Windows already have a cloud computing capability hence Farmhispania needs to pay for additional features such as cloud computing.

Farmhispania will benefit from cloud computing since it will allow them to access full-featured apps at a low cost without having to invest in expensive infrastructure upfront. The business will easily scale its manufacturing efficiency and enhance the production process as the company grows and new entities are added (Albukhitan, 6). Cloud-powered ERP will allow the business to obtain information on their critical processes from every location at any given time.

Internet of Things

The current manufacturing and supply chain of Farmhispania is traditional in nature where manufacturing processes are manually monitored and the supply chains are not monitored during transportation at all. IoT can provide visibility throughout the manufacturing supply chain by collecting data on geolocation and attributes, such as the manufacture date and storage time of each specific stock holding unit item (Trenkle, 89). Fairmhispania is a pharmaceutical company that transports its temperature-sensitive products to distribution centers for shipping. Thus for quality to be maintained during transportation, the temperature within the containers needs to be monitored by sensors affixed to the wall of the containers.

Assume that the temperature inside the vessels is beginning to rise due to the cooling system malfunction. The variation from the acceptable threshold is detected by an IoT temperature sensor connected to the containers inner wall. This IoT solution will alert the Farmhispania support team that the distribution parameters have been breached. The company will immediately notify the driver to restart the cooling system, keeping the transported drugs and active ingredients from spoiling.

Artificial Intelligence

Artificial Intelligence is a field of computer science that focuses on emulating intelligent human-like activity in computers. It also has the ability to become one of the 21st centurys biggest disruptive technologies (Chanias, 4). It is fuelling innovation in industries as diverse as in pharmaceutical manufacture. One area where Artificial Intelligence can be applied in Farmhispania is in supply chain management. Chatbots have come a long way over the years, and although they are most commonly associated with customer care, they can also help in procurement.

Chyme, for instance, provides conversational interfaces involving human workers and sales automation technologies. Staff members at Farmhispania suffer inefficiencies when seeking answers to procurement inquiries, hence the need to integrate Chyme. Workers are compelled to call a hotline and queue for operators to provide them with the information they need. Inefficiencies will significantly be reduced by adopting the AI-powered acquisition bot and interfacing it with several ERP systems enabling real-time data access. Chatbots answer questions about shipping status, product availability, company stock, as well as other procurement issues in real-time. This is a clear example of AI assisting supply chain management by complementing staff duties and enabling them to concentrate on important tasks rather than becoming upset by simple inquiries.

The current inspection practice at Farmhisppani is manual hence packages are inspected for damage during transportation at container terminals. With the advancement of AI, the possibility of automating quality inspections has developed (Langer and Yorks, 56). IBM Watson, for example, is an Artificial Intelligence device that is being used to analyze industrial equipment faults automatically. Image recognition is used by the computer to inspect for damage using machine learning algorithms. The use of artificial intelligence (AI) at Farmhispania will enable automated quality inspections to minimize the likelihood of providing substandard drugs to clients.

Machine Learning

Machine learning is focused on applying statistical methods and algorithms to help computer systems increase their productivity on certain tasks without having to be specifically programmed. One application of machine learning at Farmhispania is predictive analysis such as in-demand forecasting. Customer demand is analyzed through demand forecasting to streamline supply chain activities. Reliable demand forecasting provides optimal stock levels and lowers associated expenses of holding stock (Lee, 45). Predictive modeling for sales forecasting is a skill that machine learning models excel at. These models can spot hidden trends in demand data from the past. Customers purchase habits of certain drugs, for example, can be easily linked to weather patterns using these models.

Improving the computer vision abilities of ERP machinery is a significant use case for machine learning. Computer vision is a branch of computer science concerned with making it possible for computers to view, recognize, and process images. Classification of images has become more possible due to machine learning algorithms (Langer and Lyle, 37). This means computer systems nowadays can identify and categorize objects in photographs with a high degree of precision  in some circumstances, even exceeding people. Computer vision can help Farmhispania with supply chain management by allowing for more precise inventory management

Improved Compliance

Manufacturers in pharmaceutical businesses are required to follow a set of industry-specific drug quality standards. In addition, supplier quality is very important since a wrong combination of ingredients that fails to follow industry norms could result in human casualties. Hence manufacturers in pharmaceutical industries must track and monitor hundreds, if not millions, of constituent ingredients from many suppliers to guarantee they satisfy compliance criteria (Chanias et al., 5). Machine learning models will help Farmhispania with ingredient quality auditing as well as compliance monitoring.

Human Resource Factors

Many businesses are investing in technological innovations and conducting digital business transformations to stay ahead of the competition and appeal to an evolving digital market. According to research, more than 80% of companies increasingly consider their IT departments responsible for creating an integrated customer experience (Kane et al., 5). While choosing the proper technology is key, its also crucial to match Farmhispanias core values with the new path and ensure that the personnel is capable of long-term commitment for the new digital transformation strategy.

Organization Culture

Farmhispania has a culture, even though it wasnt explicitly stated in the employee manual. In a nutshell, this is your workers and managements combined attitude, habits, aspirations, and routines. It has a direct impact on how staff members conduct internal business choices as well as how they handle external business activities. The people hired, the methods used, and the principles you uphold all contribute to the companys culture. These cultural elements will interact with the new changes brought about by the digital transformation. As a result, digital transformation will struggle if these variables do not alter to accommodate incoming change.

Farmhispania can have the most advanced digital strategies in the globe, but it would be useless unless its employees are committed to implementing them. This is the case since the average age of all the employees is 47.4 years. This is a challenge to the implementation of a digital strategy since the older generation is hesitant to embrace new and innovative technological changes compared to the younger employees. The company should examine the current culture before making any major expenditure. Understand what modifications are required to guarantee that workers accept the values embodied by the digital transformation? If digital transformation isnt in sync with the companys culture, a drop in user acceptance and performance should be expected. Thus, should the corporate culture contradicts the attitude of digital transformation it should be modified.

Farmihispania must provide training programs focused not just on technical expertise but also on innovative behavior and attitudes to achieve a successful digital transformation. Furthermore, the company should cultivate a culture of openness, responsibility, and willingness to explore in order to reap the full commercial benefits of digital transformation within the timescales envisioned. A continual improvement culture, on the other hand, is much more favorable for timely value realization.

Change Management

The actions necessary to manage the human side of change are referred to as change management. It is all about assisting employees in adopting new technology and business procedures. As the companys digital transformation strategy is being formulated, it is critical to determine any potential change obstacles (Hess, 2016). They will have a detrimental influence on the digital initiative until they are rectified. Developing a change management policy that outlines workplace evaluations is the best approach to mitigate this.

Employees should be aware of the precise cultural characteristics that will aid in the digital transformations success. This allows management to start changing the organizations core beliefs and enforcing desired behavior. Will workers be required to be more customer-focused as a result of the transformation? Will they have to work together more with other business units? What about responsibility and involvement? Accurately describe company requirements so that everyone can join in (Mubako, 98). Communication about change management ought to be unambiguous, with room for responses and queries. Otherwise, opposition and reluctance to change are to be expected.

Development of New Performance Metrics and Incentives

Its critical to measure benefits realized using key performance indicators (KPIs) during the execution of the digital strategy and monitor performance over the years afterward. These measures should be in line with your new company culture. For example, suppose you built a Customer Relationship Management (CRM) system while also cultivating a customer-centric culture. Lead reaction times, as well as conversion rates, are two indicators that Farmhispania should consider while evaluating staff performance. In addition, it is advocated that these KPIs be used to create incentive systems. To put it another way, Farmhispania workers ought to be rewarded anytime their participation or new ideas help the business reach the goals of digital transformation.

Workers and the Company

Farmhispania is about to go through a lot of adjustments to support the digital transformation. Certain parts of your firm, on the other hand, are unlikely to alter, and the new technology will almost certainly correlate with at least some of these current characteristics. The management should develop enthusiasm in the early stages of the project by detecting these links before the implementation of cultural changes (Hinterhuber et al., 69). Since digital transformation necessitates individuals who are prepared to take chances and embrace opportunities, this alignment has an impact on the companys rate of digital transformation. When these principles are intertwined with the company, any new digital system introduced will help the firm achieve business objectives.

Digital Transformation Objectives

Companies frequently desire to improve their digital performance, yet their stated goals are too broad and ambiguous. To avoid this trap Farmhispania should clearly point out where it intends to go before identifying how to arrive there (Greenway et al., 47). There are five characteristics of a good digital transformation objective: exact (correct), practical (achievable), inclusive (aligned), short (memorable), and quantifiable (to monitor progress) (Echeberria, 105). It is critical to think broadly, incorporate changes, carry out tests and revise goals with a diverse group of stakeholders. Furthermore, even if youre hesitant to do so, its critical to create clear goals. An example of a digital transformation objective for Farmhispania that fits the five characteristics is triple the turnover while halving energy consumption.

Conclusion

Formulation of a digital transformation strategy entails developing a long-term vision, incorporation of business objectives, goal setting, and final implementation of the strategy. To have a competitive edge, Farmhispania needs to include a robust Information System, Cloud computing, the Internet of Things, Artificial Intelligence, and machine learning. Also to be included are human resource factors such as workplace culture, change management, Key Performance Indices, and digital transformation objectives. This strategy maintains the companys focus on its mission and the necessary change required. It is used to offer information about the businesss current position. It is a conceptual structure that aids in the comprehension of an organizations current and future digital operating environment. A strong digital transformation strategy is critical to Farmhispanias success. It is critical that employees are on board with these initiatives so that everyone is working toward the same goals.

References

Hinterhuber, Andreas, Tiziano Vescovi, and Francesca Checchinato. (2021) Managing Digital Transformation. Routledge.

Echeberria, Ana, Landeta. (2020) A digital framework for industry 4.0. Springer Nature.

Greenway, Andrew, Ben Terrett, Mike Bracken, and Tom Loosemore. (2018) Digital Transformation at Scale: Why the Strategy Is Delivery. London Publishing Partnership.

Lee, Jason. (2021) Digital transformation strategy of traditional companies. Viking Publishers.

Trenkle, Johannes. (2020) Digital transformation in small and medium-sized enterprises. Nomos Verlag.

Mubako, Albert. (2017) Digital transformation. The realignment of information technology and business strategies for retailers in South Africa. Anchor Academic Publishing.

Langer, Arthur, M., and Lyle Yorks. (2018) Strategic information technology. John Wiley & Sons.

Chanias, Simon, Michael D. Myers, and Thomas Hess. (2019) Digital transformation strategy making in pre-digital organizations: The case of a financial services provider. The Journal of Strategic Information Systems 28.1.17-33.

Chanias, Simon. (2017) Mastering digital transformation: the path of a financial services provider towards a digital transformation strategy. Web.

Hess, Thomas, et al. (2016) Options for formulating a digital transformation strategy. MIS Quarterly Executive 15.2.

A Windows Domain and Its Features

Introduction

A Windows domain is essentially a managed group of networks (of computers) used in a commercial context. The other devices are managed by at least one of the servers, known as a controller. This allows network administrators to govern the machines via users, settings, and other means. This type of connection pertains to server-based networks that allow for centralized control of network resources, typically by letting users join the network with a single login and password maintained by one or more servers running multiple operating systems (Tomsho, 2016). Server operating systems are intended to efficiently manage various concurrent user logon scripts and demands for shared resources. Servers are typically devoted to operating network services and should not be used to execute user apps (Tomsho, 2016). Hence, if one needs to set aside CPU resources, memory, and network management on servers for the user allowing access to services, a Windows domain is created.

A Windows Domain

To answer the question of the essay, it is valuable to present the alternatives of a Windows domain that is suggested instead of the centralized network. As such, a peer-to-peer network is another option for an office, which roughly provides the same services as a domain. The resources access (needed for sharing and printing) is distributed among multiple client machines, being somewhat complicated. Generally, if a device is not part of a domain, it is in a workgroup. Since they lack a centralized authority, they are far more permissive than domains; each computer has its requirements and system of use. In contrast, network access and policy enforcement specified by a system administrator and executed by domain controllers apply to users and devices in a domain (Tomsho, 2016). A directory service is a software that manages centralized access and security, which is unsatisfactory for some office workers.

The use of peer-to-peer networks might seem more lucrative since it allows more privacy, yet this option is usually not the best for the companies that share and print valuable data. For example, in peer-to-peer networks, users have authority over their own resource sharing and may require several sets of permissions to access them; however, this is inconvenient when high security is required (Tomsho, 2016). Hence, a Windows domain, where security is centrally handled, and users have a uniform form of identification for all shared resources, is a safer option. One of the most critical concerns of file-sharing tools is that confidential material can be revealed, either purposefully or inadvertently, if staff are not cautious and appropriate procedures are not in force (Thorncharoensri et al., 2022). When an unauthorized party acquires a login to a file-sharing platform, it might be challenging to determine what they viewed and how far the personal information has traveled.

Finally, there are some more advantages of the server-based network system for the case when sharing and printing are needed. Namely, server operating systems are optimized for resource sharing, and servers are often dedicated to providing network services, which is better for exchanging files. Next, it might seem that there is no need for specific equipment or a server desktop in a peer-to-peer system, hence lowering start-up expenses; nevertheless, lost productivity due to rising complexity might boost costs in the long term. Thus, higher initial expenses due to specialized hardware and server operating systems and extra recurring expenditures for administrative support are more advantageous in terms of quality.

Conclusion

To conclude, a Windows domain might be more challenging to administrate, but it certainly works better for sharing and printing services in office settings. As such, it is a safer option than a peer-to-peer network; hence, it prevents the issue of leaking of the data from the companies. Moreover, a domain network is better suited for the transfer of certain materials. Finally, it is less costly in the long-term perspective since it is a quality network.

References

Thorncharoensri, P., Susilo, W., & Chow, Y. W. (2022). Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theoretical Computer Science. Web.

Tomsho, G. (2016). Guide to networking essentials (7th ed.). Cengage Learning.

Surveillance Camera and Smart Watch Technologies

Introduction

Neanderthals, crude tools, and problems associated with the socio-economic limitations of the ancient world are things of the past because of the breakthrough in technology. After inventing the wheel and after the discovery of techniques related to agriculture and animal domestication, ancient people pursued one innovation after another. Human beings became the dominant species on the planet after leveraging technological discoveries. In order to satisfy immediate needs, these technologies were developed regardless of the unintended consequences. Thus, it is not always a bad thing to disregard unforeseen consequences. Having full knowledge of the negative outcomes of a certain technology would have prevented brilliant people from pursuing knowledge and insights that enabled them to produce innovations and inventions (Tenner 1). The burden of unintentional consequences could have prevented the invention of surveillance cameras and smart watches, making the world less safe and less efficient.

Overview of Surveillance Camera Technology

A surveillance camera system is a byproduct of innovative thinking. TV monitors and cameras were invented for specific purposes. Cameras were designed to capture images for the purpose of entertainment and news reporting. On the other hand, TV monitors were designed for viewing the footages or videos that were recorded using the said camera. Thus, there was a need to fuse these two types of technologies in order to produce the surveillance camera system. Innovative thinking came into play after shrinking cameras into appropriate sizes for surveillance purposes. After incorporating digital technology into the mix, the updated version allows users to record images into computers (Fuller 1). Users have the option to either view the video in real time or review the recorded data at a later date.

Surveillance cameras are like portable and efficient documentation devices. Businessmen, managers of establishments, and security personnel are grateful for the useful application of the said technology. Store owners install surveillance systems in order to prevent shoplifting or deter other forms of criminal activity. Surveillance cameras mounted on less conspicuous areas of a building provide another layer of security. Security personnel leverage the unwavering capability of a surveillance system in order to monitor the movement of people and valuable items. More importantly, the 24/7 video recording capacity comes handy in the event of an investigation.

Unintended Consequences

Recent updates in the core technology enable the creation of wireless and remote controlled systems. In addition, sophisticated digital storage capabilities paved the way for the non-stop recording and monitoring of key areas. As a result, it is possible to observe and record human activity from different angles. This capability becomes problematic after installing surveillance cameras in public places like libraries, parks, and government offices (Newell and Randall 1932). People who are uncomfortable with the pervasive nature of video surveillance made their displeasure known in light of the fact that the Constitution ensures their right to privacy. The ability to know what a person is reading or buying is an invasion of privacy, and this is the unintended consequence of the technology surrounding the surveillance camera.

The need to solve an urgent problem drives innovators and inventors to pursue knowledge required to formulate an appropriate solution. One can argue that it is not the primary goal of inventors to focus on unintended consequences. In this case, the arrival of the surveillance camera technology provided solutions to security and investigation needs. It is important to be mindful of the destructive and inhumane consequences of certain technological developments. However, it is also imperative to encourage innovation and scientific discoveries. Without a doubt, technological innovations gave rise to health hazards and environmental degradation. Nevertheless, the solution to the problems that plague the human race requires the emergence of cutting-edge technology. Therefore, it is prudent to inspire the next generation of scientists and innovative thinkers to push back the limitations of human knowledge.

Overview of Smart Watch Technology

A smart watch is also the byproduct of innovative thinking. In a nutshell, a smart watch is the end result of the fusion between a conventional watch and a smart phone. It is important to transform an analog version into a digital upgrade in order for the device to function like a miniaturized computer (Valdes and Chandler 1). After adding Bluetooth wireless capability to the smart watch, the said electronic equipment becomes more than a sophisticated digital time-keeping device. Thus, users have the capability to install apps for navigation purposes or for tracking physical activity.

Due to cost and technological limitations, smart watches are not stand-alone communication and computer devices in the same way that consumers enjoy the use of their smart phones (Valdes and Chandler 1). Bluetooth wireless connectivity enables the smart watch to make a call or access the Internet with the assistance of a smart phone. Thus, the intended purpose of the said device is to provide an alternative way to access the World Wide Web and the caller functions of a mobile phone. In other words, it is more convenient and less time-consuming to determine the caller or read messages via a wearable piece of technology as opposed to fetching out the mobile phone from the purse or a back pocket.

Unintended Consequences

Tony Beltramellis masters thesis for the IT University of Copenhagen outlined an unintended consequence of using smart watches (Pulliam-Moore 1). Beltramelli pointed out a way to hack a smart watch in order to monitor and record the users hand movements. It is a form of data mining, and the information collected is comprised of hand gestures or how a person moves through physical space (Pulliam-Moore 1). Beltramelli also demonstrated how this monitoring scheme detects and analyzes gestures like a hand pressing the keys on a pin pad (Pulliam-Moore 1). It is possible to monitor and record the said information by accessing a compromised smart watch. Although it is not easy to gain access and have full control over a wearable device, unscrupulous people are not going to allow certain encumbrances to hinder them in the pursuit of a target with access to large sums of money. In other words, the use of a hacked smart watch makes it easier to steal users passwords for online banking and other online accounts. This is an example of an unintended consequence of using smart watch technology.

It is not easy to predict the unforeseen consequences of using a particular technology. More often than not, developers and inventors are consumed by a single-minded focus to solve a specific human problem. In this particular case, there is a need to simplify the process of answering or rejecting calls. They need to figure out a way to speed up the process of accessing messages and emails. As a result, the creators of smart watches succeeded not only in solving an urgent need, they also contributed knowledge and insights with regards to improving miniaturized electronic technology.

Conclusion

It is essential to consider the unintended consequences of using a particular technology. However, inventors and innovators cannot allow the paralyzing effect of the unknown to hinder their work. A technological breakthrough is made possible by the desire to solve urgent problems. It is true that the surveillance camera systems caused an inadvertent impact on peoples right to privacy. However, the same innovative product safeguards life and property in a significant manner. Without a doubt, the use of smart watches may expose the user to the perils of identity theft. However, the popularity of smart watches encourages innovators and inventors to push the envelope when it comes to improving the technology surrounding miniaturized electronic equipment.

It is of critical importance to realize the impact of technological innovations in the lives of people. Unintended consequences go beyond the issues regarding the invasion of privacy or identity theft. In most cases, the discovery and application of technology for the purpose of cost-efficiency or time-saving purposes also became starting points in the destruction of the environment. Technologies that were developed to increase yields or maximize outputs are now threatening the sustainability of the planets ecosystem. However, this is not the time to give in to the paralyzing effect of unintended consequences. There is a need to embrace a more practical worldview, because it is vital to realize the fact that the ultimate solution to the problems related to environmental degradation, the violation of constitutional rights, and identity theft is not going to arise out of fear. The ultimate solution emerges only as a result of the continuous pursuit for higher knowledge.

Works Cited

Fuller, John. How security cameras work. HowStuffWorks. 2009, Web.

Newell, Bryce and David Randall. Video Surveillance in Public Libraries. Computer Society, vol. 12, no. 1, 2013, pp. 1932-1941.

Pulliam-Moore, Charles. Your smart watch can be hacked to monitor and steal your passwords. The Huffington Post. 2016, Web.

Tenner, Edward. Unintended consequences. TED Talks. 2011, Web.

Valdes, Robert and Nathan Chandler. How smart watches work. HowStuffWorks. 2005, Web.

Virtual Reality: A Practical Tool or a Trojan Horse?

Introduction

Technological advancements have made it possible to create a reality that has been only a sci-fi concept several years ago. Virtual reality (VR) is a computer-generated technology that allows the user to interact with a three-dimensional image or environment using special electronic equipment, such as a headset with a screen inside or gloves with sensors (Pros and Cons of Virtual Reality).

The only concept of VR has taken the entire world by storm, evoking a huge interest from academia, industry, and ordinary people. As a cutting-edge technology, VR can be applied massively for both educational and recreational purposes.

However, considering the ambivalent impact of the Internet and smart devices on people, with the proliferation of the virtual environment, it becomes important to study the effects that it has on ones perception of reality. This essay will boost the development of virtual reality; however, it will stress persistently on the importance of raising awareness among users about its potential harms.

The Practical Uses of Virtual Reality and the Potential Benefits of VR

Architectural / Engineering Design Space

VR technology has advanced significantly in the past few years, and in no other industry is this more relevant than in architecture and engineering. There are many benefits of incorporating the virtual environment in architectural practices. One of the most obvious advantages is the ease of design and rearrangement of the elements in the design. Using the VR technology will allow a client to fully interact with the proposed design and give straightforward feedback on it.

As the clients have a spatial understanding of the project on every stage of the design process, this will help reduce time on meetings and the use of lateral design revisions (OConnell). Since the construction may be simulated in VR, construction processes may be perfected for maximum efficiency and a minimum change within a virtual space (Virtual Reality in Construction). Therefore, converting 3D projects into immersive virtual environments is a significant advantage for architects and engineers.

Training Simulators

Virtual reality makes it possible to simulate complicated, costly, and dangerous activities in a safe and highly effective way. It allows a number of complex scenarios in a safe environment to be virtually constructed to enhance learning through repetition. In particular, VR aviation simulators are the real tools that have been designed for training pilots (Adams). The virtual environment is just like the full-size cockpit with the instrument panel that is as true to life as possible.

The user wears gloves with three sensors on each hand and gets immersed in the flight simulation. There are also simulators for medical practice through which students and surgeons can improve their psychomotor skills, instrument handling, and confidence. Surgery simulators are used worldwide by training centers and institutes for students practice and validation. Using trauma simulators, students may practice the skills of emergency medical assistance.

Comparing emergency medical training in physical reality and virtual, there are clear benefits to virtual reality. Firstly, the environment created by virtual reality is safe and has no risk. Secondly, the experience of VR is psychological, similar to the one in physical reality.

Thirdly, flight, surgery, and trauma simulators are cost- and time-effective as they can be used remotely. Fourthly, as the VR simulators have elements of gaming and competition, the process of using them becomes even more interesting, which may improve ones retention and recall. Fifthly, taking into account that VR may produce various situations, including those that rarely occur in everyday life, this technology is beneficial for different learning styles. Finally, the VR environment is innovative and enjoyable and has all potential to become an educational standard.

Classroom and Conference Simulators

VR classrooms have everything needed to create awe-inspiring learning opportunities for students. In particular, Google Expeditions enable teachers to bring children on virtual trips to museums, art galleries, and even outer space to enjoy 3600 panoramas and 3D effect in precise detail. Just as VR can bring users across the world, it can also be used to reproduce some historical events. Virtual technology may be used in teaching the basics of biology, algebra, and visualizing inter-spatial geometry.

Using VR simulations and interactive games allows for incorporating a practical approach to science education (Hand). It also should be mentioned that the virtual environment may serve as an assistive technology for students with disabilities, as it may minimize the impact of disabilities. Therefore, VR is a groundbreaking technology that helps raise engagement and increase knowledge retention.

VR may render location irrelevant, so one should only wear a headset to make a person face to face. This may be of particular importance in enterprise and business settings as it enables us to quickly share the information allowing colleagues to meet and converse in VR without leaving their place. There are software applications that create social-virtual space where people can collaborate and communicate in one room. VR may even help cost-effectively host business conferences or conventions, with attendees getting all the advantages of social interaction and making connections to other people. The virtual environment of the conference may be customized according to ones preferences.

The Potential Ethical Hazards of VR

Great attention has been paid to exciting possibilities that the VR technology may offer. However, less attention is devoted to novel ethical issues, the risks, and dangers that may arise from research and personal use of VR. According to Michael et al., immersive VR presents new and dramatic ways of disrupting our relationship to the natural world that can lead to issues of privacy, harassment, and scenarios we only begin to imagine. Currently, there are several ethical issues related to human behavior concerning the use of the virtual environment that should be addressed.

Sensory Vulnerability

The perception of VR is inextricably linked with a massive clunky helmet that covers the eyes and the ears to provide an individual with an immersive experience. In some applications, in particular, simulators, VR gloves with sensors are also used alongside other attachments. Even though it may be excitingly entertaining and realistic, one may argue that if a person has restricted access to the real world (cannot sense what is going around), this may have negative outcomes.

For example, a home accident might happen or an invasion of a robber. There have been cases when people got so into VR that they destroyed their real-world homes. In particular, people were so distracted that they punched a wall or toppled a glass during intense quests (Joyce). Therefore, virtual boundary systems should be considered as necessary tools for designating a safe place in a room where a person gets into VR.

Social Isolation

Another potential hazard of VR is that it may increase the level of social isolation. When a person is immersed in the VR, a users experience is limited to a single field-of-vision that excludes other people from participation in the process. Excessive use of VR may negatively impact ones contact with the outside world and lead to neglecting real-world social connections. However, there is another point of view on this issue, suggesting that VR may help users meet and interact in a virtual social environment (McEvoy). This feature may be successfully utilized by introverts, and lonely people, as well as help, reduce the social isolation of the elderly people.

Desensitization

Concerns have been raised about the possible relation between VR and desensitization. In particular, this refers to VR games with high levels of scenes of killing. Being regularly immersed in an environment full of violence may lead to ones desensitization. It is well-acknowledged that VR technologies are commonly employed to emotionally harden people against phobias and military combat (McEvoy). On the other hand, when used by average users, VR technology may reduce the level of affection by scenes of violence. This, in turn, may lead to a decrease in emotional sensitivity and feelings of guilt and compassion.

Overestimation of Abilities

People who are addicted to VR games may blur the boundary between the virtual world and reality. This leads to overestimating users ability to perform virtual feats in real life. In particular, this refers to children and teenagers who start to think that their physical abilities and competencies in parkour, roofing, flying a plane, or driving a car will transfer to a real-world environment. According to the study conducted by the academicians of Stanford University, children cannot tell the difference between feats of their game character and their own ones (Bailey & Bailenson 108). Difficulties regarding return to the real world may damage the social relationships and ones perception of his or her real abilities.

Psychiatric

If not treated properly, the overestimation of abilities may lead to psychiatric issues resulting in a user believing that his or her physical body is an avatar. One should also mention that immersing in VR may uncover psychiatric vulnerabilities in some people and even be a reason for mental episodes. It is also possible that a user may have post-traumatic stress disorder in real life caused by VR games with a high level of violence. Unpalatable Fantasies

The porn industry is predicted to be the third-largest VR sector by 2025 (McEvoy). The number of adults viewing VR content on the Pornhub website has doubled since 2016. Even though this does not pose any ethical hazard, there is a concern that perverse fantasies, including aggressive and pedophilic content, maybe immersive. One may also suppose that excessive exposure to pornography may influence harmful behavior toward women.

Torture / Virtual Criminality

The issue of managing the execution of crimes in the virtual environment is curious, though it has yet to be resolved. VR games like Grand Theft Auto enable users to kill or cause pain to other participants of the game. The question is whether the traumatized person may suffer mental distress due to the actions of the other user and if he or she should be held responsible for that. This speaks to the importance of understanding the status of damage, pain, trauma, or murder caused in a hyper-realistic environment.

Manipulation

VR is expected to be an exceptionally successful and powerful tool in advertising products. The point is, this technology gives commercial advertisers an additional environment to manipulate consumers and even control their behavior. That is why one may note that new tactics of influencing a consumer involving product placement and even subliminal advertising are now being developed. Therefore, people should be cautious about the psychological effects of VR.

Appropriate Roaming and Re-creation

VR technology may help people explore the world from the comfort of their homes, introducing them to new locations. Of course, it is an exciting experience for people who might otherwise never have the possibility to travel. But the question is whether it is ethical to allow people to visit holy places or wander through someones private home. One may argue that the ethical parameters of this potential opportunity have yet to be clarified.

Privacy and Data

The immersion into the virtual environment may lead to greater privacy worries and fear of identity theft. Taking into account that users avatars are reflections of their behavior in the real world, the unique movement signatures may be tracked and exploited by other people. Therefore, it should be clarified who is responsible for data collection and privacy of users and whether the data may be given to advertisers.

Conclusion

To sum up, VR technologies open a vast space of improvement of society, whether it be training autopilots and surgeons or creating inspiring learning opportunities for students. However, it is important to be aware of potential ethical harms and psychological effects that may arise from the use of VR, in particular, health risks, social isolation, privacy issues. Therefore, this space of technological progress has to be constrained in a critical, rational, and evidence-based manner.

Works Cited

Adams, Eric. VR Pilot Training Now Comes With a Sense of Touch. Wired, Conde Nast. 2018.

Bailey, Jakki O, and Jeremy N. Bailenson. Considering Virtual Reality in Childrens Lives. Journal of Children and Media, vol. 11, no. 1. 2017, pp. 107113. Web.

Hand, Bob. 10 Practical Uses of VR in the Classroom. Whooos Reading Blog. 2018.

Joyce, Kevin. Accidents and Injuries in VR  The Best & Worst of the VRFocus Team. VRFocus, 2018. Web.

McEvoy, Fiona J. 10 Ethical Concerns That Will Shape the VR Industry. VentureBeat, VentureBeat. 2018.

Michael, et al. Real Virtuality: A Code of Ethical Conduct. Recommendations for Good Scientific Practice and the Consumers of VR-Technology. Frontiers, Frontiers. 2016.

OConnell, Kim. 4 Tips for Using Virtual Reality (VR) in Architecture | Redshift. Redshift by Autodesk, Redshift EN. 2016.

Pros and Cons of Virtual Reality. National Youth Tech Journal, 2018. Web.

Virtual Reality in Construction. Virtual Reality Society. 2017.

Information Systems in Business

Examples of Databases

In reality, databases exist in almost every place where record keeping is necessary. Examples of databases in which personal information is available include the university database, hospital database and hostel or apartment database. Information in university database is captured for the first time during enrolment and updated every time the student engages in any significant event that is of interest to the university e.g. every time they sit for an exam or face the disciplinary committee. In the case of hospital databases, the system captures information the first time the patient visits the hospital, and updates it every time they visit the hospital.

Building data warehouse

Building a warehouse data requires information from different databases. Therefore, when creating a data warehouse, it is important that the team understand the various databases from which to source the information, and how to gain access to those databases. Supposing we were building a data warehouse for Airbus, some sources for the information will be the departmental databases. The assumption is that each department of the company has a database with information about every employee. Secondly, external sources of the information may include the databases from the local police stations. These databases will provide information regarding any criminal records concerning the employees.

Data mining

The construction of a data warehouse discussed above is of great importance to the management as it offers decision support. For instance, if the management wanted a team to implement a jet design project, the information from the warehouse will help them identify the most eligible candidates based on experience, criminal history and so on. In this particular case, the role of data mining would be precise; to extract knowledge from the warehouse in an understandable manner and reprocessing that data to provide the management with important information regarding established patterns that might be crucial for decision-making.

Enterprise Content Management

This term refers to the strategies, methods and tools applied in the management of unstructured data in the organization. Given this role, the ECM offers several capabilities to the management in accessing, analyzing, processing and reprocessing information wherever that information is, thus offering the organization a broad set of capabilities for example collaboration, cost and continuity. In simple terms, collaboration is the ability to work together.

Technologies like ECM provide individuals with the capability to work from anywhere and therefore, it brings people with different, supplementing and overlapping expertise together thus enabling them to achieve results not only faster but also efficiently. Though the implementation of these technologies requires a lot of investment, the cost of unstructured information minus the ability to access that information is much expensive for the organization compared to the cost of implementing ECM. Further, this technology guarantees the organization continuity even after a disaster or any other form of interruption.

IBM, a software vendor of ECM provides a range of products namely industry solutions, ECM for system Z, ECM starter pack and ECM Usernet events. Each of these products aim at changing the way businesses operate by equipping them with various ECM capabilities. Unlike the IBMs products, which are variable from industry to industry, Microsoft seems to offer a compounded ECM service that aims at providing organizations with the same capabilities as the former.

Normalization

The term normalization refers to the process of simplifying entities and removing any form of duplication of the information. The process ensures that all updating takes place once and in one place thus making it easier. The normalization process involves establishing the First normal form (1NF), then the second normal form (2NF), then the third normal form (3NF). The 1NF ensures the removal of any repeating groups of attributes and the creation of new entity and relation. Afterwards, the new relation requires a review and a creation of a primary key for one entity and a secondary key for the second entity.

Facebook example

In facebook, there are several features, tools, and entities, which have some relationship with individual members. An example of such is the homepage tool. This tool relates directly with other items like notifications and groups of a particular item (the user). In this case, the homepage feature is the entity and the specific notification as the item number. Another example is the profile tool. The feature has a direct relation to the users information and thus, the feature becomes the entity while every piece of information in the profile becomes the item number. Considering the profile as an entity, some of the attributes of this entity include personal information, status updates on the wall and comments including the date and time of the updates.

The 2NF involves checking the entities, removing part-key dependencies and their key attributes, and putting them into a newly formed entity. The third involves examining all the entities and removing other attribute dependencies. To simplify the data, the removal of other attribute dependence between attributes in each relation is necessary. The next step is copying into this new relation the attributes upon which they depend. The final step is reviewing all relations for a selected function and combining them with the identical primary keys.

Solution to the Module

First NF

1NF tables

Entity Name: sales person (with sales persons ID as primary key)

Sales person ID Sales person name
SN200 Fletcher
SN250 Bowen
SN300 Blackwell
SN350 Patel

Entity: salespersons operating details (With salespersons ID as secondary key).

Salesperson ID Sales area Customer number Customer name Customer address Warehouse number Warehouse number Sales amount (£)
SN200 East CN5643 Green 22- New York 1 London 15500.00
CN6745 Smith 23 New York 2 Reading 12500.00
CN6790 Johnson 24- New York 2 Reading 8000.00
SN250 West and East CN6890 Khan 25- London 3 Bristol 21690.00
CN5642 Reed 28- London 3 Bristol 2500.00
CN5643 Green 22- new York 1 London 7000.00
CN3508 Williams 28 -Bristol 3 Bristol 14000.00
SN300 South CN3468 Chapman 29- London 1 London 5000.00
CN2587 Ali 30- Bristol 3 Bristol 10000.00
CN6321 Lee 31- Reading 2 Reading 8000.00
SN350 North and South CN2587 Ali 30- Bristol 3 Bristol 16000.00
CN1543 Morrison 32- reading 2 Reading 21000.00

2NF

Two NF

Normalization tables in 2NF

Entity: Salesperson (with salesperson ID as primary key).

Sales person ID Sales person name
SN200 Fletcher
SN250 Bowen
SN300 Blackwell
SN350 Patel

Entity: salespersons operating details (with salesperson ID and area as foreign keys).

Salesperson ID Sales area
SN200 East
SN250 West and East
SN300 South
SN350 North and South

Entity: Area (with operation area as the primary key).

Sales area Customer
number
Customer name Customer address Warehouse number Warehouse location Sales amount (£)
East CN5643 Green 22- New York 1 London 15500.00
CN6745 Smith 23 New York 2 Reading 12500.00
CN6790 Johnson 24- New York 2 Reading 8000.00
West and East CN6890 Khan 25- London 3 Bristol 21690.00
CN5642 Reed 28- London 3 Bristol 2500.00
CN5643 Green 22- new York 1 London 7000.00
CN3508 Williams 28 -Bristol 3 Bristol 14000.00
South CN3468 Chapman 29- London 1 London 5000.00
CN2587 Ali 30- Bristol 3 Bristol 10000.00
CN6321 Lee 31- Reading 2 Reading 8000.00
North and South CN2587 Ali 30- Bristol 3 Bristol 16000.00
CN1543 Morrison 31- reading 2 Reading 21000.00

3NF

Three NF

Salesperson operating details.

Enhancing Byte-Level Network Intrusion Detection Signatures

Summary

The article by Sommer and Paxon (2003) focuses on the approaches that are applied in the detection of network intrusion. Sommer and Paxon (2003) reveal some of the measures that may be applied in the detection of intrusions such as observing network traffic, detection of anomaly through observing normal behaviours, and detecting abnormal behaviour and misuse detection. The other form of detection stated in the article is specific-based detection, where the legitimate traffic is differentiated from violation (Sommer & Paxon, 2003). Signature matching is the focus in the article where the sequence of bytes is identified in the network (Sommer & Paxon, 2003).

The authors state that this method is easier to implement in network security, with the main disadvantage being the existence of false positives that emerge because of ignoring the context of the bytes (Sommer & Paxon, 2003). They proposed the use of contextual signatures in network security. This method is more accurate in the detection of any false positives and/or prioritizing the alerts by importance (Sommer & Paxon, 2003). Examples of applications that can be used in this method are provided in the article. The authors also propose the use of operational contextual signatures as an effective method of security in networks (Sommer & Paxon, 2003).

Analysis

The article, just like the previous one, addresses internet security by pointing out the network threats in this platform. The contributions of this article to internet security are evident. The article looks at the weaknesses that exist in the current security arrangements to detect network threats. The use of bytes is the main area of focus. The authors state the advantages and disadvantages of this method (Sommer & Paxon, 2003). They propose the use of detecting contextual signatures in providing network security as an efficient technique of identifying the threats.

The strengths of this article include the simplicity with which it provides the necessary information on network security. It contributes to internet security by proposing the methods that may be used to provide this security.

The main weakness of the article is the assumptions that it makes in relation to the proposed methods of offering network security. The authors assume that security threats are easy to tackle with the proposed methods. They leave many eventualities in the case of failure of these systems. These eventualities may be challenging to the future researchers who intend to utilize the methods that are proposed in the article. The researchers do not carry out a detailed study on the use of the methods that they proposed, unlike the previous study that provided detailed results on the experiments to establish the usefulness of the interventions.

The main limitation that is evident in this article is the existence of false positives in the process of detecting threats (Sommer & Paxon, 2003). Although some of the methods used to detect network threats have different ways applications, some are better at detecting network threats compared to those discussed in the article. The presence of false positives means that the use of the form of threat detection proposed in the essay may make internet users lose vital information in the process. However, the above limitations can be overcome through the improvements that are suggested in the article (Sommer & Paxon, 2003).

Despite the above weaknesses and limitations, the suggested methods of detecting network threats can be improved in several ways. The researchers need to formulate a study that compares the various methods that are proposed in the article. The effectiveness of these methods should then be used to make conclusions in the future conferences and/or in publications of the articles. The article compares to several other articles that have been read in class so far.

Comparison with Previous Articles

One of the comparison areas is that the article is based on the measures to detect network threats before they become harmful to the users. Therefore, it is useful to the internet community at large. Previous articles have provided useful knowledge on detection and prevention of internet threats. This article, in particular, makes special contributions to internet security by proposing several means of detecting network threats before they transform into dangerous and malicious threats (Sommer & Paxon, 2003).

The current article has limitations that are similar to the ones that are present in other articles that have been discussed in class. Each of the articles that present the issue of providing internet security has its own weaknesses, thus creating vulnerabilities that may be exploited by the attackers. They all propose measures that may be applied in the prevention of the threats. However, these methods are ineffective in preventing threats from affecting users. The article is also different from most of the articles read in class because the researchers do not provide results for experiments that they performed to evaluate the proposed methods of detecting network threats.

Discussion and Conclusions

The use of bytes as the basic method of detecting threats to a network is an effective method. However, this technique has a weakness in the form of false positives that exist in detection methods. The proposed use of contextual signature detection reduces the problem of false positives. Does this mean that internet users have to frequently miss their vital information and messages from the network when using this method of detection? This question is an important one to answer. Future researches should target to provide a more effective solution.

Reference List

Sommer, R., & Paxon, V. (2003). Enhancing byte-level network intrusion detection signatures with context. Proceedings of the 10th ACM Conference on Computer and Communication Security. Web.

Enhancement of Virtual Reality Use Through an Engineering Perspective

Introduction

Modern society currently experiences a rapid technological development of electronic devices. The overall state of the technology sphere now could be described as very profitable and growing fast. However, in a continuous race in patenting wars, the companies working on tech innovations do not have time to consider all application opportunities of newly developed technologies and devices. Thus, while technological advancements seem to differ in their levels of usefulness, that is explained by the fact that their potential applications that support the full realization of their functions were not discovered just yet. Therefore, while various new developments, such as virtual reality, are marketed as entertainment opportunities, in reality, they could have a lot more cases of applications in areas of activities vital for the support of society. This research will define the common attributes of VR technology and explore current applications of VR in different industries. The purpose of this research is to determine the area where VR application is used to its full potential and discuss how to enhance the use of VR from an engineering perspective.

Application of VR in Different industries Despite the fact that virtual reality technology has become available to the wide public only recently in the last ten years, VR (virtual reality) was initiated more than twenty years ago. In fact, the concept of VR was formulated in 1965 by Ivan Sutherland, and the first cases of its application for commercial purposes took place in the 1980s [1]. The research on the subject of VR technologies originated in the computer graphics field and then expanded to several other disciplines. The early definitions of VR described it as real-time interactive graphics with 3D models, combined with a display technology that gives the user the immersion in the model world and direct manipulation [1]. Therefore, the three main features of VR are immersion, the users perception of presence in an environment, and the users ability to interact with the environment. In [1], depending on the level of immersion, the author defines three types of VR: the cheapest non-immersive type, semi-immersive, and fully immersive systems that use several sensory devices.

Currently, VR technologies are primarily used in entertainment areas, as the entertainment area is more profitable. Specifically, in the console gaming industry, the projects are marketed as VR-supporting games to attract a wider audience seeking a fully immersive experience from games. However, with the technology becoming more affordable with time, the use of VR started to expand to other areas, such as training simulations in the military, education purposes, and architectural design. Another significant aspect of VR technologies is the use of augmented reality (AR) which implies the use of affordable devices such as smartphone cameras for 3D simulation of different objects. Innovations in the AR department substantially contributed to the development of VR technologies and allowed the broad public an opportunity to have a first-hand experience with virtual and augmented reality technologies.

VR Application in Construction Engineering

In order to determine in which area VR technologies are used to their full potential, one needs to analyze the current use of VR for engineering purposes in different industries first. VR is currently actively utilized in several industries: construction, retail, logistics, aerospace, transport, and the medical field. In [2], the authors provide insight into VR implementation in construction engineering education and training (CEET) through visualization of architecture projects, simulation of operational tasks, and use of equipment. According to the articles findings, the training programs with the implementation of VR reduce the costs and help to identify potential issues for the health and safety of workers [2]. Another significant aspect of VR use in construction engineering is understanding the structural behavior of buildings through immersive VR simulation, with high quality that is not achievable in desktop simulators [2]. On the other hand, desktop VR is useful for the navigation and operation of geometric objects and structure programming. Therefore, in the construction engineering industry, VR is used for simulation purposes to provide more precise structure manipulations and allow safety training at a reduced cost.

VR Application in Aerospace Engineering

Another industry that actively utilizes VR technologies is aerospace engineering and design. The topic of VR use for aerospace design was covered in [3]in their article on digital twinning in virtual reality. Digital twinning is a process in which real objects are recreated in a virtual environment through the construction of their digital replica. Digital twinning is mainly used for testing and experimenting purposes and features the real objects lifecycle and data received in real time. According to the study in [3], aerospace design requires the use of immersive simulation for the visualization of aerodynamic processes.

The utilization of immersive processes allows for improving the available analytical data cost-efficiently, resulting in the development of immersive analytics, an entirely new field of research. The study suggests that the use of standard off-the-shelf Xbox gaming console controllers and Oculus Rift motion sensors with a headset could be adapted to use for the purpose of controlling Aerospace design [3]. In [3], the authors emphasize that US Navy used the same controller for operating a periscope on a nuclear-powered submarine, illustrating the wide application of already available electronic devices originally developed for a different purpose. Thus, the aerospace industry mainly relies on the immersive type of VR. The information in [3] explains how different industries require the use of only one type of VR application without concerning its full potential.

VR Application in Medical Field

Lastly, the area where VR technology could be used to its full potential is the medical field. Healthcare systems utilize VR in a wide range of applications while mostly using the same electronic devices available for personal use. The application range includes healthcare education and staff training, patients recovery, and even mental health support. In an article focused on the VR programs application in healthcare, the author states that VR applications in medicine were initiated in 1993 with the purpose of mental disorders treatment [4]. In [4], the author suggests that while VR applications in the past were focused on mental health treatments, the current innovations are focused on utilizing VR technologies in surgical procedures. However, focusing on surgical procedures does not slow the development in other areas such as preventive care, data visualization, and medical education.

Currently, VT technologies in healthcare utilize immersive and semi-immersive systems in therapy for posttraumatic stress disorder, distraction therapy as a substitute for medical drugs for pain relief, and physical and brain rehabilitation after stroke. Non-immersive VR is used in education and training simulators for surgery and surgical simulation. For example, surgical simulation is used in Minimal Invasive Surgery, where the surgeons use mechanical arms and monitors to perform the surgery [4]. VR is also commonly used in x-rays, ultrasound, microscopic examination, MRI, and CT as diagnostic tools. Despite its utility, VR use is also negatively characterized by its high costs and lack of boundaries between the experience achieved through VR procedures and experience from real-life patient cases.

Areas for Improvements

Nontechnical skills (NTS) development

The real-life aspect of VR simulation lacks the application of necessary skills for a high-risk environment, described as nontechnical skills (NTS). Nontechnical skills include cognitive skills, decision-making, stress management, endurance, and social skills, such as leadership and the ability to work in a team. The VR education programs in healthcare are more focused on developing practical skills without concerning the NTS, which results in a lack of reality aspect in VR simulation-based training [5]. The core difference between experience achieved through participation in VR training procedures and real life is the sense of responsibility and stress caused by the responsibility. The application of VR in construction engineering education and training was used to define possible issues beforehand. While VR application is actively used to develop technical skills, the inclusion of nontechnical skills could significantly improve the education and training outcomes by preparing the employees for stressful situations. Lastly, as NTS training programs do not require fully immersive VR systems, implementation of such training could be performed at a moderate cost. Therefore, engineers could make VR use more beneficial to healthcare practitioners by designing more specific training programs that feature NTS development elements.

Data Transfer Speed Rates

The range of VR and AR technologies applications is closely related to the data transfer speed rates and development of wireless transmission technologies. In [6], the author suggests that 5G specifically could substantially benefit the healthcare system through increased reliability of medical devices and contribution to intelligence medicine. Moreover, 5G systems in medical applications will allow the simultaneous connection of more devices required for VR use, such as motion sensors and video cameras [6]. Widespread 5G connection will provide more opportunities for the overall improvement of the healthcare system, such as remote diagnosis and smart care in hospitals, gradually decreasing the financial burdens of healthcare systems. Financial relief could support more widespread use of VR and AR technologies in the future. Thus, by expanding the area that supports the high data transfer speed rates, engineers could contribute to the progress in VR and AR use and the development of new technologies.

Conclusion

VR technologies allow the creation and use of three common types of VR systems: immersive, semi-immersive, and non-immersive, with non-immersive systems being the most affordable option. Conducting an analysis of VR and AR use in different industries determined that they are mostly used for training and education purposes and simulation without necessarily using the full potential provided by immersive VR systems. In the engineering and construction field, VR is frequently used for simulation purposes to address the potential issues in the balance of construction and identify threats to workers safety. In the aerospace industry, the utilization of VR resulted in the development of immersive analytics, which improves the analytics data.

The medical field uses VR technology to its full potential in a wide range of applications. In healthcare systems VR and AR are used for educational purposes, development of technical skills of healthcare personnel, patients recovery and rehabilitation, therapy for mental disorders, surgery procedures, etc. Enhancement of VR use in healthcare systems through an engineering perspective requires addressing the aspect of NTS and its addition to the training programs. In addition, the technical development of speed rate in wireless connections, such as the introduction of 5G, will likely result in the further progress of VR and AR application in healthcare. While now VR technologies are underused in the healthcare system because of the high cost of equipment, there are many possible ways to minimize their cost through engineering and construction innovations.

References

P. Cipresso, I. A. Chicchi Giglioli, M. A. Raya, and G. Riva. The past, present, and future of virtual and augmented reality research: A network and cluster analysis of the literature, Frontiers in Psychology, vol. 9, pp. 1-20, 2018.

P. Wang, P. Wu, J. Wang, H. L. Chi, and X. A. Wang. A critical review of the use of virtual reality in construction engineering education and training, International Journal of Environmental Research and Public Health, vol. 15, no. 6, pp. 1-18, 2018.

S. K. Tageja, P. Seshadri, and P. O. Kristensson. AeroVR: An immersive visualisation system for aerospace design and digital twinning in virtual reality, The Aeronautical Journal, vol. 124, no. 1280, pp. 1615-1635, 2020.

H. A. Aziz. Virtual reality programs application in healthcare, Journal of Health and Medical Informatics, vol. 9, no. 1, pp. 1-3, 2018.

M. S. Bracq, E. Michinov, and P. Jannin. Virtual reality simulation in nontechnical skills training for healthcare professionals: A systematic review, Society for Simulation in Healthcare, vol. 14, no. 3, pp. 188-194, 2019.

D. Li. 5G and intelligence medicinehow the next generation of wireless technology will reconstruct healthcare? Precision Clinical Medicine, vol. 2, no. 4, pp. 205-208, 2019.