Organized Anti-RFID Essay Assignment

Organized Anti-RFID
Organized Anti-RFID

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Organized Anti-RFID

Order Instructions:

Find an example of an Organized Anti-RFID group that wants to stop the spread of RFID technology.

What are their assumptions about RFID technology and its impact on society and business?

Do you agree or disagree with the Anti-RFID group? Why or why not?

Below is a partial answer to the above homework questions by one of our writers. If you are interested in a custom non plagiarized top quality answer, click order now to place your order.

Organized Anti-RFID

What are their assumptions about RFID technology and its impacts on society and business?

Their assumptions are that the RFID technology will compromise the consumer privacy. The technology that is present on the products will track the location of the consumer and share it with others which makes them feel unsafe. Secondly, the manufacturers, government and other people interested in consumer information will easily track the consumer spending patterns (Kazmeyer, 2017).

This is a breach of the rights of individuals to privacy. Thirdly, the use of the RFID technology on students to track them where they are by the students and teachers is a way of treating them like inventory. This is a negative aspect as it interferes with the psychological and mental development of the students in the society (Anderson, 2015).

Fourthly, it increases the possibility of identity theft. The use of RFID on personal documents makes it easy for a third party to access the documentation. On the other hand, in the instance government agencies and business get the information in the wrong hands it can result in losses. The institutions are likely to end up endangering their security and profits which may result in immense damage (Kazmeyer, 2017)….

Get a Custom Essay Paper that meets your expectations by clicking ORDER

RFID technology Research problems inside the Apple Company

RFID technology
RFID technology

RFID technology

Order Instructions:

Formulate a research problem to solve with RFID technology, and the Apple company. Identify one key problem to study with RFID. Develop one hypothesis that will be the key question that would be addressed by such an analysis.

Below is a partial answer to the above homework questions by one of our writers. If you are interested in a custom non plagiarized top quality answer, click order now to place your order.

RFID technology research problems inside the Apple Company

Research problem

Apple Inc., among other leaders in technology, continues to take up wireless systems as part of their bid towards the progression of technology. Among the recent uptakes has been variants of wireless technology for data and information transmission, as well as wireless charging. Radio Frequency Identification (RFID) technology is primarily the backbone of such breakthrough technologies (Ghosh, Goswami, Kumar, & Majumder, 2015). At Apple Inc., for example, RFID and other related subsets are responsible for the development of such products as Apple Pay, Apple TV, and Apple Watch.

As Apple Inc. continues to develop new products based on radio frequency identification, the technology has morphed to include various subsets of similar technologies. In the case of Apple Inc., the most usable of these is the original RFID implementation, as well as the newer NFC (Hayashi, 2012). Each of these technologies has its advantages, as well as some drawbacks. Research and reports from Apple Inc. show an uptake of NFC by the company over RFID. However, could the advantages of the ‘Old school’ RFID outweigh the current and potential benefits of NFC?….

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Define TPS, DSS, and EIS

Define TPS, DSS, and EIS
Define TPS, DSS, and EIS

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Define TPS, DSS, and EIS

Order Instructions:

Define TPS, DSS, and EIS and explain how an organization can use these systems to make decisions and gain competitive advantages. In 250 words or more in the forum, please describe what a literature review is and why it is important.

Below is a partial answer to the above homework questions by one of our writers. If you are interested in a custom non plagiarized top quality answer, click order now to place your order.

Define TPS, DSS, and EIS

A Transaction Processing System (TPS) is a computerized system that helps an organization in the effective handling of daily operations, mainly through the recording of all viable transactions in an efficient manner. On the other hand, a Decision Support System (DSS) is a computerized system that helps various individuals in the organization make the right choices when faced with both semi-structured and unstructured decisions. The system does this through consideration of various plans, forecasts, and operations within the firm (Moraa, Wang & Gelman, 2013, pp. 319 – 321).

An Executive Information System (EIS) is a business management and strategic decision aiding system that encompasses functions that help management make larger decisions that encompass the entire firm (Anwar & Masrek, 2014, pp.995 – 996). Large enterprises make use of EIS at a senior level, where other tools and systems are limited in scope and storage capacity (Learn To Code, 2013).

How the organization can make use of these systems            

The availability of several decision aiding systems implies there is a solution for each problem regarding decision making within all types of firms. These systems allow for the subordinate members of staff, mid-level managers, and those in executive positions to collaborate in building business information through data. The systems allow for better collaboration between people, enhancement of existing and mental models, and control of information and databases (Moraa, Wang, & Gelman, 2013, pp. 320, 343)….

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Ethics and Information Security in Reverse Logistics

Ethics and Information Security in Reverse Logistics
Ethics and Information Security in Reverse Logistics

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Ethics and Information Security in Reverse Logistics

Order Instructions:

This paper should be about about Ethics and Information Security in Reverse Logistics and the paper must be between 8 to 10 pages for the content, not counting the title page or the reference page.

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

•Length of paper: typed, double-spaced pages with no less than 8 pages.

•Font and font size: Times New Roman, 12 point.

Get a Custom Essay Paper that meets your expectations by clicking ORDER

Technology Usage Policy Essay

Technology Usage Policy
Technology Usage Policy

Want help to write your Essay or Assignments? Click here

Technology Usage Policy

Being an intern is one of the most learning processes in one’s education. I believe that through an internship, a person can acquire the skills needed to perform tasks in the field that one chooses to pursue. As an intern, I was able to train on the technology policy first. This was before my start at interacting with customers and learning processes and procedures regarding the payee program.

In this case, I was required to learn and comprehend the technology for the Freestore Foodbank. To begin with, it is important to note that the Freestore Foodbank is one of the largest emergency food and services providers in the world. The organization is focused on providing meals to low-income families and individuals. It is through this provision of emergency food that the organization reacts to the problem of poverty and food insecurity in the society.

On the other hand, the Freestore Foodbank can provide its employees with a scope of technology resources which include computers, telephones, e-mail, fax, and internet access. To a great extent, one can note that access to the organization’s communications system is not a right but rather a privilege. Through the guidelines provided in the communications system policy, there is the proper use of the system, protection for all users, and equal access and supervision of resources. If any employee is found to violate the stipulated policy guidelines, one is faced with disciplinary measures such as termination of employment. As an intern, I knew that I was not an exemption of this punishment.

Technology Usage Policy

Want help to write your Essay or Assignments? Click here

When it comes to ownership and control of resources, I came to learn that employees are assigned electronic gadgets such as desktops or laptops based on the job-specific criteria which are developed by the supervisor. The other elements that I came to learn are that the technology resources that are availed by Freestore Foodbank are the exclusive property of the organization and can only be used for business purposes. The third aspect that was made known to me was that the organization has all rights to at any time take possession of the computer or any equipment assigned to an employee. This is something that can be conducted randomly.

The other element that is contained in the policy is employee responsibilities. When it comes to security and maintenance, employees are held responsible for ensuring that the equipment that one is assigned to as an employee is handled securely. Secondly, personal equipment is not allowed into the organizations premises without prior authorization. The third guideline under security and maintenance is that no member of the organization’s network is permitted to harass any other individual. This to me was one of the significant and impactful guidelines since in modern days; cyberbullying has become an issue that has negatively impacted people and societies.

Another element under guidelines and which I found quite essential is the online security and passwords. Any access to data at the Freestore Foodbank is one that requires logins and passwords. As such, employees are called upon not to disclose any of their information to anyone else.  Through the technology usage policy, I was also introduced to the fact that the organization’s systems cannot be subject to personal use. Furthermore, I came to realize that just like any other company or organization, the prohibition of viewing or displaying content of questionable nature is prohibited by all means.  

Technology Usage Policy

Want help to write your Essay or Assignments? Click here

Toward an Ontology for Functional Requirements

Ontology for Functional Requirements
Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Toward an Ontology for Functional Requirements

Introduction

Software development is undoubtedly one of the most daunting tasks in the field of information systems and a key process involved is specifying software requirements aimed at understanding and defining the functionalities required from the software (Lauesen, 2002). This fete is determined by outlining the software requirements that describe both non-functional as well as functional requirements of the software system that subsequently become the basis for the process of developing the software system (Sommerville, 2007).

Accordingly, requirements of software systems that exist play a crucial role in providing insights with regards to the re-usability of software artifacts that are already implemented. In the course of software system development process, typical discussions take place between developers and customers in order to agree on requirements specifying the software system functionality (Wiegers, 2003). However, this research report focuses on ontology for functional requirements meaning emphasis will be on the software functionality.

According to Gómez-Pérez, Fernández-López & Corcho (2004) ontology is an explicit or formal specification or description of a shared conceptualization of objects in terms of their constraints, relationships, properties, and behaviors. Functional ontology with regards to software refers to the desired characteristics of the software as specified by the customer and when they fall within functional requirements (FRs) are considered to be a sequence of actions based on a particular context (Malan & Bredemeyer, 1999).

Al-Ahmad, Magel & Abufardeh (2015) defined functional requirements as the characteristics describing the system behavior through an expression of it as the system’s inputs and output as well as the relationships that ensue between inputs and the output. Such requirements are crucial in the software’s development life-cycle since they act as the basis for cost estimation, work plans, implementations as well as follow-up directives or maintenance (van Lamsweerde, 2009). As a result, the purpose of this research report is to build ontology for functional requirements.

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Motivation/scope

The purpose of this research report is to build ontology for functional requirements and its motivation lies in specifying the ontology’s functional requirements and systematization by devising prescriptive, efficient and detailed guidelines of the methodology specifying functional requirements of the proposed ontology. The methodological guidelines for the proposed ontology are developed in the context of competency questions (CQs) and motivated by methodologies that already exist for building ontologies as well as available literature and practices (van Lamsweerde, 2009).

The inspiration of this project is further based on the fact that, these methodological guidelines which are already in existence help in capturing knowledge from users of the developed ontologies leading to production of the ontology requirements’ specification document (ORSD), which is subsequently utilized by ontology engineers towards developing ontologies satisfying identified functional ontology requirements.

As a result, the significant motivation is that the methodological guidelines to be developed play a key role in serving as an agreement among domain experts, ontology engineers and users on the functional requirements to be included in the ontology (van Lamsweerde, 2009). 

Furthermore, building a software system that is knowledge intensive was another great motivation of this project where the ORSD would be decisive throughout the process of developing the ontology if an actual application was to be carried out since it facilitates: facilitating (1) searching and reusing of knowledge-aware resources that exist in order to re-engineer them into ontologies; (2) searching and reusing of ontologies that exist, ontology design, patterns, ontology statements, or ontology modules; and (3) ontology verification throughout the process of developing ontologies, among other activities (Roth & Woodsend, 2014).

The context in which the methodological guidelines presented in this research report have been generated based on the NeOn Methodology with regards to the NeOn project guidelines (Gómez-Pérez & Suárez-Figueroa, 2008). The scope of the research report is covered in four main sections: Section 1 is the introduction which discusses the introductory aspects of the research report, including the motivation/scope; statement of the problem and significance for information systems (IS); the problem’s importance; and objectives/goals.

Section 2 includes the background of the research report where guidelines of the methodology for functional requirements’ ontology are specified and discussed. Section 3 presents the discussion and anticipated applications of the proposed ontology for functional requirements. Finally, Section 4 provides the conclusions and future work.

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Problem statement and significance for IS

Since the invention of computers and information systems, software uses have never reached the levels they are at nowadays because of the myriad of problems they are currently solving (Al-Ahmad et al, 2015). However, today software development processes have focused on tailor-made software targeted to solve a similar problem facing a group of individuals, companies, organizations or institutions.

Hence the most demanding and key process in software development is to specify requirements of the ontology, especially the functional requirements outlining the functionality of the software system (van Lamsweerde, 2009). Failure to carry out this task effectively, which is a serious problem, will definitely lead to development of an inefficient ORSD which will not succinctly specify and describe functions of the software product or system (Grüninger & Fox, 1995).

When functional requirements of ontologies are confusing, costs of developing ontologies are often increased, which makes the process of analyzing ontology requirements the most important phase in the life-cycle of ontology development (Cascini, Fantoni & Montagna, 2013). The process of analyzing ontology requirements focuses on specifying effective functional requirements that satisfy customer needs and their implementation by developers is feasible.

This is undoubtedly a challenging fete to achieve easily and usually poses a major problem to many software developers. However, ontology requirements are often established using competency questions (CQs) identification technique in most of the existing software development methodologies, but the current methodologies’ guidelines for building software do not provide sufficient definitions of ontology’s functional requirements hence causing an additional problem (Staab et al., 2001; Roth & Woodsend, 2014).

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Furthermore, the challenge or problem posed by the need to sufficiently identify/specify and describe ontology requirements, particularly the functional requirements in the process of software development life cycle is of great significance for information systems (IS). This is attributed to the fact that the methodological guidelines used to develop ontology requirements help in capturing knowledge from users, leading to production of ORSD that are subsequently utilized by ontology engineers in developing ontologies that satisfy the identified requirements (van Lamsweerde, 2009).

As a result, these methodological guidelines for the ontology to be developed play a key role in serving as an agreement among domain experts, ontology engineers and end-users on the functional requirements to be included in the ontology; thus they become of great significance for information systems (IS) field as a whole (van Lamsweerde, 2009).

In addition, when building a software system that is knowledge intensive, the ORSD developed from the respective functional requirements and methodological guidelines facilitates the searching and reusing of knowledge-aware resources that exist in order to re-engineer them into ontologies; searching and reusing of ontologies that exist, ontology design, patterns, ontology statements, or ontology modules; and ontology verification throughout the process of developing ontologies, among other activities (Roth & Woodsend, 2014).

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Importance of the problem

            The importance of the problem discussed in the previous sub-section is undisputable because the identification of ontology requirements’ specification plays a critical role in the process of software development. This is mainly because it attempts to define and understand the required functionalities from the software system or product based on the identified ontology’s functional requirements (Kotonya & Sommerville, 1998).

As a result, there are several benefits provided by the detailed software requirements document produced including:

(a) establishing the basis on which customers and developers or suppliers agree on the uses and users of the software system or product to be developed,

(b) reducing the effort required to develop the software,

(c) providing the basis on which costs and schedules are estimated, and

(d) offering a baseline to validate and verify the developed software system or product (Ambrósio et al., 2004).

As a result, clearly developed methodological guidelines help IT experts or technicians to build ontology-based applications or software that are used to solve problems we face on daily basis (Wiering, 1996). Thus, based on these efforts software developers currently have precise methodological guidelines that are helpful to them when defining functional requirements of the applications they develop on daily basis (van Lamsweerde, 2009).

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Objectives

The overall goals of this project are to identify a particular methodology for building ontologies, including the method guidelines for ontology’s functional requirements specification. This includes stating the purpose for building the proposed ontology, the intended users and uses as well as the functional requirements that should be fulfilled by the ontology after its formal implementation through detailed methodological guidelines that efficiently specify functional requirements of the ontology.

Background    

The growth of interest in approaches to build ontologies from scratch has been increasing since 1990s and early year of this century, especially in the reuse of existing ontologies as well as utilization of semiautomatic methods aimed at reducing challenges of knowledge of acquisition in the process of ontology development. However, up to mid-1990s the process was slow because it was art based instead of engineering activity and each team involved pursued their own design criteria, set of principles and the ontology building phases were manual.

In 1997, the process of ontology development (Fernández-López & Gómez-Pérez, 2004) was identified on the METHONTOLOGY methodology framework for construction of ontology. The basis of such proposal was the IEEE standard for the development of software and it outlined all the activities carried out when developing ontologies (IEEE, 1998).  

When developing a software application in context of ontologies, the functional requirements of the ontology should be identified as well as those of the application (Wiegers, 2003). Sommerville (2007) claims that today there are precise methodologies to help ontology-based software application developers in defining application requirements. For instance, in METHONTOLOGY [Gómez-Pérez et al., 2004] the goals of the activity of specifying ontology requirements are identified; however, methods to conduct those activities are not proposed in this methodology.

In other methodologies such as Grüninger and Fox [Grüninger & Fox, 1995], the Unified methodology [Uschold, 1996], and On-To-Knowledge methodology [Staab et al., 2001], identification of the requirements follows aspects for ORSD creation including: (1) the ontology’s purpose, (2) the intended ontology’s users and uses, and (3) the set of ontology requirements to be fulfilled after the formal implementation of the ontology.

Competency questions (CQs) are commonly used in most methodologies existing today in order to establish ontology requirements. However, considering that CQs are questions and answers based on the natural language on which the ontology is built, their responses are essential in determining and evaluating the type of required requirements that are specified.

Ontology for Functional Requirements

Want help to write your Essay or Assignments? Click here

Generally, ontology requirements are expressed in a variety of ways, including story-boards and UML diagrams. Alternatively, expectations of the ontology are most commonly expressed in natural language such as the ability of a user to log-in to his/her account (Mich et al., 2004). However, despite the benefit of natural language being intelligible to both developers and clients, they can lead to ambiguity, vagueness and incompleteness (Fernández-López & Gómez-Pérez, 2004). Roth & Woodsend, 2014) argued that although the use of formal languages as an alternative can eliminate some of these challenges, customers are not often able to understand the requirements when they are highly formalized.

Al-Ahmad et al, (2015) proposed that in order to decrease the requirements’ inconsistency and ambiguity caused by the use of the informal natural language approaches that capture both semantic and syntactic features of requirements can be used.

Guidelines of NeOn Methodology for Ontology Functional Requirements

Methodological guidelines in the context of the NeOn Methodology [Gómez-Pérez & Suárez-Figueroa, 2008] are used in this research report to discuss the ontology functional requirements. The creation of the methodological guidelines presented in this research report was done based on the NeOn Methodology, particularly relying on previous studies conducted to revise the status of ontology development.

Next, in Fig. 1 presented below the methodological guidelines for the specification of ontology functional requirements are outlined in prescriptive as well as detailed manner, highlighting main tasks that are carried out in addition, to the involved inputs and the output as well as the responsible actors.   

Want help to write your Essay or Assignments? Click here

Task 1:  Identification of purpose, scope as well as ontology implementation language: This task determines ontology’s main goal, its feasible granularity and coverage as well as implementation language. The team developing the ontology achieves this by conducting interviews with domain experts and end-users to identify their needs in order for developers the ontology to make a decision on the most appropriate language to be formally used implement the ontology.  

Task 2: Identification of intended end-users: This task is aimed at establishing the ontology’s intended end-users who will be mainly using the ontology to be developed. The team developing the ontology achieves this by conducting interviews with domain experts and end-users where a set of the identified needs of the ontology are taken as inputs; whereas a list of the ontology’s intended users is taken as the output.

Task 3: Identification of intended uses: Scenarios linked to the targeted ontology-based application are the main motivation of the ontology development; hence, this task is aimed at obtaining the intended use scenarios and uses of the ontology. The team developing the ontology achieves this by conducting interviews with domain experts and end-users where a set of identified needs of the ontology are taken as inputs; whereas a list of the ontology’s intended uses based on scenarios is taken as the output.

The inputs should outline the ontology uses within the intended ontology-based application in order to obtain an overview of the ontology’s functional requirements, while the output should describe a set of general functional requirements the ontology should fulfill upon its formal implementation. 

Task 4: Identification of ontology’s functional requirements: This task is aimed at acquiring a set of ontology’s functional requirements that should be fulfilled by the ontology because they are considered essential content requirements referring to specific knowledge which is the represented by the proposed ontology. The team developing the ontology achieves this by conducting interviews with domain experts and end-users where a set of identified needs of the ontology are taken as inputs; whereas ontology’s initial functional requirements are taken as the output.

Writing of CQs in natural language is used as the main technique to identify functional requirements in addition to other techniques such as Excel and mind map tools. Using wiki tools including Cicero 12 is also appropriate when people involved are geographically distributed.

Task 5: Grouping of ontology’s functional requirements: This task is aimed at grouping CQs identified in task 4 of this methodology into various categories. A hybrid approach should be used by domain experts, intended ontology users, and the team developing the ontology in classifying the list of CQs by not only combining categories that are established in advance including date, time, units of measurement, languages, locations, currencies, etc., in addition, to creating categories for words found within the list of CQs that have the highest frequencies of appearance.

Card sorting technique is used in manual grouping, while natural language clustering to extract information technique is used in automated grouping. In addition, graphic display of CQs in groups is done using mind map, whereas Cicero is used in collaborative grouping.

Want help to write your Essay or Assignments? Click here

Task 6: Validating the set of functional requirements: This task’s goal is to identify missing functional ontology requirements, possible conflicts between functional ontology requirements, as well as contradictions between them. The task is executed by domain experts and end-users taking a set of ontology’s functional requirements identified in task 4 of this process as inputs aimed to determine the validity of each element. Confirmation the validity of a set of ontology’s functional requirements is taken as the task’s output.

Task 7: Prioritizing ontology’s functional requirements: The task is aimed at assigning various levels of priority to the identified ontology’s functional requirements with regards to various groups of CQs, and to various CQs in every group obtained in task 5. The task is executed by ontology’s domain experts, intended end-users, and the team developing the ontology taking ontology’s functional requirements identified in task 4 of the process and groups of CQs obtained in task 5 of the process as inputs.

A set of obtained priorities inherent in every functional requirement as well as to each CQ in a group and to each group of CQs is taken as the task output.

Task 8: Extracting terminologies and their frequencies: This task is aimed at extracting a pre-glossary of terms within the obtained CQs as well as answers provided. The extracted pre-glossary of terms are divided into three parts that are distinct from each other as follows: terms that are extracted from CQs, terms that are extracted from answers provided to CQs, as well as terms whose identification is attributed to named entities, which are objects.

There will be future use of extracted terms showing higher frequencies of appearance in knowledge-aware resources searching when they have reuse potential in later processes of ontology development. This task should be carried out by the team developing the ontology, taking the obtained CQs and the provided answers as inputs utilizing techniques of terminology-extraction and tools that support them.

Want help to write your Essay or Assignments? Click here

Discussion and Anticipated Applications

In the process of developing ontology-based software application, there must be identification of the ontology requirements as well as those of the application itself. The experience gained in this project indicated that, more essential than mere software’s functional requirements capturing was precise as well as effective identification of ontology’s inherent knowledge.

As a result, ontology-based software application developers currently have specific methodological guidelines that are helpful to them in defining functional requirements of the software applications they intend to develop. This implies that, the NeOn methodology guidelines used to specify functional ontology requirements’ specification of the proposed ontology presented here, have been utilized to the NeOn ontologies as well as developing ontologies educational as well as research projects whose developers’ feedback on ontologies is interesting in each case (Gómez-Pérez & Suárez-Figueroa, 2008).

Furthermore, it is worth to mention that the methodological guidelines developed in this research project based on NeOn Methodology and the subsequent ORSD facilitated the process of identifying the functional requirements of an ontology in a variety of ways including:

(1) allowing representation of specific knowledge in developed ontologies to be identified,

(2) facilitating knowledge resources that are already existing to be reused by focusing the search of the resource in representation of specific knowledge in developed ontologies, as well as

(3) permitting developed ontologies to be verified with regards to functional requirements that ontologies should satisfy (Gómez-Pérez & Suárez-Figueroa, 2008).

As a result, the produced detailed software requirements document was proved to be good guideline because it fulfilled several aspects including: (a) establishing the basis on which customers and developers or suppliers agree on the uses and users of the software system or product to be developed, (b) reducing the effort required to develop the software, (c) providing the basis on which costs and schedules are estimated, and (d) offering a baseline to validate and verify the developed software system or product (Ambrósio et al., 2004).

Want help to write your Essay or Assignments? Click here

Developed methodological guidelines on the basis of NeOn Methodology succinctly outline the ontology functional requirements leading to the development of ORSD which allows (a) a search that is more direct for existing knowledge resources that are necessary to be reused in the process of developing the ontology, and (b) the ontology content evaluation (Wiegers, 2003). Thus, the methodological guidelines of NeOn Methodology can have applications in various projects.

For instance, developed guidelines can be applied in e-Employment whose goals are developing an interoperable and knowledge intensive architecture based on ontologies of public e-Employment services (PES), and enabling market-places that are federated for mediation of employment agencies through an interoperation which is based on peer-to-peer network (Gómez-Pérez & Suárez-Figueroa, 2008). These methodological guidelines of NeOn Methodology can also be used in e-Procurement as well as pharmaceutical companies.

For instance, in e-Procurement application they can be used in solving the problem caused by the lack of interoperability between those emit and receive invoices; whereas in pharmaceutical companies application, these guidelines can be used in helping to systematize the creation, maintenance and storage of updated information that is drug-related as well as allowing new drug resources to be easily integrated (Sommerville, 2007).   

Want help to write your Essay or Assignments? Click here

Conclusion and Future Work

In conclusion, it is important to state that identification of functional requirements is one of the crucial activities in the process of developing ontologies. In this research report, the specification of ontology’s functional requirements has been systematized in the proposed prescriptive as well as detailed methodological guidelines developed in the context of NeOn Methodology in order to specify ontology’s functional requirements.

The developed methodological guidelines can act as a baseline for creating a particular ORSD which is critical to speed up the process of developing the ontology. Terms as well as their frequency of occurrence from the ORSD’s pre-glossary can be used to search and select consensual and knowledge-aware resources that are existing, which after the process of re-engineering when essential, thereby allowing ontologies to be built faster, cheaply, and with higher quality.

The developed methodology guidelines based on NeOn Methodology presented in this research report can be extended further to develop a tool capable of automatically generating all possible combinations for relations and concepts in functional requirements, as well as automating the process of constructing detection rules, and also in developing ORSD.

Despite the fact that, ontology-based software application developers currently have specific methodological guidelines that are helpful to them in defining functional requirements of the software applications they intend to develop, these guidelines are not sufficient to succinctly define functional requirements of ontologies and more work is envisaged in the near future to address this challenge.      

Want help to write your Essay or Assignments? Click here

References   

B. Al-Ahmad, K. Magel, and S. Abufardeh, “A Domain Ontology Based Approach to Identify Effect Types of Security Requirements upon Functional Requirements,” International Journal of Knowledge Engineering, vol. 1, no. 1, pp. 24-29, 2015.

A. P. Ambrósio, D. C. de Santos, F. N. de Lucena, and J. C. de Silva, “Software Engineering Documentation: An Ontology-Based Approach,” Proc. Web Media and LA-Web Joint Conf., 10th Brazilian Symp. Multimedia and Web Second Latin Am. Web Congress, pp. 38-40, 2004.

G. Cascini, G. Fantoni, and F. Montagna, “Situating needs and requirements in the FBS framework,” Design Studies, vol. 34, no. 5, pp. 636–662, 2013.

B. Chandrasekaran, and J. R. Josephson, “Function in device representation,” Engineering with Computers, vol. 16, no. 3-4, pp. 162–177, 2000.

A. Davis, “Software Requirements: Objects, Functions and States,” Upper Saddle River, NJ: Prentice Hall, 1993.

A. Gómez-Pérez, M. Fernández-López, and O. Corcho, “Ontological Engineering: With examples from the areas of Knowledge Management, e-Commerce and the Semantic Web,” London, UK: Springer Verlag London Limited, 2004.

M. Grüninger, and M. Fox, “Methodology for the design and evaluation of ontologies,” In Skuce, D. (ed) IJCAI95 Workshop on Basic Ontological Issues in Knowledge Sharing, pp. 6.1–6.10, 1995.

M. Fernández-López, and A. Gómez-Pérez, “Searching for a Time Ontology for Semantic Web Applications,” Formal Ontology in Information Systems, Turín, Italy, 2004.

A. Gómez-Pérez, and M. C. Suárez-Figueroa, “NeOn Methodology: Scenarios for Building Networks of Ontologies,” 16th International Conference on Knowledge Engineering and Knowledge Management Knowledge Patterns (EKAW 2008). Conference Poster, Turín, Italy, 2008.

T. J. Howard, S. J. Culley, and E. Dekoninck, “Describing the creative design process by the integration of engineering design and cognitive psychology literature,” Design Studies, vol. 29, no. 2, pp. 160–180, 2008.

IEEE, “Recommended Practice for Software Requirements Specifications,” IEEE Standards, p. 830, 1998.

G. Kotonya, and I. Sommerville, “Requirements Engineering: Processes and Techniques,” New York, NY: John Wiley & Sons, 1998.

S. Lauesen, “Software Requirements: Styles and Techniques,” London, UK: Pearson Education Limited, 2002.

J. Lee, and N. L. Xue, “Analyzing user requirements by use cases: A goal-driven approach,” IEEE Software, vol. 16, no. 4, pp. 92-101, 1999.

R. Malan, and D. Bredemeyer, “Functional requirements and use cases,” [Online]. Retrieved from: http://www.bredemeyer.com/pdf_files/functreq.pdf, 1999.

L. Mich, F. Mariangela, and N. I. Pierluigi, “Market research for requirements analysis using linguistic tools,” Requirements Engineering, vol. 9, no. 1, pp. 40–56, 2004.

M. Roth, and K. Woodsend, “Composition of word representations improves semantic role labeling,” Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, Doha, Qatar, pp. 407–413, 2014.

I. Sommerville, “Software Engineering,” (8th ed.). New York, NY: International Computer Science Series, 2007.

S. Staab, P. Hans, R. Studer, and Y. Sure, “Knowledge Processes and Ontologies,” IEEE Intelligent Systems, vol. 16, no. 1, pp. 26–34, 2001.

M. C. Suárez-Figueroa, G. Aguado de Cea, C. Buil, K. Dellschaft, M. Fernández-López, and M. Uschold, “Building Ontologies: Towards A Unified Methodology,” In: Watson I (ed.) 16th Annual Conference of the British Computer Society Specialist Group on Expert Systems. Cambridge, United Kingdom, 1996.

M. C. Suárez-Figueroa, M. Fernández-López, A. Gómez-Pérez, K. Dellschaft, H. Lewen, and M. Dzbor, “NeOn D5.3.2. Revision and Extension of the NeOn Development Process and Ontology Life Cycle, NeOn project,” Retrieved from: http://www.neon-project.org, 2008.

M. Uschold, “Building Ontologies: Towards A Unified Methodology,” In: Watson I (ed.) 16th Annual Conference of the British Computer Society Specialist Group on Expert Systems. Cambridge, United Kingdom, 1996.

A. van Lamsweerde, “Requirements Engineering: From System Goals to UML Models to Software Specifications,” New York, NY: John Wiley & Sons, 2009.

E. Wiegers, “Software Requirements 2: Practical techniques for gathering and managing requirements throughout the product development cycle,” (2nd ed.). Redmond: Microsoft Press, 2003.

R. Wiering, “Requirements Engineering: Frameworks for Understanding,” New York, NY: John Wiley & Sons, 1996.

Want help to write your Essay or Assignments? Click here

Education and the use of technology

Education and the use of technology
Education and the use of technology

Want help to write your Essay or Assignments? Click here

Education and the use of technology Education Admission Essay

INSTRUCTIONS:

Education and the use of technology. Write about how technology and digital media has impacted modern education.

Write an essay of no more than 650 words, using the prompt to inspire and structure your response.

Technology ushers in fundamental structural changes that can be integral to achieving significant improvements in productivity. Used to support both teaching and learning, technology infuses classrooms with digital learning tools, such as computers and hand held devices; expands course offerings, experiences, and learning materials; supports learning 24 hours a day, 7 days a week; builds 21st century skills; increases student engagement and motivation; and accelerates learning. Technology also has the power to transform teaching by ushering in a new model of connected teaching. This model links teachers to their students and to professional content, resources, and systems to help them improve their own instruction and personalize learning.

Want help to write your Essay or Assignments? Click here

Introduction to Networks

Introduction to Networks
Introduction to Networks

Want help to write your Essay or Assignments? Click here

Introduction to Networks (Client/Server, Peer-to-Peer, and Home/Small Office)

Summary Description of the Website’s Structure

The professional support website named Network Computing.com that was retrieved in November 7 is basically built upon a structural theme that informs and reinforces the users mental models on how they can get access to the contents provided.  These elements therefore govern the manner in which the navigational systems of the web site mold its user’s mental models on the manner in which information is organized (Kini, 2002).

This therefore points out to the essentials that are required in the development of a site which includes hierarchies and sequences as depicted in the website. The information in the website is organized in a sequential manner an element that is chronologically done with topics aligned in series from the general to the specific subjects. Since this website can be considered as an educational site, there is an incorporation of straight sequences.

Discussion on What I Have Learnt From This Website

It is essential to point out that one of the subjects that interest me in the website is that which is related to the manner in which Cloud systems are used to cure M&A IT integration challenges. As determined through the website, the integration of IT systems and the transfer of data remains a challenging task. However, companies have the opportunity and the capacity to incorporate the use of cloud systems in the integration of their functions with the aim of streamlining there functions (Kini, 2002).

According to the site, it has been established that data transfer systems and the way in which they are integrated remains an afterthought in M&A negotiations. However, this may represent one of the biggest challenges through the divestment process.

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Some other lines of business owners have faced challenges in the making of more complex systems. Through the use of IT, these business lines have the capacity to strictly timeline there systems through the combination of the cloud systems, a factor that impacts the functions of their organizations (Stephanie, 2016). Large data transfers, data centre approaches to consolidation and the application of level standardization approaches have been also found to be a challenging task for entities, and still becomes more complex across multiple organizations.

The site therefore depicts the answer to the challenges that have been faced in the integration of M&A systems that come from different unexpected sources. Through the utilization of public cloud, organizations are bound to find relief in the issues and the challenges that have been faced in their IT experiences (Stephanie, 2016).

This therefore requires that a divesting approach to a company’s functions is moved to the cloud which creates a neutralizing environment that clarifies data ownership and provides clear projections across the accessed controls.

An instance is given of the Hess Corporation which shares details of the manner in which divestment in the retail and energy marketing industry can be leveraged through the use of other web services such as Amazon. This approach treats the marketing business of an organization as an element that needs to be incorporated in a neutral zone during the process of transition (Stephanie, 2016). Hess Corporation in this case made use of the automation approach in building several servers a day that made use of the AWS tools in the creation of backup systems that would monitor and set up networks.

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Companies that look for opportunities to acquire divested systems may therefore incorporate the proponents of cloud services in its operations and ensure its staff is acquainted with the cloud skills in a move to make the organization appealing to the buyers. This therefore points out organizations in the use and integration of public cloud services as an option to the challenges that have been faced in the IT world (Stephanie, 2016).

However, there are some other factors that need to be considered such as the strategic alignment approaches, financial synergies and the cultural fit, an approach that clearly depicts the need to incorporate infrastructural systems that enable the smooth transition of these systems in the right approach. Some of the helpful links that have broadened my knowledge on this subject therefore include: http://www.cloudsystems.com/

In my view, I find this information essential as my professional resource since it provides insights into several elements that enhance my knowledge on the approaches of integrating the cloud systems to the functions of an organization. With this information, I am in a capacity to decisively adopt the cloud systems within the functions of an entity in as a means of making the functions of such an organization appealing to the clients (Rimac, Borst, & Walid, 2008).

I therefore find this information very essential to many organizations that are struggling to make a transition into the IT world to develop infrastructures that fit into the current culture.

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Evaluation of the Program

The website known as Network Computing.com is an educational site that moulds and informs the minds of its users on several elements as noted in the site. The site provides to its users more informative information on the use of different IT systems in the enhancement of their business functions (Loo, 2003).

The manner in which the site is developed therefore makes it appealing to the users to find the right information required. The information in the website is organized in a sequential manner an element that is chronologically done with topics aligned in series from the general to the specific subjects.

References

Kini, R. B. (2002). Peer-To-Peer Technology: A Technology Reborn. Information Systems Management,19(3), 74.

Loo, A. W. (2003). The Future of Peer-To-Peer Computing. Communications of the ACM46(9), 57-61.

Rimac, I., Borst, S., & Walid, A. (2008). Peer-assisted content distribution networks: performance gains and server capacity savings. Bell Labs Technical Journal (John Wiley & Sons, Inc.)13(3), 59-69. doi:10.1002/bltj.20323

Stephanie Tayengco (2016). The Cloud Cures M&A IT Integration Headaches. Retrived  From: http://www.networkcomputing.com/cloud-infrastructure/cloud-cures-ma-it-integration-headaches/2097909404

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Enterprise Networking Essay Paper

Enterprise Networking
Enterprise Networking

Want help to write your Essay or Assignments? Click here

Enterprise Networking

Introduction

Advents of computer innovations for collecting, storing, handling and communicating information are changing how people and organizations use and disseminate information.  Moreover, they are also creating moral dilemmas (Lynch, 2000).   Cloud computing, for instance, has become a preference for many companies because of the cost-efficacy that comes with it regarding delivering IT services.

Companies can cut down running costs by finding and paying for resources that they need.  With cloud computing, businesses can leverage the burden connected with handling numerous resources across the organization. At the same time, they can now concentrate on value creation and novelty for the business. Ultimately, cloud computing representations offer business agility. This allows for the enterprise to meet demand while enabling companies to realize market expectations with a competitive edge.                   

Computer networks were established not just as accurate means of communication and information sharing but as sources of power. However, the speed and proficiency of information systems, which comprise of local and global networks, repositories, and programs for processing data, compel people to confront exclusively new rights and obligations regarding the use of information by contemplating standards of conduct shaped before computers were invented (Amrhein and Quint, 2009). This paper evaluates the ethical issues surrounding information Enterprise Networking of networks such as cloud computing. 

Enterprise Networking

Want help to write your Essay or Assignments? Click here

Novelty in data storage methods and the plummeting storage expenses have been answerable for the multiplying repositories on individuals, employees, clients and prospective clients preserved by private and public entities.  The novelties in data storage have enhanced the violation of personal privacy.  Information storage systems are so cheap, which means that anyone can have their data stored almost for free.

On the other hand, dominant players in the search industry such as Google, America Online (AOL) and Yahoo among others, generate more than 200 million searches in 24 hours (Amrhein and Quint, 2009). These vast collections of ‘consumer intentions’ has become easy targets of private firms looking for a market edge. It has also made it possible for government agencies and private investigators to mine necessary information about persons.  

Enterprise Networking           

Want help to write your Essay or Assignments? Click here

Different people generate computer data about themselves in various ways such as; online purchases, telephone calls, magazine subscriptions, renting videos, searches, surfing the internet for information and federal government records among others. If properly mined, this data can tell so much about one’s preferences and habits (Fulda. 2001). This is how lucrative individual information stored on private firms has become fodder that drives big corporations.

Data mining entails using personal information that can result in disruption of important normative values (Fulda, 2001). As such, this can lead to ethical issues that have to do with violation of individuals’ privacy. For instance, violation of privacy comes in when information about a person is used, transmitted or obtained without his/her consent; such moves can lead to an unfair judgment of individuals. Nonetheless, when information is used anonymously to make different profiles its no longer connects to individual people, as such no direct violation of privacy as the patterns do not reveal “authentic” personal information.                                     

While everyone has the right to information safety, cloud computing undermines information privacy, because hackers and system operators, for instance, may have access to information directories at their discretion (Chee and Franklin, 2010). These two individuals may do whatever they deem fit, even if it means backing up information that was thought to be secure (Lynch, 2000). 

Moreover, they can have access to information without any trace, an aspect that makes the enforcement of privacy right somewhat intricate.  While selling individual information has become a lucrative business for many firms, it preys on the private lives of persons. Companies with 800 and 900 numbers can collect basic information about all their callers.

This information can be procured and sold freely, however, if organizations become too deliberate at it, they risk losing clients. This is also applicable to on-line services like Prodigy, which may have access to subscriber’s profiles. Many companies have been gathering the information mainly to monetize it.

Enterprise Networking

Want help to write your Essay or Assignments? Click here

Privacy is a claim of people, or institutions in determining when, how and to what degree data about them are conveyed. In simple words, privacy is individuals’ right to control what happens with their personal data (Lynch, 2000). There is no right to privacy dimnesions in America. However, some level of protection is afforded federal and state laws. The use of a computer can threaten the private lives of people’s identity.

The internet generates significant amounts of personal data, which presents insights into their interests as well as personality. The federal and government agencies have been allowed access, verify and even retain individual data.  And yet, permitting government agencies to hack and approve the retention of personal web and phone metadata will lead to significant problems. The central ethical issue involved in this case culminates to the loss of personal privacy (Lynch, 2000).                                                                         

This is because government agencies will have access to any form of information about people, for example, websites they visit, people they email, places they were, purchases thy have made among others. Much as people can control what they say and write, they do not have control over personal webs and phone metadata. However, according to the America Computer Society Code of professionalism, it is important for members of society to maintain professional guidelines to improve and increase ICT industry, by ensuring individuals’ data is not used for the wrong purpose.

Also, they should not use personal information to discriminate them, since Code on professionalism stipulates the opposite. In other words, all persons have the right to equal treatment. Discrimination is not a professional act.

Enterprise Networking

Want help to write your Essay or Assignments? Click here

If it’s wrong for ordinary citizens to snoop on government’s private data, equally it is unethical for government agencies to hack and approve the retention of personal web and phone metadata (Lynch, 2000).  Furthermore, there is also the likelihood of other individual gaining access to the information.

The privacy issue is a regular incidence even in financial institutions, yet the code on professionalism has not had the opportunity to develop while developing its legislations; ACS is attempting to increase public confidence in ICT sector. For that reason, it has little experience when it comes to protecting stored information. The volume is stored information will be enormous, leading to petabytes of information as well as the cloud.                               

Already, the intelligence agencies use the data they have on ordinary citizens in wrong ways. The stored information is the basis of nosy snoops and oppression. In fact, immense information hacking cannot be used to control terrorism, because it’s not suitable. But it can be used in minor frauds, unpaid charges among others. Hacking and retention law are unethical on fundamental human rights.

The government is in charge of serving people, and not treats them like some form of presumptive criminals. People should be watching the state and not the opposite. In conclusion, modern technologies have changed not just how things are run but has also come with ethical issues. This calls for innovative policies to guarantee the rights of individuals and companies alike.

Want help to write your Essay or Assignments? Click here

References

Amrhein, D., and Quint, S. (2009) Cloud computing for the enterprise: Part 1: Capturing the cloud. IBM Corporation. Retrieved on December 1, 2011 from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html

Chee, B. and Franklin, C. (2010) Applications for Clouds. Chapter 4 in Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center. CRC Press. Retrieved on December 1, 2011, from http://media.techtarget.com/searchSystemsChannel/downloads/Cloud_Computing_Techn_Strat_of_the_Ubiq_Data_Cent_Chapter_4.pdf

Fulda.J.S. (2001). Data Mining and Privacy. In R. Spinello and H.Tavani, editors, Readings in CyberEthics, pages 413–417.

Lynch, M. (2000) Ethical Issues in Electronic Information Systems. University of Texas. Sections on Electronic Networks (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Elec_Nets); Access to networks         (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Access); and Electronic Databases        (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#ED) retrieved December 20, 2011.

Want help to write your Essay or Assignments? Click here