Utility Plant Explosion in Burbank, California

Introduction

Power Substation, being a complex technological object, must be operated according to specific rules and instructions by high-level electrical personnel. There are many causes of accidents and fires at the substation; some occur frequently, and some cases are isolated. In this case, the events that took place in California did not lead to severe consequences, as there were no casualties. However, serious accidents at substations are quite rare, but their consequences can be critical if they do happen. This can manifest itself in the shutdown of entire city neighborhoods or even the shutdown of large industrial enterprises.

Prevention Strategies

In this case, in order to reduce the consequences of substation explosions, certain conditions must be met. The management company needs to organize and manage the activities of units to protect the habitat and the safe placement and use of technical means in the city. In addition, they need to interact with public services in environmental, industrial, fire safety, and protection in emergencies. On the other hand, it is necessary to find and make management decisions in compliance with professional ethics and standards of innovative engineering activities, taking into account legal aspects in the field of Technosphere safety. In addition, one of the solutions that can reduce the risks of severe consequences is the construction of such structures in a remote part of the city. One of the key steps in the development of new and evaluation of existing substations is to determine the possible causes of fires.

Conclusion

The dangers of fire at substations are less evident, but the results might be disastrous. Substation fires may have a significant impact on electricity delivery to users, as well as the grid companys revenue and assets. Furthermore, it can threaten personnel, emergency crews, and people who happen to be nearby. Understanding the possibility of an explosion, taking appropriate fire-fighting measures, reducing the risk of their formation, and mitigating the consequences of a fire are critical factors for the design and operation of substations.

Engineering: Luggage Spring Balance

What is the luggage spring balance?

The Salter brothers invented the spring balance in Bilston in 1760 (British history online 2013). There are several kinds of spring balances that are used for different purposes. This report seeks to discuss a luggage spring balance. A simple definition of a luggage spring balance describes it as an instrument to determine the weight of an object. It is commonly used in households and laboratories to weigh objects where the accuracy up to decimal points is not required. Following are examples of a luggage spring balance:

Example of a luggage spring balance.
1 Example of a luggage spring balance.
Example of a luggage spring balance.
2Example of a luggage spring balance.

A luggage spring balance works on a very simple mechanism that is based on the third law of motion. The third law of motion suggests that when an object applies force/pressure on another object, the object (on which the force/pressure is applied) reverts back by applying the same amount of force/pressure on the object (that applies the force/pressure). The third law of motion further suggests that both these forces apply the force with the same intensity, though their directions, in which the force is applied, are opposite to each other (Zou n.d.).

In our day-to-day life, we come across several incidents where we have to apply force to either push or pull an object in order to alter its state of motion; force refers to this pull or push. No one has ever seen force, but we all have experienced its effect. So, it can only be understood by explaining the effect of a particular force. In addition to changing the state of motion of an object, force can also change the shape of an object. In a luggage spring balance, when a force is applied (i.e., when an object is hanged), the spring expands according to the mass of the object (figure 1).

A spring expands when a force is applied to it.
Figure 1: A spring expands when a force is applied to it.

The mechanics of a luggage spring balance can be understood in a better way by taking an example where two spring balances are attached to each other and pulled in opposite directions. This will even confirm the third law of motion. Consider figure 2 that shows two spring balances A and B, where the balance B is attached to a hook in a wall, and balance A is pulled manually. What will we observe when a force is applied? Both the balances will depict similar readings, and this means that though we have applied force only on balance A, balance B is also experiencing the same force as balance A (but in the opposite direction). This small experiment confirms the third law of motion.

Action and reaction have the same magnitude but with opposite directions.
Figure 2: Action and reaction have the same magnitude but with opposite directions.

It is understood that if we replace the balance A with an object, the same law of motion will apply. The only difference will be that the object will not display any reading. But as we have seen earlier, balance B will show the reading of force that is being applied by the object. So, in this manner, we will get the mass of the object.

It should further be understood that spring is designed to return to its equilibrium position once the force ceases to be applied. The spring stretches according to the force applied. More the force more will be the extension (reading in case of a spring balance) of the spring. This means that the reading that a spring balance shows is actually the quantum of force applied (Pearson Education 2010). Thats the reason why a spring balance shows different readings for different objects with different weights. It should be understood that a spring balance gives almost accurate results under ideal conditions, but there should be precision in reading the scale as well (Collins & Atwood 1981).

What is the material used for a luggage spring balance?

The biggest advantage of a luggage spring balance is that it is economical and easy to carry. But there are certain disadvantages as well in using such a spring balance. The material from which the spring (the main part) is manufactured plays a vital role in its performance. First of all, the spring balance will perform well only until the spring is in good condition. With the passage of time, the spring gets worn-out, and the balance becomes faulty. Secondly, there is a limitation for a spring balance to measure weights. A spring balance will depict correct results only until the springs materials elasticity is reached.

Trying to weigh objects that are heavier than the designed load-bearing capacity of the spring might lead to the breaking of the spring. As such, a lot of care is taken while selecting the material for the spring. Generally, the spring is made out of stainless steel. But metals such as aluminum or a combination of aluminum and steel are also used, depending on the proposed capacity of the spring balance. The motive behind preferring steel and/or aluminum for the spring is that both these metals are considered to be rust-free; since the durability of the spring is of great importance in a spring balance, the material has to be rust-free. This particular feature becomes more vital when a spring balance is used for industrial purposes, where accuracy is not that important.

References

British history online. 2013. Web.

Collins, C & Atwood, J 1981, Weighing with spring balances: Biases and errors, North American Bird Bander, vol. 6. no. 1, pp. 8-11. Web.

Pearson Education 2010, Equilibrium and elasticity. Web.

Zou, J n.d., Newtons third law of motion. Web.

Micro Messages for Contemporary Societies

Micro messages are slowly becoming the most utilized communication aspects in contemporary societies. This approach is adopted by both organizations and individuals with the primary objective of increasing communication effectiveness. As a result, Sweet (2019) highlights that micro messaging tends to plug individuals, especially on different social media platforms, into the communication nuance and demonstrates the best approach to leverage it for everyone to benefit from it. A leading social media platform that has effectively utilized this approach is Twitter. Typical examples of micro messages include: what is Francesco? I like Francesco. I want Francesco. I am getting Francesco. These four sentences are the most prevalent micro messages that Francesco uses as a predominant organization. The organization has taken advantage of an increased number of users on Twitter and used micro messages with close regard to the AIDA model.

The message what is Francesco? as used on Twitter is a communication strategy to grab the target markets attention. These forms the first component of AIDA; specifically, it gives the target audience its attention which develops the brand awareness of the organizations campaign. The concept of interest is sparked in the message I like Francesco. It demonstrates an interest in the organization and the products and services it provides to individuals. Interest is also evident in the strategy that was adopted to pass the message that is using Twitter as a social media platform. Desire is presented in the message I want Francesco in the sense that the message portrays the desirability of the organization in question. Finally, action is demonstrated in the message I am getting Francesco. The message directly shows a call to action and where it is placed among the targeted market.

Reference

Sweet III, J. L. (2019). Micromessage: Reach and teach. 

RFID and Barcodes Comparison

The use of barcodes has become an indispensable part of the business world. Barcodes were developed and first used in the 1970s, and since then they have been widely used worldwide (Roberti, 2017). As for the RFID technology, it has been in place for 15 years, and only 5% of organizations use them. Nevertheless, those who utilize these technologies are likely to use them effectively in the future (Swedberg, 2017). According to a recent study, companies choose RFID technology, as well as barcodes system, as these tools translate into a more efficient inventory management and overall supply chain management. Both technologies have a tag and a reader. They also have a similar function as they enable companies to track various items.

Nevertheless, these two systems have quite significant differences. One of the major difference is mobility. Barcodes have to be right in front of the reader to be properly read while RFID technology enables people to use the reader as far as several feet from the tag. Moreover, barcodes can be processed one after another. However, RFID readers can process several items simultaneously, which significantly increases their efficiency. Besides, the amount of data available also differs. RFID technologies are more efficient in this respect as the system can process different types of data. Any details that are valuable for the process can be included, for example, items name, location, shelf life, temperature, number of changes or repairs, and so on. This feature makes RFID technologies applicable in the sphere of safety and maintenance. The use of RFID can be beneficial when handling hazardous materials or high-value products as people can monitor the conditions as well as a particular location of their items. The latest RFID systems have readers that are compatible with certain smartphones.

Furthermore, the types of tags also differ in these two inventory tracking systems. Barcodes can be adjusted as tags or can be print directly on plastic or paper products or package. RFID codes are adjusted through chips, but the most recent devices can be chipless as they can reflect radio waves beamed by certain liquids (Swedberg, 2017). Importantly, RFID chips are reusable as it is possible to re-program them.

However, one of the most significant differences between the two systems making it less attractive to companies is their price. The use of barcodes is affordable as compared to RFID technologies. Nevertheless, the functions and capabilities offered by the two methods are also very different. Therefore, more and more organizations choose the RFID technology to make their supply chain management more effective (Swedberg, 2017). This is specifically true for organizations that have to handle large inventories.

In conclusion, it is possible to note that companies should choose between the use of barcodes or RFID focusing on the size of their inventory, the nature of processes managed, as well as resources available. Barcodes can be regarded as a common tool that can still be applicable in many settings. The affordability of this technology is one of the major factors contributing to its popularity. However, companies that have large inventories or high-value products should consider using RFID as this technology ensures the necessary control over items location and conditions. However, there are chances that RFID systems will gradually replace the barcode technology as people need to process larger amounts of data.

References

Roberti, M. (2017). When RFID becomes obsolete. RFID Journal. Web.

Swedberg, C. (2017). More than 60 percent of manufacturers to use RTLS, RFID or bar-code tracking by 2022, says Zebra Technologies. RFID Journal. Web.

The Lab-Grown Meat and Process of Its Creation

Meat grown in the laboratory is becoming a common phenomenon for many states because this method reduces the final cost of products and is environmentally safe. The creation of an artificial product in the laboratory should begin with collecting animal stem cells, in this case, from a cow. Such cells are the foundation of a living organism, which allow muscle tissue to assemble into a live animal. The process of collecting stem cells is safe and harmless for the cow. The resulting material initially consists of fat and muscle cells, which scientists separate. A separate muscle cell is first dissected and then cultured (safely separated from the animal). After splitting it, it is placed in an artificial environment, where the cells begin to receive the necessary nutrients (amino acids and carbohydrates). One muscle cell is enough to grow up to one trillion other cells. The grown cells artificially merge and turn into small myotubes placed in a ring. Such myotubes have the peculiarity of constantly stretching and turning into a small strand of muscle tissue. It leads to the start of layering such tubes from muscle tissue on top of each other, forming a shape. One muscle cell isolated from a cow can grow into one trillion strands of muscle tissue, making it possible to produce many hamburgers. Such meat differs from the usual in its colour, improved taste and softness. The price of such burgers has already decreased hundreds of times, although the production of such meat began not so long ago, but is still inferior in price to the classic burger (Egan, 2018). With the development of production technologies, the cost of such burgers will continue to decline and will lead to the displacement of animal meat from the market.

Reference

Egan, S. (2018). Is lab-grown meat the future of sustainable food, or just plain gross? [Graphic]. EatingWell. Web.

The Programmer Ethos Advocated by Bob Stuart

Executive Summary

This paper delves into the programmer ethos advocated by Bob Stuart and attempts to dissect it based on a variety of ethical frameworks in order to determine whether his ethical position is dubious or legitimate.

Who are the key stakeholders represented in this case study?

When examining the various factors in this case studying involving the distribution of gambling software, it was determined that there are 2 main stakeholders, namely:

  • Bob Stuart and his Company
  • The government and its agents who are accusing Stuart of illegally abetting in illegal online betting.

For each key stakeholder group describe the situation from their professed viewpoint

Point of View of Stuart and his Company

From the point of view of Stuart and his company, he did nothing wrong when he made and distributed the software to various international users. His argument focuses on what he deems as the concrete fact that he should not be held liable for what other people did with his software. In order to better understand this viewpoint, this paper will examine the rhetoric in the arguments presented in order to better understand the logic behind them.

Rhetoric can be described as the use of language in order to achieve a persuasive effect on people, in other words, it is a form of delivery that entails being able to convince people of the validity of the argument being given. On the other hand under Aristotles treatise on rhetoric, the concept of ethos is thus defined as the credibility of a speaker in which through this credibility they are able to convince people that he/ she is believable in what he/she is saying. What must be understood is that programmers have a great deal of understanding regarding what constitutes progressive behaviour both in the creation of software and on the internet.

As such, they are often considered to be a reliable source of information regarding what changes should be implemented and what types of programming can be utilized. In this particular case, the use of rhetoric by the programmer can be seen in his statement regarding freedom of sale, open access to information and information sharing.

He is trying to justify his actions by stating that through his own experiences in this current field of interest, he knows what constitutes legal/illegal activity and what is simply another type of business arrangement. It is based on this that the programmer is attempting to convince listeners that on the basis of his experience in the development of software applications, he in effect did nothing wrong despite the fact that his software had a high likelihood of being utilized in illegal gambling practices by its very nature.

What are the major areas of conflict between these viewpoints?

The major areas of conflict in this particular case lies in a difference in views regarding the distribution of software and its potential effects. On the one hand, you have Stuart saying that he developed and distributed his software legally, and it is meant only for companies that are based in regions where online gambling is legal. From the point of view of the government, it is the manner in which the software was created wherein it had the potential to aid in illegal gambling activities which is a cause for concern since, despite Stuart saying that he did not distribute his software to illegal buyers, the fact remains that it still had the potential to promote illegal online gambling which it was utilized n.

Point of View of the Government

From the point of view of the government, what Stuart did in licensing and distributing his software is considered a breach of the law since by the very design it could, and did, promote gambling activities which were considered illegal in the state of New York. What must be taken into consideration is the fact that upon examination, the ethical argument of the programmer does indeed have merit given that it seems to be a simple business arrangement that the government is taking out of context.

If Aristotles treatise on rhetoric is to be used, then it can be said that the position the programmer is taking in trying to be persuasive in his message regarding the legality of his actions is one based on the concept of ethos in which he justifies his request for the charges to be taken away based on his expertise in the field and how he perceives what he did as being completely legal. What must be understood though is that while such a method of argument is in fact rather effective in the case of programmers, one cannot help but think his ethos of not being responsible for what others use his program for is rather self-serving in terms of allowing him to justify his future actions in terms of what he believes is right.

International Code of Ethics

According to studies such as those by Giustozzi & Van Der Veer Martens (2011), the concept of accountability should not be interchanged with that of responsibility. Responsibility is considered the manner in which a programmer is responsible for the actions of their software to a certain degree (Giustozzi & Van Der Veer Martens 2011, pp. 1-12).

This does not mean that they are liable for all errors committed; rather, they are responsible for actions committed which are done based on what the software was meant to accomplish which they knowingly programmed into the code of the software. In the case of accountability, this takes the form of being accountable for the success or failure of particular programs based on their performance. A programmer cannot simply offset the blame towards his/her clients; rather, regardless of errors committed that programmer was still liable for the aftereffects of the program and should face the consequences of such actions.

Australian Computer Society (ACS)

When examining the ethical provisions of the ACS, there is one aspect of it that is immediately relevant to the case, and that is the impact of ones work on the public interest. This means that while a programmer is free to develop a piece of software for commercial applications, he/she needs to take into consideration how his/her work could potentially adversely impact the lives of other people (Bowern et al. 2006, pp. 169-181).

While it may seem that in the case of Stuart and his company that his actions are legal, the fact remains that since the program can knowingly contribute to illegal gambling which is regulated due to its negative societal effects this means that he did not follow the proper ethical guidelines if he was part of the ACS since his work can, and possibly did, contribute to an illegal activity that did nothing for the general public good (Warren 2006, pp. 167-168).

British Computer Society (BCS)

In comparison, the same can situation can be seen in the case of the British Computer Society wherein it is implicitly stated in their ethics training apprenticeship program that ethical action needs to be one of the cornerstones of a software developer and this takes into consideration not only who you develop the software for but what can it be utilized for if the proper safeguards are not put in place (Goth 2004, pp. 96-99).

In the case study, it can be seen that Stuart did not put in the proper safeguards to ensure that the software could not be shared between a legal institution and an illegal one. This lack of a sufficient safeguard contributed significantly to its use in illegal gambling and should have been a fact that he had to look out for but did not. Various companies put blockers to ensure that their proprietary software could not be shared to illegal parties and for use in purposes that they were not originally intended. So it is strange that Stuart had not put in a similar practice which the BCS states are almost a standard aspect of many types of software at the present which are utilized in highly sensitive industries (Gilbert 2009, p. 5).

Comparison to China

In a rather surprising comparison, it was seen in the case of the programming ethics of China that more focus is placed on the intended effect of software rather than liability being placed on the programmer for the use of the software outside its intended use (Best 2006, pp. 213-235). This means that for China, what Stuart did was perfectly legal and could even be constituted as being protected under their intellectual property law. When examining the case of China, it was noted that there is a distinct lack of corporate social responsibility framework within the country which more than likely contributes towards this position of actually considering the lack of ethics on the part of Stuart as being ethical (Botes 2012, pp. 927-928).

Ethical Framework

The concept of ethos can be described as a form of guiding beliefs that are an inherent part of a community of nations character. It is used as a guide that influences a persons behaviour to such an extent that by examining the ethos behind a culture you can determine how they will react based on a given situation (Swaidan 2012, pp. 201-213). It due to this that concepts behind any form of ethos must first be subjected to intense examination before it is shown to have been constructed under a proper ethical and moral framework.

It must be noted that the set of ethical boundaries embodied by the ethos of programmers have actually dictated the course of the programmer culture leading to instances of innovation in order to give consumers a choice over the software bundles sold to them by corporations at high prices.

What must be understood is that Ethos can also refer to the way one presents himself or herself in an argument. This particular image refers to a persuaders character in the sense that a person is attempting to persuade another person of the righteousness of their statements based on their inherent character. In the case of the ethos of the programmer in the case, this takes the form of the programmer attempting to convince other people of the righteousness of his cause on the basis of the image that they are portraying, namely, as individuals that have a great deal of experience and knowledge regarding computer systems and how they work. It is this argument on the basis of a projected image that is a cause for concern since basing it on a persons knowledge, and experience alone does not justify the action itself.

For example, a person may argue for the righteousness of a cause on the basis of their knowledge of the event yet this attempt at persuasion may in itself be self-serving for the person that is attempting to persuade other individuals.

An examination of the motivations behind the ethos of the programmer reveals that should individuals accept his form of ethos and implement it, it benefits programmers more so than regular individuals since in essence, it is an argument that states that a programmer is not liable for how their software is used. The programmer ethos in itself is actually self-serving towards the programmer since it justifies his actions under the basis of a righteous cause (i.e. merely be an entrepreneurial businessman) yet in the end is more beneficial to them than to other individuals (i.e. promotion of gambling in areas where gambling is prohibited).

In the case of ethos, what must be understood is that it is artifice, meaning that is created, manufactured, made, constructed etc. It can be considered a type of surface image which may, in fact, have an entirely fictitious relationship to what is actually true. The same can be said for ethos wherein the method in which the idea is packaged drastically changes the perception of the audience towards accepting the idea itself or the validity of its statements.

In the case of the programmer, the ethos, when boiled down to its very essence, is merely a statement which says the following: let me do what I want with computer systems and programs. It is in the way that it is packaged and presented to the public that changes the perception of the public to the idea that is being presented. What the public sees is an argument for freedom and innovation what it is, in essence, is a statement to be allowed to do whatever they want.

In the case of the ethos that the programmer is advocating, its justification is based on the knowledge and experience of the programmer yet there is nothing actually stating that the various principles that it is composed of, though appearing ethically sound, were created on the basis of ethics alone. For example, while he acknowledged the fact that his software could have been utilized and rented out to other businesses where gambling is illegal, he himself should be absolved from the blame since he was unaware of such an event. The problem with this is that the fact that he knew it was a possibility and the very nature of the software itself could have allowed this to occur shows how he knowingly developed and released a product that could have resulted in illegal gambling activities.

Individual Opinion

Based on the presented information it can be seen that ethos can be manufactured and created for a certain purpose and in the case of the ethos professed by the programmer, its basis is one which advocates the freedom to let programmers do what they want without regard for the consequences of the use of their software. The fact remains that due to reasoning of the ethos advocated by not only this programmer but others in the same field that keeps on justifying itself on the basis of the knowledge of programs regarding certain systems, programs and methods of operation it shows itself to be inherently flawed.

The ethical flaw in this particular case is the fact that basing a system of ethos on inherent knowledge and expertise creates far too many risks in terms of the ethical principles behind the creation of the ethos itself. In fact, further examination of the ethos of the programmer reveals that it seems more self-serving to the programmer than to the general public since his software promotes what the government has deemed as illegal.

As it was established earlier, the concept of ethos can be shaped and molded in order to entice greater public support for a particular issue. That is what is being seen in the case of the programmer wherein the justification for actions is based on an ethos that has been molded to create positive public opinion, but in fact, is nothing more than a method of allowing the programmer to do what he pleases.

The Spread of Internet use, Information Technologies and the Hacker Ethos

The concept of open access to information is actually based on the U.N declaration of human rights which specifically states that people have the right to free access of public information, especially those concerning the activities of the government. This particular concept was adopted by the present-day hacker culture to mean transparency in the development of systems and direct access to information, hidden by the government or private institutions.

For hackers, open access to systems means an ability to analyze the way they are constructed, learn their fundamental aspects and build upon them to either enhance or reinvent the systems in a way that is better in terms of functionality and usability. It has been shown that open access to information often leads to greater levels of creativity resulting in the development of better and more efficient information systems and programs. On the other hand, corporations argue their right to maintain the integrity of their proprietary systems due to the sheer amount of expense and investment they devoted towards their creation.

These corporations do have a point; the amount of work and money that went into the development of various programs and systems constitutes a multi-billion dollar international industry that provides jobs to thousands of people. They are able to make money due to their possession of a particular system or program that is a necessity to a large consumer market. Take for example Microsoft, it is one of the largest software companies in the world and has nearly 90% of the total PC market in terms of overall sales of its software series. Allowing access to the proprietary information that went into the development of its systems is the same as wasting all the time and effort that went into creating that particular operating system. Open access in this case means a high degree of possible replication, resulting in the loss of company profits.

The basis of this argument can be seen in the pirated software industry where illegal copies of Microsoft operating systems have resulted in billions of dollars lost in potential profits. Aristotle states that even when laws have been written down, they ought not always to remain unaltered, in this particular case it can be seen that the written law is the intellectual property right companies have over software while open source initiatives represent a possible alteration to this law. It must be noted that current intellectually property laws, while designed to protect the rights of companies, are actually inhibiting the progress of software.

Such an argument is based on the fact that open source initiatives have been shown to have a greater degree of innovation and exploration of new methods as compared to isolated developments within a company. While it may be true that for companies the concept of the hacker ethos that believes in open access to information is in fact bad for company profits, it actually all boils down to the lack of will on the part of the company to innovate itself to such an extent that, it could make a profit while at the same time allowing open access to developed information. The argument of hackers in this case is that the software sold my Microsoft is too overpriced and cannot be afforded by a large percentage of the global population.

The result is a strange twist in ethics wherein under the belief that there should be an open access to information hackers take it upon themselves to crack the various safeguards placed on proprietary systems and software in order for it to be distributed for free online. This can be seen on the various torrent files available on Piratebay.org where operating systems such as Windows 7 have been sufficiently cracked by hackers so as to be able to be installed by most users.

This apparent Robin Hood like behavior, while based on the concept of the hacker ethos, is for the most part highly unethical in most cases. As such, it can be stated that what is happening right now is in fact a fight between two different kinds of ethos namely the ethos of openness and sharing as advocated by hackers or isolation and integrated development with profit in mind as shown by corporations.

While it is not a representation of all people within the hacker culture, it has been noted that various moral hackers do attempt to crack into various proprietary systems just for the sake of being able to do so. An examination of famous hackers such as Kevin Mitnick reveals that for them the concept of the hacker ethos is a method of prevention for excessive government or corporate control over the internet or the development of software.

Aristotle states for the things we have to learn before we can do them, we learn by doing them, in this particular case it can be seen that the hacker ethos in which systems are breached or software is de-encrypted is actually under the concept of learning by doing wherein innovation is actually done through action and in this particular case it is development of new systems, attempting to crack software and use it for their own end or other similar types of behavior. The fact is in the eyes of hackers the only true way for innovation to drive itself forward is by experimenting and attempting to go beyond what companies seem users to be capable of. They state that they mean no harm but the fact remains that cracking a particular system or program is still considered an illegal action.

Reference List

Best, K 2006, Visceral Hacking or Packet Wanking? The Ethics of Digital Code, Culture, Theory & Critique, 47, 2, pp. 213-235, Academic Search Premier, EBSCOhost.

Botes, V 2012, Flight of fantasy: writing a full proof code for ethics, Accounting, Auditing & Accountability Journal, 25, 5, pp. 927-928, Business Source Premier, EBSCOhost.

Bowern, M, Burmeister, O, Gotterbarn, D, & Weckert, J 2006, ICT integrity: bringing the acs code of ethics up to date, Australasian Journal Of Information Systems, 13, 2, pp. 169-181, Business Source Premier, EBSCOhost.

Gilbert, T 2009, Ethics in Social Work: A Comparison of the Intl Statement of Principles in SW with the British Code, Journal Of Social Work Values & Ethics, 6, 2, p. 5, Academic Search Premier, EBSCOhost.

Giustozzi, E, & Van Der Veer Martens, B 2011, The new competitive intelligence agents: Programming competitive intelligence ethics into corporate cultures, Webology, 8, 2, pp. 1-12, Library, Information Science & Technology Abstracts, EBSCOhost.

Goth, G 2004, Source Code Controversies Not Just about Security, IEEE Software, 21, 4, pp. 96-99, Academic Search Premier, EBSCOhost.

Swaidan, Z 2012, Culture and Consumer Ethics, Journal Of Business Ethics, 108, 2, pp. 201-213, Business Source Premier, EBSCOhost.

Warren, M 2006, AJIS FEATURED THEME: ETHICS IN INFORMATION SYSTEMS, Australasian Journal Of Information Systems, 13, 2, pp. 167-168, Business Source Premier, EBSCOhost.

RBS WorldPay and ChoicePoint Companies Data Breaches

Nature of the incident

A hacker managed to enter into the companys computer systems. That is, hacking the electronic cash dispensation mechanisms and interfering with millions of clients information.

Perpetrators

The perpetrators of the cyberattack include Sonya Martin who was the alleged leader of the hackers. Nine others said to have been in the hackling cell included Sergei Tsurikov, Oleg Covelin, Evelin Tsoi, Viktor Pleshchuk, Igor Grudijev, Ronald Tsoi, Mihhail Jevgenov, and one identified only as Hacker 3 (Kitten 1)

Method of exploitation

The method was complicated and well-ordered. The hackers decrypted client information gained from the companys network. Debit cards were later generated with the customers details. The hackers used the cards to withdraw money from ATMs in different global locations.

Purpose of the attack

The attackers of WorldPay intended to steal personal information stored in the companys database. Identifiable information would be used to defraud the companys customers. The information would be used to steal money from corporate, financial institutions, medical institutions, and government entities.

Kind of information security breach achieved

All of the attacks were financial-driven. The skimmers would use the information gained at the gas pump station, point of sale devices, and ATMs. Customer information was gained by unlawful individuals and eventually defrauded. Company customers lost millions of cash.

The damage was done and the estimated cost

The attacks had a severe financial impact on the global company. A huge amount of money was lost. The company had to refund the clients. Further, the company lost the confidence of the public.

Countermeasures or damage repair

The company hired security system experts to upgrade the system. The company notified individuals who may have been affected and gave them the course of actions to take. The company changed all the PINs of all the cards. To repair the business damage, customers would not be responsible for charges that occurred.

Mechanisms and Strategies to address the Vulnerabilities

The internet is increasingly being used by individuals, financial institutions, and corporations. At the same time, hackers are taking advantage of the user increase. There are multiple protection and countermeasures to deal with internet-based attacks. First, assessing the intensity of the risk to the organizational asset is essential. The move facilitates the determination of proper countermeasures for diminishing the risk, choosing how to protect computing assets and essential assets such as emails. Second, measures such as the installation of firewalls and intrusion detection systems can be done. They help to monitor the network for malicious behaviors. Third, it is essential to backup all information. This should be done periodically and systematically. Additionally, it is important to have a clear security policy to reduce risk. This may include prohibiting employees from opening personal e-mail attachments from the company computer workstations. The network manager at this stage will be making risk management analysis that protects the organizational computer hardware and software. However, the data asset should be backed up immediately after the creation of the security perimeter.

According to the breach, organizations must consider using IPv6. The technology presents organizations with enhancements to avert IP spoofing including authenticated headers in every packet. The network manager should install patches and updates whenever obtainable to avert defense attack damage. Additionally, using IPv6 allows the installation of Intrusion Detection Software (IDS). IDS may include MacAfee Intercept or Source Fire Snort. In addition to this tool, the system manager should ensure that all employees are advised to disable unnecessary web services. The move helps diminish the number of attack targets. Essentially, the system manager should remove files from fundamental directories. Based on the breaches, it is important to do this given that virtual directories can be used as a location for the placement of malicious codes.

The employees should be advised to utilize Secure Sockets Layer (SSL). The move will help to encrypt any communication. Furthermore, it facilitates the disabling of HTTP traces to mitigate the investigation of HTTP by attackers searching for prospective targets. When attackers get the authority to investigate the HTTP request paths, such information may be used to take sensitive data. Finally, system managers must consider the installation of Microsoft Security Baseline Analyzer. The tool radically scans computers for protection vulnerabilities. Besides, it provides a wide range of information that entails missing updates, configuration errors, and account system.

How the RBS attack related in general to CIA triad

The Criminal Investigation Agency (CIA) triad data information security model discovers the classification and integrity as the foundation as well as the reliability of information protection. The CIA hence is a central player in handling information. The triad has an essential role to play in securing information. In this context, the classification of information means that data must be guarded against unpermitted users. The classification includes defense against the transmission of sensitive data via the internet. The CIA can ensure that such data is not transferred to the intended user via interception. On integrity, the CIA has a role to ensure that protected information is not intercepted when on transit. CIA has cryptography capabilities that inherently prevent swindling during internet payment. The mechanism increases the protection of the bank clients to certify that the client is the only original individual with authentication for the internet transaction.

Suggested new security implementations, rules, and regulations

According to Cate, it was suggested that institutions embrace the freeze laws (p.7). These are laws that allow individuals to confine admittance to their credit reports. The strategy will diminish the ability of possessors of the breached personal data to exploit it for committing fraud.

ChoicePoint Data Breach

Nature of the incident

Consumers had their personal and financial information accessed. These involved more than 163,000 clients in the companys database. According to the Federal Trade Commission (FTC), ChoicePoint possessed no rational processes for screening subscribers. Primarily, ChoicePoint collects personal data of consumers including dates of birth, Social Security numbers, names, work information, birth dates, and credit profiles. Then it sells the information to more than fifty thousand businesses. The company upon collecting information gave the consumers sensitive personal data to subscribers. The company did not scrutinize subscribers whose request for the data raised clear red flags. (Farrell 1). The information acted as a lead to the company database.

Perpetrators

The company was the first perpetrator. For instance, it availed the consumer personal information to subscribers without authenticating the credibility of the subscribers. These imposters posed as business executives to purchase information from the company. A little hint in the obtained information would be used to hack the company servers from remote locations.

Method of exploitation

According to FTC, the company approved individuals who posed as subscribers and lied about their credentials. The imposters used saleable mail as business addresses. ChoicePoint did not make due diligence to establish the authenticity of the business addresses. Additionally, the companys applicants for subscription allegedly used faxes located in public establishments to send numerous requests for supposedly separate organizations (Farrell 1). They then used limited clues such as names to hack into the companys database and get consumer information.

Purpose of the attack

The subscribers used names to enter into the ChoicePoint database. They would then obtain information regarding consumers to establish their financial endowment. They would impersonate such individuals to enter into rewarding transactions through identity theft.

Kind of information security breach achieved

Despite the reception of subpoenas from the law enforcement agencies raising alarm about the potential sham activity in 2001, ChoicePoint did not intensify the request approval processes or screen subscribers. The company hence breached the Fair Credit Reporting Act (FCRA) by supplying consumer information and credit histories to applicants who lacked permissible purpose to obtain the records. The failure to preserve rational processes for the verification of the applicants identities and how they intended to use the information was an information security breach on the part of the company.

The damage was done and the estimated cost

The personal and financial information of more than 163,000 consumers were compromised. The data management and its protection procedures by the company violated the clients right to privacy and national laws. Upon lawsuit by consumers, the judge ordered the company to settle $10 billion in civil penalties and $5 billion in consumer redress. The financial damage suffered by consumers has not been properly documented. However, it is projected to be in millions through unlawful withdrawals.

Damage repair

The company was ordered to settle civil penalties and consumer redress charges. However, this did not clear the companys image from the public face. The company had to send letters to individual consumers whose data they had sold to illegal subscribers. The company further published in the dailies a formal apology to all those affected.

Suggested new Security Implementations, rules, and regulations

The Federal Trade Commission urged the court to ensure that ChoicePoint was ordered to apply the new processes. The suggested policies required the company to supply consumer records to lawful businesses for lawful objectives only. The company would also set up and retain a comprehensive data protection program. Upon settlement of the identity theft breach, the company was required to acquire assessment by an autonomous third-party information protection expert annually until 2026 (Farrell 1).

Cost of Cybercrime in the United States

Data breaches are alarmingly widespread incidents as many organizations continue to increase businesses electronically. Information handled by the organization is increasingly becoming a key concern for executives. In any case, all a hacker requires is an Internet connection, an agreeable collaborator within the organization, and an indolent system manager or a slapdash employee with a computer to get the right of entry to data gigabytes.

Regardless of what one calls such occurrences, information security breaches, data breaches, or cybercrime, the result is similar. An unauthorized person illegally accesses the names and personal information of all those in the database. The risk that the individuals will become prey to identity theft is substantially increased. Other security breaches may include the stealing of intellectual property, confiscation of online bank accounts, denial of service, virus distribution, site defacement, and sabotage of critical national infrastructure. Information security breaches have a far-reaching impact on breached organizations, related companies, employees, and clients. The United States has not been spared from the menace.

Contemporary, cyber-attacks are common occurrences. Cybercrimes are costly for organizations and individuals affected. The most costly cybercrimes are those arising from service denial, web-based attacks, and malicious insiders. A study conducted by the Ponemon Institute indicated that the standard annual cost of cybercrime is $8.9 million. Out of the 56 companies where the institute conducted the survey, the cost was $1.4 and $46 million for the least and the most cyber cost respectively. Compared to other countries, companies in the United States are more likely to be attacked and experience the most costly types of attacks. The US companies experience the stealing of information assets more than any other country.

Researchers have observed that all industries in the US experience cyberattack though in varying degrees. The costs of such attacks also vary depending on the industry. The energy, defense, and financial industries are attacked more often and experience higher costs compared to the hospitality and retail companies.

Migration to cyber-attacks demands technologies that enable effective protection such as invasion deterrence systems, SIEM, and application protection testing is apparent. Others include business management, cyber risk-management systems, and security compliance solutions. Cyber attacks on any organization are costly if they are not swiftly handled. There is a positive link between the duration taken to control an attack and the overall corporate cost. The study conducted by Ponemon Institute (2012) indicated that the typical time to solve a cyber attack was twenty-four days. The typical expenditure to the attacked was computed to be $591,780 for the twenty-four days. For hateful insider attacks, it may take between 50 and 60 days to resolve.

Conversely, for companies in the US particularly those that have immense personal information, data theft persists to represent the uppermost outside cost, which is consequently followed by the expenditure related to the distraction of business due to such attacks. On an annual basis, data-stealing represents 40 percent of the total outside expenditure. The expenditure related to business distraction and enterprises or the lost essential productivity represents 30 percent of outside expenditure.

When the attack entails malicious inside attacks, the cost is even advanced since it would involve the loss of devices such as computers, memory sticks, external hard disk drives, and flash disks. In this context, outside expenditure is that created by outside factors including litigation, fines, and the selling of intellectual properties. Detecting attacks, recovering information, and resolving to seal all the loopholes are the most expensive inside expenditure. On an annual basis, these activities represent more than 47 percent of the total inside activity expenditure. Inherently, cash payout and labor account for the bulk of the expenditure.

Cybercrime Interception

Since cybercrime is expensive for companies, companies must take measures that will help mitigate the costs associated with attacks. This involves investing sufficiently in these structures. Deploying safety intelligence systems (SIEM) presents a significant difference. The expenditure on cybercrime is regulated downwards with these systems. Companies that adopt constant use of these technologies are proficient in discovering and controlling cyber attacks. Research indicates that such companies were able to save an average of $1.6 million when contrasted with organizations that did not deploy security intelligence technologies (Ponemon 4).

Research also indicates that it is important for an organization to embrace a strong security approach to mitigate the costs associated with cybercrime. Such an approach would involve metrics such as the popular Security Effectiveness Score (SES). The SES is a metric used in defining the ability of a company to attain rational security objectives. When the SES is high, the efficacy of the organization in attaining its information security is also high. The typical cost for the mitigation of cybercrimes for companies with a high SES is significantly lower compared with companies with a lower SES score.

Works Cited

Cate, Fred. Information Security Breaches. The Centre for Information Policy Leadership, 2.3(2008): 1-29. Print.

Farrell, Claudia 2013. ChoicePoint Settles Data Security Breach Charges: To Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress. Web.

Kitten, Tracy 2012. RBS WorldPay Sentence Too Light? Bank Info Security. Web.

Ponemon Institute 2012. The 2012 Cost of Cyber Crime Study: United States. Web.

The Need for Links Between Creativity and Coding

Introduction

The twenty-first-century society is placing a larger focus on innovation as the driving force for development. When some problems arise, finding solutions requires not only the desire, skills, dedication, and time; it also requires creativity. No matter how surprising it is, creativity is currently at the center of modern activities and professions in the modern workplace. In terms of coding, creativity is also required; however, problem-solving is not the main issue.

Rather, creativity is needed to come up with doing something that could not be done previously. Therefore, exploring the links between creativity and coding has been identified as imperative. In the present study, the positive effects of creativity and coding will be evaluated both from the big picture perspective as well as the narrow look on specific arguments in support of the topic.

Background

Starting from the overview of creativity as a concept, it is defined as the ability to produce original and usual ideas or to make something new and imaginative (Cambridge Dictionary). However, this concept is far from being as simple as its dictionary definition. As mentioned by Resnick, the process of creativity is represented by a spiraling cycle of six stages (Figure 1) that begin and end with imagination (1).

This cycle is perfectly catered to the needs of modern learners needs and expectations in terms of developing creative thinking skills. The stages can be enhanced with the help of modern technologies that capitalize on the success of traditional materials while extending the knowledge and skills developed through creativity.

Creativity cycle
Figure 1. Creativity cycle (Resnick 2).

The spiral of creativity proposed by Resnick can be traced back to Hegels sublation spiral. The philosopher postulated that that is what everything finite is: its sublation (128). The concept of sublation is a translation from German aufheben. It is also referred to as abolishment, preservation, and transcendence, and is used for explaining the phenomenon that occurs when a thesis and antithesis interact. The spiral of creativity suggests that a creative idea starts with imagining something that can be created. This creation can then turn into a game that is played and shared. The entire experience results in a reflection that leads to new ideas and imagination.

Coding and Creativity

When it comes to coding, technologies used within the process enable creativity as it requires the reflection on past experiences and the redefinition of things that have been previously done differently. With the growing diversity of technologies and the expanding variety of consumer demands, coding must be creative. This can be illustrated with the help of examples from online tutorials such as the Hour of Code developed to teach users creative coding.

For the present exploration, a short tutorial for the Dance Party game available on the Hour of Code website was completed. The game was created by a dancer and software developer, Miral, (see figure 2) who supports the proposition that coding and creativity go hand-in-hand. Even the sole fact that the Dance Party was developed by someone who dances and creates software at the same time suggests the existence of multiple creative perspectives on coding. With the help of fellow creative people such as Aloe (figure 3), who is a singer and songwriter, the game has acquired a unique flare regarding the musical arrangement.

Miral
Figure 2. Miral.
Aloe
Figure 3. Aloe.

The Dance Party represents the epitome of coding and creativity working together to result in a fun and unique experience that will spark users imagination and satisfy the desire to play. During the tutorial, the users are instructed on how to create a virtual dance party using different fun characters and dance moves (see figure 4). The range of characters to select from depends on the creative desire of the developer, thus enabling the spirit of imagination.

The crazier the characters are and the more dance moves they do, the better. What is interesting about the tutorial for the dance game is that the target audience for the coding lesson is very vast: from second-graders to college graduates who are not that familiar with coding. Basic principles of coding are applied clearly, and the fun design of the characters enhances the experiences and makes it more interactive.

Dance moves.
Figure 4. Dance moves.

What is imperative to note is the attention to detail and the desire to engage users in creative coding by offering an extensive list of songs from which users can choose. From the old-school A-ha to Selena Gomez (figure 5), the list includes a range of songs that users of any age or musical preference can find appealing. This feature reflects the dance background of the developer who managed to combine creativity and coding in an engaging way for users.

However, the Dance Party is targeted at users who are familiar with the popular culture of the 21st century, and even the dance moves that characters do are rather modern. For example, dabbing and flossing are moves that have become popular only recently and will be understandable to those familiar with them. The game presents an opportunity for potential code learners to experiment and be entertained when completing basic tasks. The Dance Party follows the play space, toolbox, and workspace format (see figure 6). Such a simple breakdown between potential work areas is clear to users of any knowledge level while also playing the role of a creative outlet.

The list includes a range of songs
The Dance Party

If to assess the combination of coding and creativity from business and political perspectives, the example of the Dance Party also applies. The developer of the game is an evident representation of the creative class, which is defined as a socio-economic group (coined by Richard Florida), which drives the economic development of US post-industrial cities. Miral belongs to the super-creative core of the creative class and uses her knowledge and talent to combine dance and coding. Thus, the seemingly incompatible relationship of creativity and coding works and it does so with tremendous benefits for societys technological advancement and the expansion of skills.

In terms of the business perspective, software and games sell well. However, there is one important condition under which the latter can become successful  they have to be creative. Examining the most popular games of recent years, it becomes clear that the most elaborate, unexpected, colorful, and enticing games make the top of charts (The Most Popular Video Games Right Now). For instance, Fortnite, which is the most popular game at the moment that has amassed 125 million active players, is accessible, social, and spectacular. The creativity of its developers allowed them to include numerous enticing characteristics to make the game as attractive as possible, which lead to it becoming a cultural phenomenon (Conway). Without creative coding, Fortnite would have been more likely to fail.

The analysis has shown that coding is a complex creative process that requires users to think outside the box. Not much opposition to this finding has been presented since most people with the knowledge of technologies and computer science will agree that creativity is crucial. Criticism is directed not at creative coding per se but rather at software in general. It has been argued that the extensive knowledge of coding of people with inappropriate training can result in increased harm (Ko).

While this argument does not apply to creativity, it reflects the concern of some people as to the power technologies give to people, which is understandable and worth acknowledging. However, one important challenge to note as to creativity and coding is that the final product does not bear the meaning of creative work. Programmers are not seen as the producers of art but rather as professionals with the understanding of mathematics, symbols, and structures.

Conclusion

In summary, the combination of coding and creativity represents a unique opportunity for developing technology skills. Coding requires users to think critically and creatively while practicing their skills as often as possible. Programming is enticing because it can turn the ideas that were once imagined into reality. What is interesting is that both extremely artistic software developers and those who have no artistic inclinations can still be very creative when coding. Therefore, the same way in which painters share murals, those who code can create life-changing things and share them with the world.

Works Cited

Cambridge Dictionary. Creativity. Cambridge Dictionary. Web.

Conway, Steven. The Clever UX that Made Fortnite a $1.2 billion Sensation. Fast Company. 2018. Web.

Hegel, Georg Wilhelm Friedrich. The Encyclopaedia Logic, with the Zus Tze, Hackett Publishing Company, Inc., 1991.

Ko, Andy. Why People Shouldnt Learn to Code. Medium. 2018. Web.

Resnick, Mitchel. All I Really Need to Know (About Creative Thinking) I Learned (By Studying How Children Learn) in Kindergarten. MIT Edu. Web.

The Most Popular Video Games Right Now. Ranker, 2018. Web.

The Influence of Technological Elements on Business

Introduction

Today, innovative technologies and progressive components are among the most essential, significant, and critical factors in production performance. Indeed, each company solves the issues of the need to apply the latest improvements and nanotechnologies in different ways. Nevertheless, a technological breakthrough allowed many firms to achieve success and prosperity in general terms. The introduction of information technologies is associated with severe changes. They include transformations in the structure of costs, the design of labor resources, capital, and the organization of the production process. If such changes have already taken place in general or have been happening for a long time, then the simplest econometric methods reveal the effect of IT implementation. Introducing technical elements into a companys internal system is one of the best and most effective ways to increase an enterprises overall productivity.

Impact of Technologies on Firm Productivity

Artificial Intelligence (AI)

The papers authors should consider the following technology and innovative components to create a complete case picture. Firstly, artificial intelligence (AI) is one of the entrepreneurs most influential and high-quality technologies. As practice shows, using this innovation increases operational efficiency, expands potential opportunities, and enhances the management of available resources. AI optimizes processes, improves the automation of information received, calculates, predicts, and actively interacts with people (Wamba-Taguimdje et al., 2020). Moreover, according to Wamba-Taguimdje et al. (2020), a wide range of technologies that AI covers allows companies to adapt to their ecosystem or destroy it in order to develop, improve, correct, and optimize strategic and competitive advantages. There is a relatively vast abundance of real examples of the application of this innovation in the world. For example, an AI-based antivirus implements various anti-fraud technologies, analyzes old threats, and warns new ones, as well as manages information to create a common database. Therefore, devices used by a firms personnel are protected because the technology automatically extracts existing threats and prevents potential ones.

Blockchain

Secondly, one should also mention blockchain technology, a decentralized database that is simultaneously stored on multiple computers connected to each other on the Internet. Such innovation improves the management of various operations in special programs. It ensures stable, reliable, and continuous work in a firm, allowing users to keep in touch and exchange essential data (Di Vaio & Varriale, 2020). According to Kim & Shin (2019), blockchain technology forms a steady growth in the spectrum of supply chain management, providing intelligent contracts, data immutability, information transparency, reliability, consistency, and connectivity. One of the examples of the successful implementation of blockchain in real life is the automation of international payments in thousands of banks worldwide. Undoubtedly, the technology has many positive aspects, but it does not guarantee to achieve the highest indicators results. On the one hand, blockchain has a beneficial effect on a firms productivity through the growth of partnerships. On the other hand, the alliances effectiveness can cause damage and negatively impact the efficiency and productivity of a business. Therefore, blockchain requires extraordinary refinement and a lot of cooperation and training.

Cloud Computing

Thirdly, cloud computing is also one of the crucial ways to ensure productivity within a company. The technology greatly expands communication possibilities between partners, thereby bringing more profit and profitability (Attaran & Woods, 2019). Furthermore, the research results demonstrate the unique operational and strategic advantages of using cloud computing, such as improved productivity of SME processes and operations, increased flexibility, increased revenue, and cost minimization (Khayer et al., 2020). Cloud computing reduces PC computing power requirements and saves disk space. The technology demonstrates fault tolerance, security, high data processing speed, reduced costs for hardware and software, maintenance, and electricity. In addition, one of the best examples of cloud computing is the cloud for file storage and backup. Some popular platforms providing these services are OneDrive, Dropbox, Facebook, and Gmail. In particular, cloud computing demonstrates itself from the most advantageous side, coupled with AI innovations. Cloud computing technologies will undoubtedly evolve in the future, and artificial intelligence will take them to a new level. It is safe to say that both technologies will also determine the work methods within firms, data management, and peoples transactions.

Data Science

Fourthly, another equally important technology in the modern world is data science. Therefore, according to Monnappa (2022), data science empowers employees to make effective decisions. Furthermore, it identifies opportunities, helps staff define clear goals and target audience, encourages the introduction of best practices, and attracts suitable specialists. In the electronic or, in other words, information age, it is not easy to do without this science. Technology increases a companys value because with its help, data is used correctly, and decisions are weighed and justified. For instance, data science is particularly evident in the industry. Due to this technology, some manufacturers collect information, analyze and investigate them in the right way, and then create tactics and strategies based on the knowledge gained. This helps to predict and identify possible demand for certain products, optimize supply chains and avoid mistakes, risks, and difficulties. Consequently, this innovation becomes exceptionally challenging to underestimate or overestimate.

Entrepreneurship Related System

Fifthly, it is also required to single out, in this case, the system related to entrepreneurship. By and large, such a system unites many different interrelated elements around a common and ambitious cause. With its help, large-scale problems can be solved through close cooperation and teamwork. All these efforts aim to solve the most critical issues, not the symptoms and their individual parts. Hence, the system has a tangible impact on all participants in the competition process, spread indirectly through the use of marketing tools. Such an impact is captured by the market and requires an adequate response from various actors. One of the examples of the introduction of the entrepreneurship system is the innovative model of sales of the iPhone or Tesla electric cars based on creative aspects and the desire for perfection.

Conclusion

To sum up, it should be emphasized that technological aspects and innovative elements increase not only the overall productivity of a company but also private, indirect moments within an enterprise system. Hence, artificial intelligence (AI) dramatically simplifies and speeds up the work, automating and bringing it to perfection. In particular, such technology is fully disclosed with cloud computing. Thus, this cloud competently and skillfully permits people to use and distribute data. Moreover, with the help of blockchain, enterprises can reliably and independently identify their goods and services from each other. On the contrary, data science allows people in business to collect important information, correctly interpret it, as well as efficiently manage and control gained knowledge. The entrepreneurial system also enables one to look at situations from a completely different side and angle, realizing the complexity of the diversity of some roles and factors that interact with each other.

References

Attaran, M., & Woods, J. (2019). Cloud computing technology: Improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6), 495-519. Web.

Di Vaio, A., & Varriale, L. (2020). Blockchain technology in supply chain management for sustainable performance: Evidence from the airport industry. International Journal of Information Management, 52, 1-16. Web.

Khayer, A., Talukder, M. S., Bao, Y., & Hossain, M. N. (2020). Cloud computing adoption and its impact on SMEs performance for cloud supported operations: A dual-stage analytical approach. Technology in Society, 60, 1-38. Web.

Kim, J. S., & Shin, N. (2019). The impact of blockchain technology application on supply chain partnership and performance. Sustainability, 11(21), 6181. Web.

Monnappa, A. (2022). Why data science matters and how it powers business in 2022. Simplilearn Solutions. Web.

Wamba-Taguimdje, S. L., Wamba, S. F., Kamdjoug, J. R. K., & Wanko, C. E. T. (2020). Influence of artificial intelligence (AI) on firm performance: The business value of AI-based transformation projects. Business Process Management Journal, 26(7), 1893-1924. Web.

Modeling Methods and Techniques

Summary

Analytical modeling consists in constructing a model based on the description of the behavior of an object in the form of formulas. Simulation modeling involves the construction of a model with characteristics adequate based on any of its physical or informational principles. Heuristic modeling is a mechanism of self-learning a person based on their positive experience.

The Object-Oriented Approach

The object-oriented approach describes the behavior of objects and their interaction with each other. The object-oriented technique aims to maximize the reuse of objects by engineers when developing system requirements and system specifications.

Object Model of Object-oriented Technology

Each of these principles is not new in itself, but in the object model, they are applied together for the first time. The use of the object approach significantly increases the suitability for the reuse of programs and projects, which leads to the creation of a development environment.

The object approach consists of several well-thought-out design stages, which also reduce the degree of risk and increase confidence in the correctness of the decisions made (Isaiah et al., 2019).

Reference

Isaiah, A., Odi, A., Rita, A., Verginia, A., Anaya, O. (2019). Technological advancement in object-oriented programming paradigm for software development. International Journal of Applied Engineering Research, 14(8), 1835-1841. Web.