Organized Anti-RFID Essay Assignment

Organized Anti-RFID
Organized Anti-RFID

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Organized Anti-RFID

Order Instructions:

Find an example of an Organized Anti-RFID group that wants to stop the spread of RFID technology.

What are their assumptions about RFID technology and its impact on society and business?

Do you agree or disagree with the Anti-RFID group? Why or why not?

Below is a partial answer to the above homework questions by one of our writers. If you are interested in a custom non plagiarized top quality answer, click order now to place your order.

Organized Anti-RFID

What are their assumptions about RFID technology and its impacts on society and business?

Their assumptions are that the RFID technology will compromise the consumer privacy. The technology that is present on the products will track the location of the consumer and share it with others which makes them feel unsafe. Secondly, the manufacturers, government and other people interested in consumer information will easily track the consumer spending patterns (Kazmeyer, 2017).

This is a breach of the rights of individuals to privacy. Thirdly, the use of the RFID technology on students to track them where they are by the students and teachers is a way of treating them like inventory. This is a negative aspect as it interferes with the psychological and mental development of the students in the society (Anderson, 2015).

Fourthly, it increases the possibility of identity theft. The use of RFID on personal documents makes it easy for a third party to access the documentation. On the other hand, in the instance government agencies and business get the information in the wrong hands it can result in losses. The institutions are likely to end up endangering their security and profits which may result in immense damage (Kazmeyer, 2017)….

Get a Custom Essay Paper that meets your expectations by clicking ORDER

RFID technology Research problems inside the Apple Company

RFID technology
RFID technology

RFID technology

Order Instructions:

Formulate a research problem to solve with RFID technology, and the Apple company. Identify one key problem to study with RFID. Develop one hypothesis that will be the key question that would be addressed by such an analysis.

Below is a partial answer to the above homework questions by one of our writers. If you are interested in a custom non plagiarized top quality answer, click order now to place your order.

RFID technology research problems inside the Apple Company

Research problem

Apple Inc., among other leaders in technology, continues to take up wireless systems as part of their bid towards the progression of technology. Among the recent uptakes has been variants of wireless technology for data and information transmission, as well as wireless charging. Radio Frequency Identification (RFID) technology is primarily the backbone of such breakthrough technologies (Ghosh, Goswami, Kumar, & Majumder, 2015). At Apple Inc., for example, RFID and other related subsets are responsible for the development of such products as Apple Pay, Apple TV, and Apple Watch.

As Apple Inc. continues to develop new products based on radio frequency identification, the technology has morphed to include various subsets of similar technologies. In the case of Apple Inc., the most usable of these is the original RFID implementation, as well as the newer NFC (Hayashi, 2012). Each of these technologies has its advantages, as well as some drawbacks. Research and reports from Apple Inc. show an uptake of NFC by the company over RFID. However, could the advantages of the ‘Old school’ RFID outweigh the current and potential benefits of NFC?….

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Define TPS, DSS, and EIS

Define TPS, DSS, and EIS
Define TPS, DSS, and EIS

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Define TPS, DSS, and EIS

Order Instructions:

Define TPS, DSS, and EIS and explain how an organization can use these systems to make decisions and gain competitive advantages. In 250 words or more in the forum, please describe what a literature review is and why it is important.

Below is a partial answer to the above homework questions by one of our writers. If you are interested in a custom non plagiarized top quality answer, click order now to place your order.

Define TPS, DSS, and EIS

A Transaction Processing System (TPS) is a computerized system that helps an organization in the effective handling of daily operations, mainly through the recording of all viable transactions in an efficient manner. On the other hand, a Decision Support System (DSS) is a computerized system that helps various individuals in the organization make the right choices when faced with both semi-structured and unstructured decisions. The system does this through consideration of various plans, forecasts, and operations within the firm (Moraa, Wang & Gelman, 2013, pp. 319 – 321).

An Executive Information System (EIS) is a business management and strategic decision aiding system that encompasses functions that help management make larger decisions that encompass the entire firm (Anwar & Masrek, 2014, pp.995 – 996). Large enterprises make use of EIS at a senior level, where other tools and systems are limited in scope and storage capacity (Learn To Code, 2013).

How the organization can make use of these systems            

The availability of several decision aiding systems implies there is a solution for each problem regarding decision making within all types of firms. These systems allow for the subordinate members of staff, mid-level managers, and those in executive positions to collaborate in building business information through data. The systems allow for better collaboration between people, enhancement of existing and mental models, and control of information and databases (Moraa, Wang, & Gelman, 2013, pp. 320, 343)….

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Technology Usage Policy Essay

Technology Usage Policy
Technology Usage Policy

Want help to write your Essay or Assignments? Click here

Technology Usage Policy

Being an intern is one of the most learning processes in one’s education. I believe that through an internship, a person can acquire the skills needed to perform tasks in the field that one chooses to pursue. As an intern, I was able to train on the technology policy first. This was before my start at interacting with customers and learning processes and procedures regarding the payee program.

In this case, I was required to learn and comprehend the technology for the Freestore Foodbank. To begin with, it is important to note that the Freestore Foodbank is one of the largest emergency food and services providers in the world. The organization is focused on providing meals to low-income families and individuals. It is through this provision of emergency food that the organization reacts to the problem of poverty and food insecurity in the society.

On the other hand, the Freestore Foodbank can provide its employees with a scope of technology resources which include computers, telephones, e-mail, fax, and internet access. To a great extent, one can note that access to the organization’s communications system is not a right but rather a privilege. Through the guidelines provided in the communications system policy, there is the proper use of the system, protection for all users, and equal access and supervision of resources. If any employee is found to violate the stipulated policy guidelines, one is faced with disciplinary measures such as termination of employment. As an intern, I knew that I was not an exemption of this punishment.

Technology Usage Policy

Want help to write your Essay or Assignments? Click here

When it comes to ownership and control of resources, I came to learn that employees are assigned electronic gadgets such as desktops or laptops based on the job-specific criteria which are developed by the supervisor. The other elements that I came to learn are that the technology resources that are availed by Freestore Foodbank are the exclusive property of the organization and can only be used for business purposes. The third aspect that was made known to me was that the organization has all rights to at any time take possession of the computer or any equipment assigned to an employee. This is something that can be conducted randomly.

The other element that is contained in the policy is employee responsibilities. When it comes to security and maintenance, employees are held responsible for ensuring that the equipment that one is assigned to as an employee is handled securely. Secondly, personal equipment is not allowed into the organizations premises without prior authorization. The third guideline under security and maintenance is that no member of the organization’s network is permitted to harass any other individual. This to me was one of the significant and impactful guidelines since in modern days; cyberbullying has become an issue that has negatively impacted people and societies.

Another element under guidelines and which I found quite essential is the online security and passwords. Any access to data at the Freestore Foodbank is one that requires logins and passwords. As such, employees are called upon not to disclose any of their information to anyone else.  Through the technology usage policy, I was also introduced to the fact that the organization’s systems cannot be subject to personal use. Furthermore, I came to realize that just like any other company or organization, the prohibition of viewing or displaying content of questionable nature is prohibited by all means.  

Technology Usage Policy

Want help to write your Essay or Assignments? Click here

Toward an Ontology for Functional Requirements

Ontology for Functional Requirements
Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Toward an Ontology for Functional Requirements

Introduction

Software development is undoubtedly one of the most daunting tasks in the field of information systems and a key process involved is specifying software requirements aimed at understanding and defining the functionalities required from the software (Lauesen, 2002). This fete is determined by outlining the software requirements that describe both non-functional as well as functional requirements of the software system that subsequently become the basis for the process of developing the software system (Sommerville, 2007).

Accordingly, requirements of software systems that exist play a crucial role in providing insights with regards to the re-usability of software artifacts that are already implemented. In the course of software system development process, typical discussions take place between developers and customers in order to agree on requirements specifying the software system functionality (Wiegers, 2003). However, this research report focuses on ontology for functional requirements meaning emphasis will be on the software functionality.

According to Gómez-Pérez, Fernández-López & Corcho (2004) ontology is an explicit or formal specification or description of a shared conceptualization of objects in terms of their constraints, relationships, properties, and behaviors. Functional ontology with regards to software refers to the desired characteristics of the software as specified by the customer and when they fall within functional requirements (FRs) are considered to be a sequence of actions based on a particular context (Malan & Bredemeyer, 1999).

Al-Ahmad, Magel & Abufardeh (2015) defined functional requirements as the characteristics describing the system behavior through an expression of it as the system’s inputs and output as well as the relationships that ensue between inputs and the output. Such requirements are crucial in the software’s development life-cycle since they act as the basis for cost estimation, work plans, implementations as well as follow-up directives or maintenance (van Lamsweerde, 2009). As a result, the purpose of this research report is to build ontology for functional requirements.

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Motivation/scope

The purpose of this research report is to build ontology for functional requirements and its motivation lies in specifying the ontology’s functional requirements and systematization by devising prescriptive, efficient and detailed guidelines of the methodology specifying functional requirements of the proposed ontology. The methodological guidelines for the proposed ontology are developed in the context of competency questions (CQs) and motivated by methodologies that already exist for building ontologies as well as available literature and practices (van Lamsweerde, 2009).

The inspiration of this project is further based on the fact that, these methodological guidelines which are already in existence help in capturing knowledge from users of the developed ontologies leading to production of the ontology requirements’ specification document (ORSD), which is subsequently utilized by ontology engineers towards developing ontologies satisfying identified functional ontology requirements.

As a result, the significant motivation is that the methodological guidelines to be developed play a key role in serving as an agreement among domain experts, ontology engineers and users on the functional requirements to be included in the ontology (van Lamsweerde, 2009). 

Furthermore, building a software system that is knowledge intensive was another great motivation of this project where the ORSD would be decisive throughout the process of developing the ontology if an actual application was to be carried out since it facilitates: facilitating (1) searching and reusing of knowledge-aware resources that exist in order to re-engineer them into ontologies; (2) searching and reusing of ontologies that exist, ontology design, patterns, ontology statements, or ontology modules; and (3) ontology verification throughout the process of developing ontologies, among other activities (Roth & Woodsend, 2014).

The context in which the methodological guidelines presented in this research report have been generated based on the NeOn Methodology with regards to the NeOn project guidelines (Gómez-Pérez & Suárez-Figueroa, 2008). The scope of the research report is covered in four main sections: Section 1 is the introduction which discusses the introductory aspects of the research report, including the motivation/scope; statement of the problem and significance for information systems (IS); the problem’s importance; and objectives/goals.

Section 2 includes the background of the research report where guidelines of the methodology for functional requirements’ ontology are specified and discussed. Section 3 presents the discussion and anticipated applications of the proposed ontology for functional requirements. Finally, Section 4 provides the conclusions and future work.

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Problem statement and significance for IS

Since the invention of computers and information systems, software uses have never reached the levels they are at nowadays because of the myriad of problems they are currently solving (Al-Ahmad et al, 2015). However, today software development processes have focused on tailor-made software targeted to solve a similar problem facing a group of individuals, companies, organizations or institutions.

Hence the most demanding and key process in software development is to specify requirements of the ontology, especially the functional requirements outlining the functionality of the software system (van Lamsweerde, 2009). Failure to carry out this task effectively, which is a serious problem, will definitely lead to development of an inefficient ORSD which will not succinctly specify and describe functions of the software product or system (Grüninger & Fox, 1995).

When functional requirements of ontologies are confusing, costs of developing ontologies are often increased, which makes the process of analyzing ontology requirements the most important phase in the life-cycle of ontology development (Cascini, Fantoni & Montagna, 2013). The process of analyzing ontology requirements focuses on specifying effective functional requirements that satisfy customer needs and their implementation by developers is feasible.

This is undoubtedly a challenging fete to achieve easily and usually poses a major problem to many software developers. However, ontology requirements are often established using competency questions (CQs) identification technique in most of the existing software development methodologies, but the current methodologies’ guidelines for building software do not provide sufficient definitions of ontology’s functional requirements hence causing an additional problem (Staab et al., 2001; Roth & Woodsend, 2014).

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Furthermore, the challenge or problem posed by the need to sufficiently identify/specify and describe ontology requirements, particularly the functional requirements in the process of software development life cycle is of great significance for information systems (IS). This is attributed to the fact that the methodological guidelines used to develop ontology requirements help in capturing knowledge from users, leading to production of ORSD that are subsequently utilized by ontology engineers in developing ontologies that satisfy the identified requirements (van Lamsweerde, 2009).

As a result, these methodological guidelines for the ontology to be developed play a key role in serving as an agreement among domain experts, ontology engineers and end-users on the functional requirements to be included in the ontology; thus they become of great significance for information systems (IS) field as a whole (van Lamsweerde, 2009).

In addition, when building a software system that is knowledge intensive, the ORSD developed from the respective functional requirements and methodological guidelines facilitates the searching and reusing of knowledge-aware resources that exist in order to re-engineer them into ontologies; searching and reusing of ontologies that exist, ontology design, patterns, ontology statements, or ontology modules; and ontology verification throughout the process of developing ontologies, among other activities (Roth & Woodsend, 2014).

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Importance of the problem

            The importance of the problem discussed in the previous sub-section is undisputable because the identification of ontology requirements’ specification plays a critical role in the process of software development. This is mainly because it attempts to define and understand the required functionalities from the software system or product based on the identified ontology’s functional requirements (Kotonya & Sommerville, 1998).

As a result, there are several benefits provided by the detailed software requirements document produced including:

(a) establishing the basis on which customers and developers or suppliers agree on the uses and users of the software system or product to be developed,

(b) reducing the effort required to develop the software,

(c) providing the basis on which costs and schedules are estimated, and

(d) offering a baseline to validate and verify the developed software system or product (Ambrósio et al., 2004).

As a result, clearly developed methodological guidelines help IT experts or technicians to build ontology-based applications or software that are used to solve problems we face on daily basis (Wiering, 1996). Thus, based on these efforts software developers currently have precise methodological guidelines that are helpful to them when defining functional requirements of the applications they develop on daily basis (van Lamsweerde, 2009).

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Objectives

The overall goals of this project are to identify a particular methodology for building ontologies, including the method guidelines for ontology’s functional requirements specification. This includes stating the purpose for building the proposed ontology, the intended users and uses as well as the functional requirements that should be fulfilled by the ontology after its formal implementation through detailed methodological guidelines that efficiently specify functional requirements of the ontology.

Background    

The growth of interest in approaches to build ontologies from scratch has been increasing since 1990s and early year of this century, especially in the reuse of existing ontologies as well as utilization of semiautomatic methods aimed at reducing challenges of knowledge of acquisition in the process of ontology development. However, up to mid-1990s the process was slow because it was art based instead of engineering activity and each team involved pursued their own design criteria, set of principles and the ontology building phases were manual.

In 1997, the process of ontology development (Fernández-López & Gómez-Pérez, 2004) was identified on the METHONTOLOGY methodology framework for construction of ontology. The basis of such proposal was the IEEE standard for the development of software and it outlined all the activities carried out when developing ontologies (IEEE, 1998).  

When developing a software application in context of ontologies, the functional requirements of the ontology should be identified as well as those of the application (Wiegers, 2003). Sommerville (2007) claims that today there are precise methodologies to help ontology-based software application developers in defining application requirements. For instance, in METHONTOLOGY [Gómez-Pérez et al., 2004] the goals of the activity of specifying ontology requirements are identified; however, methods to conduct those activities are not proposed in this methodology.

In other methodologies such as Grüninger and Fox [Grüninger & Fox, 1995], the Unified methodology [Uschold, 1996], and On-To-Knowledge methodology [Staab et al., 2001], identification of the requirements follows aspects for ORSD creation including: (1) the ontology’s purpose, (2) the intended ontology’s users and uses, and (3) the set of ontology requirements to be fulfilled after the formal implementation of the ontology.

Competency questions (CQs) are commonly used in most methodologies existing today in order to establish ontology requirements. However, considering that CQs are questions and answers based on the natural language on which the ontology is built, their responses are essential in determining and evaluating the type of required requirements that are specified.

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Generally, ontology requirements are expressed in a variety of ways, including story-boards and UML diagrams. Alternatively, expectations of the ontology are most commonly expressed in natural language such as the ability of a user to log-in to his/her account (Mich et al., 2004). However, despite the benefit of natural language being intelligible to both developers and clients, they can lead to ambiguity, vagueness and incompleteness (Fernández-López & Gómez-Pérez, 2004). Roth & Woodsend, 2014) argued that although the use of formal languages as an alternative can eliminate some of these challenges, customers are not often able to understand the requirements when they are highly formalized.

Al-Ahmad et al, (2015) proposed that in order to decrease the requirements’ inconsistency and ambiguity caused by the use of the informal natural language approaches that capture both semantic and syntactic features of requirements can be used.

Guidelines of NeOn Methodology for Ontology Functional Requirements

Methodological guidelines in the context of the NeOn Methodology [Gómez-Pérez & Suárez-Figueroa, 2008] are used in this research report to discuss the ontology functional requirements. The creation of the methodological guidelines presented in this research report was done based on the NeOn Methodology, particularly relying on previous studies conducted to revise the status of ontology development.

Next, in Fig. 1 presented below the methodological guidelines for the specification of ontology functional requirements are outlined in prescriptive as well as detailed manner, highlighting main tasks that are carried out in addition, to the involved inputs and the output as well as the responsible actors.   

Want help to write your Essay or Assignments? Click here

Task 1:  Identification of purpose, scope as well as ontology implementation language: This task determines ontology’s main goal, its feasible granularity and coverage as well as implementation language. The team developing the ontology achieves this by conducting interviews with domain experts and end-users to identify their needs in order for developers the ontology to make a decision on the most appropriate language to be formally used implement the ontology.  

Task 2: Identification of intended end-users: This task is aimed at establishing the ontology’s intended end-users who will be mainly using the ontology to be developed. The team developing the ontology achieves this by conducting interviews with domain experts and end-users where a set of the identified needs of the ontology are taken as inputs; whereas a list of the ontology’s intended users is taken as the output.

Task 3: Identification of intended uses: Scenarios linked to the targeted ontology-based application are the main motivation of the ontology development; hence, this task is aimed at obtaining the intended use scenarios and uses of the ontology. The team developing the ontology achieves this by conducting interviews with domain experts and end-users where a set of identified needs of the ontology are taken as inputs; whereas a list of the ontology’s intended uses based on scenarios is taken as the output.

The inputs should outline the ontology uses within the intended ontology-based application in order to obtain an overview of the ontology’s functional requirements, while the output should describe a set of general functional requirements the ontology should fulfill upon its formal implementation. 

Task 4: Identification of ontology’s functional requirements: This task is aimed at acquiring a set of ontology’s functional requirements that should be fulfilled by the ontology because they are considered essential content requirements referring to specific knowledge which is the represented by the proposed ontology. The team developing the ontology achieves this by conducting interviews with domain experts and end-users where a set of identified needs of the ontology are taken as inputs; whereas ontology’s initial functional requirements are taken as the output.

Writing of CQs in natural language is used as the main technique to identify functional requirements in addition to other techniques such as Excel and mind map tools. Using wiki tools including Cicero 12 is also appropriate when people involved are geographically distributed.

Task 5: Grouping of ontology’s functional requirements: This task is aimed at grouping CQs identified in task 4 of this methodology into various categories. A hybrid approach should be used by domain experts, intended ontology users, and the team developing the ontology in classifying the list of CQs by not only combining categories that are established in advance including date, time, units of measurement, languages, locations, currencies, etc., in addition, to creating categories for words found within the list of CQs that have the highest frequencies of appearance.

Card sorting technique is used in manual grouping, while natural language clustering to extract information technique is used in automated grouping. In addition, graphic display of CQs in groups is done using mind map, whereas Cicero is used in collaborative grouping.

Want help to write your Essay or Assignments? Click here

Task 6: Validating the set of functional requirements: This task’s goal is to identify missing functional ontology requirements, possible conflicts between functional ontology requirements, as well as contradictions between them. The task is executed by domain experts and end-users taking a set of ontology’s functional requirements identified in task 4 of this process as inputs aimed to determine the validity of each element. Confirmation the validity of a set of ontology’s functional requirements is taken as the task’s output.

Task 7: Prioritizing ontology’s functional requirements: The task is aimed at assigning various levels of priority to the identified ontology’s functional requirements with regards to various groups of CQs, and to various CQs in every group obtained in task 5. The task is executed by ontology’s domain experts, intended end-users, and the team developing the ontology taking ontology’s functional requirements identified in task 4 of the process and groups of CQs obtained in task 5 of the process as inputs.

A set of obtained priorities inherent in every functional requirement as well as to each CQ in a group and to each group of CQs is taken as the task output.

Task 8: Extracting terminologies and their frequencies: This task is aimed at extracting a pre-glossary of terms within the obtained CQs as well as answers provided. The extracted pre-glossary of terms are divided into three parts that are distinct from each other as follows: terms that are extracted from CQs, terms that are extracted from answers provided to CQs, as well as terms whose identification is attributed to named entities, which are objects.

There will be future use of extracted terms showing higher frequencies of appearance in knowledge-aware resources searching when they have reuse potential in later processes of ontology development. This task should be carried out by the team developing the ontology, taking the obtained CQs and the provided answers as inputs utilizing techniques of terminology-extraction and tools that support them.

Want help to write your Essay or Assignments? Click here

Discussion and Anticipated Applications

In the process of developing ontology-based software application, there must be identification of the ontology requirements as well as those of the application itself. The experience gained in this project indicated that, more essential than mere software’s functional requirements capturing was precise as well as effective identification of ontology’s inherent knowledge.

As a result, ontology-based software application developers currently have specific methodological guidelines that are helpful to them in defining functional requirements of the software applications they intend to develop. This implies that, the NeOn methodology guidelines used to specify functional ontology requirements’ specification of the proposed ontology presented here, have been utilized to the NeOn ontologies as well as developing ontologies educational as well as research projects whose developers’ feedback on ontologies is interesting in each case (Gómez-Pérez & Suárez-Figueroa, 2008).

Furthermore, it is worth to mention that the methodological guidelines developed in this research project based on NeOn Methodology and the subsequent ORSD facilitated the process of identifying the functional requirements of an ontology in a variety of ways including:

(1) allowing representation of specific knowledge in developed ontologies to be identified,

(2) facilitating knowledge resources that are already existing to be reused by focusing the search of the resource in representation of specific knowledge in developed ontologies, as well as

(3) permitting developed ontologies to be verified with regards to functional requirements that ontologies should satisfy (Gómez-Pérez & Suárez-Figueroa, 2008).

As a result, the produced detailed software requirements document was proved to be good guideline because it fulfilled several aspects including: (a) establishing the basis on which customers and developers or suppliers agree on the uses and users of the software system or product to be developed, (b) reducing the effort required to develop the software, (c) providing the basis on which costs and schedules are estimated, and (d) offering a baseline to validate and verify the developed software system or product (Ambrósio et al., 2004).

Want help to write your Essay or Assignments? Click here

Developed methodological guidelines on the basis of NeOn Methodology succinctly outline the ontology functional requirements leading to the development of ORSD which allows (a) a search that is more direct for existing knowledge resources that are necessary to be reused in the process of developing the ontology, and (b) the ontology content evaluation (Wiegers, 2003). Thus, the methodological guidelines of NeOn Methodology can have applications in various projects.

For instance, developed guidelines can be applied in e-Employment whose goals are developing an interoperable and knowledge intensive architecture based on ontologies of public e-Employment services (PES), and enabling market-places that are federated for mediation of employment agencies through an interoperation which is based on peer-to-peer network (Gómez-Pérez & Suárez-Figueroa, 2008). These methodological guidelines of NeOn Methodology can also be used in e-Procurement as well as pharmaceutical companies.

For instance, in e-Procurement application they can be used in solving the problem caused by the lack of interoperability between those emit and receive invoices; whereas in pharmaceutical companies application, these guidelines can be used in helping to systematize the creation, maintenance and storage of updated information that is drug-related as well as allowing new drug resources to be easily integrated (Sommerville, 2007).   

Want help to write your Essay or Assignments? Click here

Conclusion and Future Work

In conclusion, it is important to state that identification of functional requirements is one of the crucial activities in the process of developing ontologies. In this research report, the specification of ontology’s functional requirements has been systematized in the proposed prescriptive as well as detailed methodological guidelines developed in the context of NeOn Methodology in order to specify ontology’s functional requirements.

The developed methodological guidelines can act as a baseline for creating a particular ORSD which is critical to speed up the process of developing the ontology. Terms as well as their frequency of occurrence from the ORSD’s pre-glossary can be used to search and select consensual and knowledge-aware resources that are existing, which after the process of re-engineering when essential, thereby allowing ontologies to be built faster, cheaply, and with higher quality.

The developed methodology guidelines based on NeOn Methodology presented in this research report can be extended further to develop a tool capable of automatically generating all possible combinations for relations and concepts in functional requirements, as well as automating the process of constructing detection rules, and also in developing ORSD.

Despite the fact that, ontology-based software application developers currently have specific methodological guidelines that are helpful to them in defining functional requirements of the software applications they intend to develop, these guidelines are not sufficient to succinctly define functional requirements of ontologies and more work is envisaged in the near future to address this challenge.      

Want help to write your Essay or Assignments? Click here

References   

B. Al-Ahmad, K. Magel, and S. Abufardeh, “A Domain Ontology Based Approach to Identify Effect Types of Security Requirements upon Functional Requirements,” International Journal of Knowledge Engineering, vol. 1, no. 1, pp. 24-29, 2015.

A. P. Ambrósio, D. C. de Santos, F. N. de Lucena, and J. C. de Silva, “Software Engineering Documentation: An Ontology-Based Approach,” Proc. Web Media and LA-Web Joint Conf., 10th Brazilian Symp. Multimedia and Web Second Latin Am. Web Congress, pp. 38-40, 2004.

G. Cascini, G. Fantoni, and F. Montagna, “Situating needs and requirements in the FBS framework,” Design Studies, vol. 34, no. 5, pp. 636–662, 2013.

B. Chandrasekaran, and J. R. Josephson, “Function in device representation,” Engineering with Computers, vol. 16, no. 3-4, pp. 162–177, 2000.

A. Davis, “Software Requirements: Objects, Functions and States,” Upper Saddle River, NJ: Prentice Hall, 1993.

A. Gómez-Pérez, M. Fernández-López, and O. Corcho, “Ontological Engineering: With examples from the areas of Knowledge Management, e-Commerce and the Semantic Web,” London, UK: Springer Verlag London Limited, 2004.

M. Grüninger, and M. Fox, “Methodology for the design and evaluation of ontologies,” In Skuce, D. (ed) IJCAI95 Workshop on Basic Ontological Issues in Knowledge Sharing, pp. 6.1–6.10, 1995.

M. Fernández-López, and A. Gómez-Pérez, “Searching for a Time Ontology for Semantic Web Applications,” Formal Ontology in Information Systems, Turín, Italy, 2004.

A. Gómez-Pérez, and M. C. Suárez-Figueroa, “NeOn Methodology: Scenarios for Building Networks of Ontologies,” 16th International Conference on Knowledge Engineering and Knowledge Management Knowledge Patterns (EKAW 2008). Conference Poster, Turín, Italy, 2008.

T. J. Howard, S. J. Culley, and E. Dekoninck, “Describing the creative design process by the integration of engineering design and cognitive psychology literature,” Design Studies, vol. 29, no. 2, pp. 160–180, 2008.

IEEE, “Recommended Practice for Software Requirements Specifications,” IEEE Standards, p. 830, 1998.

G. Kotonya, and I. Sommerville, “Requirements Engineering: Processes and Techniques,” New York, NY: John Wiley & Sons, 1998.

S. Lauesen, “Software Requirements: Styles and Techniques,” London, UK: Pearson Education Limited, 2002.

J. Lee, and N. L. Xue, “Analyzing user requirements by use cases: A goal-driven approach,” IEEE Software, vol. 16, no. 4, pp. 92-101, 1999.

R. Malan, and D. Bredemeyer, “Functional requirements and use cases,” [Online]. Retrieved from: http://www.bredemeyer.com/pdf_files/functreq.pdf, 1999.

L. Mich, F. Mariangela, and N. I. Pierluigi, “Market research for requirements analysis using linguistic tools,” Requirements Engineering, vol. 9, no. 1, pp. 40–56, 2004.

M. Roth, and K. Woodsend, “Composition of word representations improves semantic role labeling,” Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, Doha, Qatar, pp. 407–413, 2014.

I. Sommerville, “Software Engineering,” (8th ed.). New York, NY: International Computer Science Series, 2007.

S. Staab, P. Hans, R. Studer, and Y. Sure, “Knowledge Processes and Ontologies,” IEEE Intelligent Systems, vol. 16, no. 1, pp. 26–34, 2001.

M. C. Suárez-Figueroa, G. Aguado de Cea, C. Buil, K. Dellschaft, M. Fernández-López, and M. Uschold, “Building Ontologies: Towards A Unified Methodology,” In: Watson I (ed.) 16th Annual Conference of the British Computer Society Specialist Group on Expert Systems. Cambridge, United Kingdom, 1996.

M. C. Suárez-Figueroa, M. Fernández-López, A. Gómez-Pérez, K. Dellschaft, H. Lewen, and M. Dzbor, “NeOn D5.3.2. Revision and Extension of the NeOn Development Process and Ontology Life Cycle, NeOn project,” Retrieved from: http://www.neon-project.org, 2008.

M. Uschold, “Building Ontologies: Towards A Unified Methodology,” In: Watson I (ed.) 16th Annual Conference of the British Computer Society Specialist Group on Expert Systems. Cambridge, United Kingdom, 1996.

A. van Lamsweerde, “Requirements Engineering: From System Goals to UML Models to Software Specifications,” New York, NY: John Wiley & Sons, 2009.

E. Wiegers, “Software Requirements 2: Practical techniques for gathering and managing requirements throughout the product development cycle,” (2nd ed.). Redmond: Microsoft Press, 2003.

R. Wiering, “Requirements Engineering: Frameworks for Understanding,” New York, NY: John Wiley & Sons, 1996.

Want help to write your Essay or Assignments? Click here

Education and the use of technology

Education and the use of technology
Education and the use of technology

Want help to write your Essay or Assignments? Click here

Education and the use of technology Education Admission Essay

INSTRUCTIONS:

Education and the use of technology. Write about how technology and digital media has impacted modern education.

Write an essay of no more than 650 words, using the prompt to inspire and structure your response.

Technology ushers in fundamental structural changes that can be integral to achieving significant improvements in productivity. Used to support both teaching and learning, technology infuses classrooms with digital learning tools, such as computers and hand held devices; expands course offerings, experiences, and learning materials; supports learning 24 hours a day, 7 days a week; builds 21st century skills; increases student engagement and motivation; and accelerates learning. Technology also has the power to transform teaching by ushering in a new model of connected teaching. This model links teachers to their students and to professional content, resources, and systems to help them improve their own instruction and personalize learning.

Want help to write your Essay or Assignments? Click here

Technology in Contemporary Society

Technology in Contemporary Society
Technology in Contemporary Society

Want help to write your Essay or Assignments? Click here

The Role of Technology in Contemporary Society

SECTION A

Question a.2

Kevin (2009) lets us know that technology is sometimes selfish as well as generous. This statement by Kevin Kelly is brought about by the fact that the use of technology can bring about various results. According to Kevin (2009), the various results that a technology gives may be positive or negative depending on what the user was aiming to achieve.

The varied results are usually brought about by the fact that technology may decide to act in a specific manner giving results which are modeled around it thus seeming selfish. On the other hand, technology may give us results that favor us thus ending up being generous.

Want help to write your Essay or Assignments? Click here

Question b.1

The work-life balance refers to the process of handling job and life simultaneously with satisfaction. This concept entails the ability of being able to get it right when it comes to priorities with regard to work and life. The concepts of work-life balance advocates for proper organization of work related tasks and life related affairs so that all objectives may be achieved.

In work and life balance, technology has been able to play a major role. To balance work and life, people have been able to use technology to stand in for them where they are required to do something related to work but family is the priority at a given point in time and vise verse. It is worth noting that it is a valid and important concept.

Want help to write your Essay or Assignments? Click here

Question c.1

Technology is playing a major role in changing the way children think. According to Taylor (2012), children are being affected by technology positively and negatively. Technology is been seen as a great influence of how the thinking of children develop. Taylor (2012) points out that the attentiveness; decisiveness and remembrance of children are often affected by technology. According to Taylor (2012), the manner and the level of technology use by children determines the effects caused to the thinking system of children.

Question d.2

The copyright laws are extremely important because they control and protect intellectual properties of people. The copyright laws are important because they encourage people to be innovative. With proper laws protecting innovative products of people, it will be encouraging for many to innovate since they would be protected too.  Additionally, the copyright laws are important because they ensure that there is fair play in a given industry. The fairness is brought about by the fact that only original products borne from original ideas will be availed at all times.

Competition becomes fair since copying is made illegal. Another importance of copyright laws is that they give a clear guidance of the way enforcing should be done. This is because the copyright laws provide direction regarding the prosecution of an offender. I agree that the copyright laws are important. This is because with fairness in competition, encouragement of innovation and enforcement made possible by these laws, the world becomes a better place.

Want help to write your Essay or Assignments? Click here

Question e.2

Digital divide refers to the situation whereby there are challenges in finding and using information technology. The digital divide may be brought about by the lack of the information and communication technology devices or lack of the required skills. Having seen good progress in the entrance of technology in many parts of the world, the digital divide is taking a new perspective with focus being put on how much of devices and skills people have. The digital divide is important to social scientists because it gives them an opportunity to study and come up with solutions for bridging the digital gap.

Question f.1

One of the aspects of stem cell technology is that it has a broad use of embryonic cells. This has been able to court controversy from the fact that it has unethical approach. The use of fetus from terminated pregnancies is quite controversial. Secondly, the stem cell technology is known to use healthy cells for transplant. This aspect of this technology has been seen to be the cause of some mysterious disappearances of individuals to be the target of cell harvesting.

Want help to write your Essay or Assignments? Click here

Question g.1

The European enlightenment refers to the transition of the European society from old way of doing things to an approach which has voice of reason (Gillispie, 2013). The European enlightenment period refers to the duration when the European region was meeting the modern way of doing things.

Technology is one aspect of the world that was impacted positively by the European enlightenment. The enlightenment brought about new ideas regarding technology. Additionally, technology oriented research was also carried out thus giving technology an opportunity to grow.

Want help to write your Essay or Assignments? Click here

SECTION B

Question 1

The United States Office of Technological Assessment was mandated to handle matters touching on new technology and its impact for the purpose of facilitating congress in policy making. OTA was structured to give the congress an opportunity to obtain and understand technology related information in advance, holding a non-partisan position.

According to Rodmeyer (2005), OTA was dismantled following accusations that it was not necessary because it allegedly repeated functions of other business agencies. Rodemeyer does not approve the dismantling of the Office of Technological Assessment. His disapproval is brought about by his opinion that the congress lacks technological knowhow and OTA was offering reports without bias. According to Rodemeyer (2005), technological assessment has a dilemma based on independence of the officers.

Want help to write your Essay or Assignments? Click here

Question 2

Gordon (2013) argues that the economy of America is slowing down. According to Gordon (2013), the reasons causing the slow growth of the American economy include;

  • Increasing inequality- The lack of equity experienced by the American population has led to poor economic cooperation thus slowing down the economy.
  • Dull education system-The American education system has not been able to produce competent citizens.
  • High levels of indebtedness of learners- The people in college have found themselves caught up in so much debt which they have to pay immediately they secure their jobs thus slowing their investment options.
  • High number of old people- The working American population is growing older day by day thus becoming less productive. This is being made worse by the fact that the education system is not producing productive people as before.

Poor education system has failed to push technology to higher levels, something which has ended p contributing negatively to the economic growth.

Want help to write your Essay or Assignments? Click here

Question 3

The argument that transformation from hunter-gatherer life to agriculture was the worst mistake in life is brought about by various arguments. The arguments in support of the hunter-gatherer life are that there was more leisure time, more sleep and less time for searching for something to eat. Additionally, the hunters and gatherers are argued to have enjoyed good diet emanating from the mixture of wild meat and fruits.

Question 4

In life, there are various forms of capital. These include social capital, human capital and cultural capital. Human capital refers to having the right people for a given task. It entails putting in place people of high competence levels. On the other hand, social capital refers to the individuals within a person’s social circle. Social capital is usually concerned with the input brought about by those within a social circle. Cultural capital refers to aspects of life that place individuals at the top of the social classes in the society. It entails having high levels of knowledge and skills among other attributes.

Want help to write your Essay or Assignments? Click here

Question 5

 Robinson (2010) says that there is need to have a radical approach to education.  Robinson (2010) argues that the thinking in education should have diversity. The diversity should be aimed at letting learners program their education towards having multi-solutions for a problem. Secondly, Robinson (2010) states that education should be planned in a way that supports industrial productivity.

Want help to write your Essay or Assignments? Click here

Voice Recognition Technology

Voice Recognition Technology
Voice Recognition Technology

Want help to write your Essay or Assignments? Click here

Voice Recognition Technology

The type of dictation system is Voice Recognition and it interfaces with Via Fly. This Voice Recognition type of dictation system was updated for the last time in the year 2009, and the type of reports it is used to produce are varied (Judith, Dictation Supervisor).  In the transcription room there are five transcriptionists who work there, all female and should accomplish a set amount of work.

For instance, each of the female transcriptionists has to ensure that she finishes twenty five (25) medical records, and the productivity is controlled by the supervisor in the dictation area as well as quantity and quality of the reports. The Voice Recognition dictation system allows production of various reports that are subsequently dictated such as referral letters, discharge summary, medical reports, morbidity and mortality reports, consultations for both inpatients and outpatients, and death summary.

Want help to write your Essay or Assignments? Click here

The current dictation system has both strengths and limitations. Its strengths are: 1) it is most useful and there has been thorough familiarization among the transcriptionists with the system; 2) it is time-saving because medical transcriptionists are not required to spend any time informing doctors; and 3) copies of referral letters, medical reports, discharge summary as well as other documents can be accessed from the server at the medical transcription system and backup.

The limitations of the system include: 1) the system cannot be accessed or viewed by the medical transcriptionists while outside the hospital; and 2) the system cannot be accessed or viewed by the medical transcriptionists through Google Chrome or other efficient browsers, except only through internet explorer (Milstein & Bates, 2010; Moore & Fisher, 2012).

Want help to write your Essay or Assignments? Click here

The future plans with regards to the Voice Recognition dictation system is to ensure that there is implementation of a solution for medical digital dictation system, voice recognition, and operational interfaces entailing a Patient Administration System (eSIHI).

References

Milstein, J. A. & Bates, D. W. (2010). Paperless healthcare: Progress and challenges of an IT-enabled healthcare system. Business Horizons, 53(2), 119-130.

Moore, A., & Fisher, K. (2012). Healthcare Information Technology and Medical-Surgical Nurse: The Emergence of a New Care Partnership. CIN: Computers, Informatics, Nursing, 30(3), 157-163.

Want help to write your Essay or Assignments? Click here

Smart Technology and Strategy

Smart Technology
Smart Technology

Want help to write your Essay or Assignments? Click here

Smart Technology and Strategy

Introduction

As the global front undergoes gradual revolution based on technological advancements, companies are increasingly investing in technologies that promise to increase efficiency, lower costs and increase productivity. Smart computers, wearable devices, surveillance devices, smart sensors, GPS, voice and face recognition and smart programs are continually being adopted to enhance automation and perform tasks that would otherwise prove challenging for humans.

Notably however, there has been slow progress in adoption of smart technology among modern organizations, despite the promise of reduced costs, increased competitive advantage, efficiency in operations and increased profitability.  Similarly, organizations have been hesitant in adopting business strategies that endorse smart technologies. This is an interesting observation because it would be naturally expected that companies would strive to adopt technologies that will improve their competitive position.

Research however indicates that organizations are always willing to adopt new technology. The factors surrounding adoption of such technologies, positive or negative determine whether they will adopt the technology. This paper is an analysis of issues affecting organizations in the development of business strategies endorsing smart technologies.

Want help to write your Essay or Assignments? Click here

Discussion

Design

The functional attributes of a smart technology are critical in promoting customer satisfaction and will certainly affect the buyers purchasing behavior (Youngmo, Mingook and Sungjoo, 2014). Perceived usefulness will be based on the technology design and for smart technologies to be effective, they must be tailored towards the user’s needs and thus designed according to the user specifications.

According to Slaten (2015), organizations must analyze the needs of the company before embarking on any smart technology investment. This way, they are able to identify a design that will best deliver the intended objective while deriving the best value from it. Ho-Chang et al (2014) notes that failure to carefully consider the objectives of the organization will lead to bad investment and the company will soon incur more expenditure in upgrading their smart technology or fail to achieve expected outcomes.

Want help to write your Essay or Assignments? Click here

After-sales support

Technology is highly complex and the need for professionalism in maintenance of technological devices is inevitable. After-sale support remains one of the most important aspects of a sale in acquiring smart technologies because organizations need to be assured that providers will help them solve any issues that may emerge after acquisition of the technology. It also ensures that the smart technology is professionally installed and hence avoids instances where the technology fails to serve the intended purpose.

Organizations must choose vendors that offer the best after-sales package in order to benefit fully from maintenance service. Youngmo, Mingook and Sungjoo (2014), note that after-sale service maintenance is one of the leading drivers for adoption of smart technology, because customers want to be assured that they will not need to incur additional maintenance costs.

Want help to write your Essay or Assignments? Click here

Organizations are however faced with a new trend in smart technology, where after-sale service is often kept to the minimum. Smart technology is a strategic move from traditional technology, and is designed in such a way that users can trouble-shoot and solve problems through what is known as ‘do-it-yourself’ (TWICE, 2015). This is especially so where technology is imported and the seller may not be in a position to deliver the products or install them personally.

In such a case, smart technologies are usually accompanied by manuals that users can read to guide them through the system in order to come up with solutions for any issues encountered (TWICE, 2015). The company may also give additional guidelines on their website for customers to follow in addressing any issues. This means that in certain smart technology devices, there is minimal after-sales service compared to traditional modes of technology. This could pose a challenge to individuals who are not technologically savvy, such that they may end up paying for services

Marketing

Marketing plays a significant role in influencing customer behavior and decisions. In this relation, the ability of the marketer to provide the needed information and convince the customer determines whether they will purchase the product (Mohr, Sengupta and Slater, 2009).The smart technology market is highly saturated and there are numerous products in the market (Porter and Heppelmann, 2014). While some promise to execute the intended objectives, there have been claims of deceptive marketing where the word ‘smart’ has been deceivingly used to take advantage of customer naivety.

As a result, a significant number of organizations have spent high amounts of money to purchase technology that does not add much value to their organization. The same amount of money could have been used to get a greater bargain and more capabilities from smart technologies. Organizations are becoming increasingly aware of such marketing tactics and therefore take more time to do market research before investing in smart technology (Porter and Heppelmann, 2014). 

Want help to write your Essay or Assignments? Click here 

Human Resource

Strategies that endorse smart technologies are highly influenced by the impact of these technologies on the organization’s human resource component. Adopting smart technologies requires a significant level of knowledge, which in most cases needs to be transferred to users before smart technology can be introduced (Shelton, 2014).

Based on a research by Avanade (2016), organizations expect significant changes in terms of skills requirement following adoption of smart technologies in order to effectively blend the technologies with humans. 61% indicated that they would require additional problem solving skills, 59% would require data analysis skills, 51% would need to improve critical thinking skills and 51% would require collaboration skills.

This would mean additional costs for training as well as more time consumed in away from work activities. Shelton (2014), notes that in order for a firm to consider a strategy that incorporates smart technology, it must ensure that all probable users of the technology have adequate knowledge and skills to operate and execute tasks using the smart technology. This not only has an impact on costs but it also requires that the company invests in a workforce that is technologically savvy and can therefore adopt easily to constant changes in technology (Mithas, et al, 2010).

Want help to write your Essay or Assignments? Click here

Avanade (2015) notes that one of the main issues affecting organizations in their decision to adopt smart technology is that they have not made adequate plans to address ethical workplace dilemmas. One of these is the fact that the use of smart technologies mostly involves adoption of devices and intelligent automation, such that computers can perform functions and make decisions that are technically done by humans.

This has raised ethical concerns based on the replacement of human capital by machines.  Avante (2015) postulates that the adoption of smart technology has to a great extent been viewed as a threat despite being presented as a strategy that could help retain critical talent within organizations. Organizations adopting smart technologies are basically replacing the need for a workforce and this could have an impact on overall levels of unemployment (Khandelwal, 2015). Developing strategy that incorporates smart technologies is therefore an issue for organizations because they must show responsibility for their employees’ job security.

Other ethical issues include the capability of smart technology to cause embodiment, where humans become detached from the real world due to their obsession with machines or their incapability to live without them; and excessive reliance on technology to enhance conscientiousness and thus limit critical thinking and ability to make decisions.

Guthrie (2013) refers to this concept as outsourcing of conscientiousness to machines, which can easily erode our capacity to understand and accept human faults and idiosyncrasies. It has been argues that human beings will soon be enslaved by technology and be unable to perform any organizational function without the help of their smart devices. This means that they would be out rightly incapacitated and unproductive as long as machines are unavailable.

Want help to write your Essay or Assignments? Click here

Security

The issue of technology security has been a major issue affecting endorsement of smart technologies in business strategy. While a company would be interested in a technology that increases efficiency and makes business easier, it is more concerned about the security of such systems, including their ability to protect vital information from intruders (Howard, 2015). This comes at a time when cyber crime has become highly rampant in the technology industry, with organizations losing confidential information to hackers and unauthorized users (Wedutenko, 2015).

Smart technologies are prone to security issues and high level protection measures are required to ensure that the organization’s data is safeguarded. Whether an organization is capable of securing its data to ensure that it is not used, shared or accessed illegally is quite uncertain. Organizations that consider adoption of smart technology must consider the issue of security and how it can be enhanced before actually endorsing it in business strategy.

Want help to write your Essay or Assignments? Click here

Security goes beyond protecting personal data from outsiders. Michelfelder (2011) raises an ethical issue of how organizations actually make use of the information they have to conduct activities that users would be opposed to. An example is the use of CCTV, body scanners, GPS and tracking devices which are either secretly placed to monitor employees or to make secret investigations. 

Facial recognition technology has also come under scrutiny, with concerns on whether individuals would actually be comfortable with their facial images being stored in databases (Michelfelder, 2011). According to Guthrie (2013), information gathered from these machines has on many occasions been shared and even sold to third party users. This further raises questions on whether people actually have any privacy in the modern world of smart technologies.

Cost implications

Smart technologies require a significant amount of investment, both in terms of acquisition and maintenance.  Slaten (2015) describes the field of smart technologies as one that is constantly changing and where new versions, modifications and advancements keep emerging. This means that once a company takes on the smart technologies path, it must be ready to continuously reinvent their systems, update software and upgrade hardware to keep up with the times (Slaten, 2015).

Consequently, maintaining smart technology is a capital-intensive investment, given that companies must strive to keep up with new advancements. Unlike assets, technology is not a onetime investment and users must be ready for regular changes that require investment. Failure to update would render current systems obsolete and this to a significant extent affects the firm’s competitiveness (Mithas, et al, 2010).

Furthermore, changes are often unpredictable and organizations cannot effectively budget for future financial requirements. This is a major issue impacting development of strategies endorsing smart technologies and companies have to consider the cost implications before such undertakings can be included in strategy.

Want help to write your Essay or Assignments? Click here

Smart technologies also require uninterrupted Wi-Fi internet connection. There are two cost implications related to this requirement. Firstly, organizations must source for reliable internet connection from vendors, which will ensure that their devices work effectively to address organizational objectives. This has a cost implication because the most reliable wireless internet providers are also likely to be more expensive. Secondly, internet failure could lead to a significant data loss, consequently costing the company.

Want help to write your Essay or Assignments? Click here

Conclusion

Smart technology remains an interesting component of technology and a great consideration for modern organizations. Adoption of smart technology however requires careful scrutiny to ensure that an organization can effectively understand the issues affecting endorsement of the technology into business strategy. This explains the slow pace in smart technology adoption that has been witnessed among modern firms.

In this discussion, various issues including human resource, design, after-sale service, security, marketing and cost implications are identified. These issues often inform organizations’ decision to endorse smart technology. An organization that seeks to include smart technology in their business strategy must effectively evaluate and balance these issues to ensure that the company will benefit from such an investment.

Want help to write your Essay or Assignments? Click here

References

Avanade (2015). Avanade Research: Smart Technologies Driving Significant Improvements in Revenue, Customer Experience and Employee Satisfaction. Retrieved from http://www.avanade.com/en/Press-Releases/smart-technologies-thought-leadership-release

Dale, J., & Kyle, D. (2015). Smart Transitions? Foreign Investment, Disruptive Technology, and Democratic Reform in Myanmar. Social Research, 82(2), 291-326. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=58&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Guthrie, C. F. (2013). Smart Technology and the Moral Life. Ethics & Behavior, 23(4), 324-337. doi:10.1080/10508422.2013.787359. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=d82bb408-5b6c-44ea-a866-2f7eb90a1682%40sessionmgr4005&vid=0&hid=4102

Ho-Chang, C. K., Chang E., & Prybutok, V. R. (2014). Information Technology Capability and Firm Performance: Contradictory Findings and Their Possible Causes. MIS Quarterly, 38 (1), 305-A14. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=a6f12285-5097-428d-9cf9-88ae047f059a%40sessionmgr4002&vid=0&hid=4102

Howard, C. E. (2015). Widespread use of wearable technology. Military & Aerospace Electronics, 26(9), 16-23. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=3544eb1c-910c-48a5-bd65-da92aba5adf7%40sessionmgr4003&vid=0&hid=4102

Khandelwal L. (2015). HR automated! (Cover story). Human Capital [serial online]. October 2015; 19(5):14-17. Available from: Business Source Complete, Ipswich, MA. Accessed March 9, 2016. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=61&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Michelfelder, D. (2011). Dirty Hands, Speculative Minds, and Smart Machines. Philosophy & Technology, 24(1), 55-68. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=cf91625f-6f54-41e0-b596-b1b6e1173911%40sessionmgr4003&vid=0&hid=4102

Mithas, S., Tafti, A., Bardhan, I., & Mein Goh, J. (2012). Information technology and firm profitability: mechanisms and empirical evidence. MIS Quarterly, 36(1), 205-224. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=57&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Mohr, J. J., Sengupta, S. & Slater, S. F. (2009). Marketing of High-technology Products and Innovations Upper Saddle River, NJ: Pearson Prentice Hall.

Porter, ME, & Heppelmann, JE 2014, ‘How Smart, Connected Products Are Transforming Competition’, Harvard Business Review, vol. 92, no. 11, pp. 64-88. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=51&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Shelton, H. C. (2014). Managing Human Capital in the Digital Era. People & Strategy, 37(2), 36-41. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=67&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Slaten, R. (2015). Smart Building Technologies. Alaska Business Monthly, 31(7), 30-35. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=50&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

This Week in Consumer Electronics. (TWICE). (2015). The Impact of Do-It-Yourself. TWICE: This Week in Consumer Electronics, 30(17), 16. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=54&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Wedutenko, A. (2015). Cyber attacks: Get your governance in order. Governance Directions, 67(10), 598-601. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=63&sid=94a7ff10-6f4a-4333-a7da-3936e5828dce%40sessionmgr4001&hid=4102

Youngmo, K., Mingook, L., & Sungjoo, L. (2014). Service-Oriented Factors Affecting the Adoption of Smartphones. Journal Of Technology Management & Innovation, 9(2), 98-117

Want help to write your Essay or Assignments? Click here