ISY10212 Contemporary Issues in MM & IT 2018 Some Options for Assignment 3: Report Topic and Presentation The following offers a list of about 70 broad ideas suitable for students to consider as a...

1 answer below »

ISY10212 Contemporary Issues in MM & IT 2018</o:p>

</o:p>

Some Options for Assignment 3: Report Topic and Presentation</o:p>

</o:p>

The following offers a list of about 70 broad ideas suitable for students to consider as a Report Topic for this unit in 2018. </o:p>

</o:p>

Students are encouraged to select an area to specialise in for their Report. The focus should be to define a narrow, but deep (detailed), area of research. It is anticipated that pursuing such a “narrow and deep” topic area is likely to provide students with high levels of autonomy, ownership, motivation and personalised learning outcomes.</o:p>

</o:p>

The list is only intended as an idea prompt. Students are encouraged to identify alternative topic areas to pursue if they wish, but these must be submitted to their tutor for consideration and authority to proceed.</o:p>

</o:p>

Each of the topics identified below contains ethical considerations. Each is open to be viewed for its relative strengths and weaknesses (positive and negative effects). Such a balanced consideration of strengths and weakness must be incorporated into the Report.</o:p>

</o:p>

Areas which do not hold such “two-way” arguments are not suitable as a Report Topic area. For example, the incidence of malware (such as viruses) is not a suitable report topic area as it is “all bad” in its effect on society…unless a student can clearly argue some positive effects.</o:p>

</o:p>

Regards,</o:p>

</o:p>

Graham Cooper 31/ July/ 2018</o:p>

</o:p>

Note: A few additional topics were added at 5 Aug 2018. </o:p>

These are indicated in BLUE below to aid identification.</o:p>

- Cooper , 5 Aug 2018.</o:p>

</o:p>


1. Communicating with IT</o:p>

</o:p>

Social networking sites; user groups, Twitter, Facebook</o:p>

</o:p>

Social networks and age restrictions</o:p>

</o:p>

Mobile computing: Laptops, tablets and smart phones; work from anywhere</o:p>

</o:p>

Apps...new world applications for mobile consumers</o:p>

</o:p>

2. IT is a whole new Industry</o:p>

</o:p>

Who pays; business models for the internet</o:p>

</o:p>

Australian National Broad Band Network; costs, benefits and roll-out</o:p>

</o:p>

3. Weather IT is good</o:p>

</o:p>

Weather forecasting; for tomorrow or for next year</o:p>

</o:p>

Real time updates; Warnings and Alert Systems</o:p>

</o:p>

4. IT can get f$#@ed!</o:p>

</o:p>

Pornography industry; early adopter of on-line technology and business</o:p>

</o:p>

Issues of cross boarder jurisdiction. Host country laws, but delivery is global. </o:p>

</o:p>

On-line gambling. New business opportunities or new social problems?</o:p>

</o:p>

5. Kill IT</o:p>

</o:p>

Violence in video games; does this induce violence in individuals and society?</o:p>

</o:p>

Risks to national security from cyberterrorism and cyberwarfare.</o:p>

</o:p>

6. IT is just like me</o:p>

</o:p>

Usability - Human Computer Interface and interactions (visual, aural, touch, gesture, thought).</o:p>

</o:p>

Interface agents</o:p>

</o:p>

7. IT is child’s play!</o:p>

</o:p>

Educational applications in schools and universities. What has changed?</o:p>

</o:p>

Gamification and its role as homework.</o:p>

</o:p>

8. IT is role play</o:p>

</o:p>

Training applications in industry.</o:p>

</o:p>

Simulations – from low level flight simulators to complete control rooms.</o:p>

</o:p>

9. IT is just a game</o:p>

</o:p>

The evolution of computer games and where to next?</o:p>

</o:p>

Dedicated consoles - PlayStations, X-Boxes, Nintendo …and Interfaces</o:p>

</o:p>

Multi-player on-line games</o:p>

</o:p>

</o:p>

10. IT is cheap as chips</o:p>

</o:p>

E-waste.; Cheaper to throw away than modularize to aid recycling</o:p>

</o:p>

</o:p>

11. Can you trust IT?</o:p>

</o:p>

Online banking and purchases; can they be trusted?</o:p>

</o:p>

Cryptocurrencies as a method for payment.</o:p>

</o:p>

12. Is IT safe?</o:p>

</o:p>

Security & encryption. How to keep secrets</o:p>

</o:p>

Biometrics; finger prints to face recognition</o:p>

</o:p>

Geo tracking…a study in time and space</o:p>

</o:p>

13. IT is the law</o:p>

</o:p>

Overlap and tensions between national and international laws</o:p>

</o:p>

Privacy and confidentiality - what implications for data management?</o:p>

</o:p>

14. Protecting the worth of IT</o:p>

</o:p>

Intellectual Property in IT is worth how much?</o:p>

</o:p>

Options for protecting against Pirating</o:p>

</o:p>

15. Find IT and Attack IT</o:p>

</o:p>

Unmanned military drones</o:p>

</o:p>

Spying and eavesdropping; government surveillance of ICT</o:p>

</o:p>

Google Earth and Street View</o:p>


16. Tomorrow the World [Wide Web]!</o:p>

</o:p>

Internet of Things</o:p>

</o:p>

Media convergence, media control and media monopolies</o:p>

</o:p>

17. “Everything is going extremely well” (HAL, 2001)</o:p>

</o:p>

Computer control; operation, monitoring and management</o:p>

</o:p>

Robotics and Artificial Intelligence </o:p>

</o:p>

18. I’ll buy IT</o:p>

</o:p>

PC or Apple? : History, now and future of computer hardware </o:p>

</o:p>

Open source and freeware</o:p>

</o:p>

19. Congratulations! IT is a girl!</o:p>

</o:p>

Gender bias in the IT industry and in games</o:p>

</o:p>

Equity and accessibility</o:p>

</o:p>

20. IT has health implications</o:p>

</o:p>

Health risks; eye strain, RSI, UV radiation, games and internet addiction</o:p>

</o:p>

Games to keep you healthy and to aid rehabilitation</o:p>

</o:p>

The good and bad prospects of on-line health records</o:p>

</o:p>

21. Understanding IT</o:p>

</o:p>

Using IT and multimedia to make complex information simple</o:p>

</o:p>

IT can see patterns – Deep Learning in Big Data</o:p>


</o:p>

22. IT has its own culture</o:p>

</o:p>

Chat groups and gamers</o:p>

</o:p>

Anonymity and other persona; from escapism to sanctuary from social awkwardness</o:p>

</o:p>

23. We can make a show on IT</o:p>

</o:p>

Influence of multimedia and IT in popular movies – 2001, Star Wars, I robot, Her, ex Machina</o:p>

</o:p>

Uptake of multimedia cartooning and 3D modeling; From The Simpson’s, to Lord of the Rings and beyond</o:p>

</o:p>

24. IT can cause a clash of cultures</o:p>

</o:p>

Issues of intercultural and indigenous perspectives</o:p>

</o:p>

25. IT has a future</o:p>

</o:p>

Virtual Reality and Augmented Reality</o:p>

</o:p>

Mobile computing, clouds and ubiquitous computing </o:p>

</o:p>

26. Joe Blogs about IT</o:p>

</o:p>

Web logs; documenting life in a war zone</o:p>

</o:p>

You Tube; from entertainment to education</o:p>

</o:p>

27. IT was always going to be about politics</o:p>

</o:p>

Politics and the use of new media.</o:p>

</o:p>

Whistle blowing through Wikileaks and other sites</o:p>

</o:p>

Anonymous</o:p>

</o:p>

28. IT prints in 3D</o:p>

</o:p>

Printing physical objects…from guns to body parts</o:p>

</o:p>

29. IT provides free knowledge to the masses</o:p>

</o:p>

Free educational and information sources; Wikipedia, the Khan Academy and TED talks</o:p>

</o:p>

30. Face (book) up to IT</o:p>

</o:p>

Facebook and social experiments conducted upon their users</o:p>

</o:p>

Monetarization of Social Networks</o:p>

</o:p>

31. Look out for IT above</o:p>

</o:p>

Drones for the consumers; air borne cameras or invaders of personal space</o:p>

</o:p>

Micro Satellites for daily updates of images of Earth</o:p>

</o:p>

32. IT is Disruptive</o:p>

</o:p>

IT in transport- ride sharing such as Uber</o:p>

</o:p>

IT in accommodation – house sharing such as Airbnb</o:p>

</o:p>

IT in classified adverts – selling 2nd hand on Gumtree and eBay</o:p>

</o:p>

33. IT has a special role</o:p>

</o:p>

Impact of IT in the music industry</o:p>

</o:p>

Impact of IT in the film industry</o:p>

</o:p>

Impact of IT in the tourism industry</o:p>

</o:p>

Impact of IT in the sports industry</o:p>

</o:p>

Impact of IT in science</o:p>

</o:p>

Impact of IT in the [placeholder] industry</o:p>

Answered Same DayAug 28, 2020ISY10212Southern Cross University

Answer To: ISY10212 Contemporary Issues in MM & IT 2018 Some Options for Assignment 3: Report Topic and...

Kuldeep answered on Sep 03 2020
76 Votes
Contemporary issues in IT
Running head: Contemporary Issues
Contemporary Issues
Contemporary issues in IT    September 3    2018    
    
Executive Summary
ICT is a
oad field that covers different technologies that can easily store, receive and transmit the data electronically. As electronic devices are so tightly integrated into the structure of modernized society the strengths and weaknesses of the ICT use in different fields might not be instantly apparent. This report includes a cu
ent issue in the area of encryption technology. This report also highlights social, cultural, et
hical, and legal implications of encryption technologies, and how these aspects may differ in different countries.
Contents
Introduction    4
Is IT safe: Security & encryption    4
Positive and negative effects    5
Positive Points    5
Negative Points    6
How to keep secrets    6
Future of Encryption    7
Social, cultural, ethical, and legal implications    8
Conclusion    11
References    13
Introduction
Contemporary issues with information business or trend are popular all over the world. However, they are more concerned with the problem of information management. Professional skills, skills, and attitudes to the globalization of ICT and information services have led to emerging problems in information management and knowledge management in the recent past to information society and knowledge organizations. The problem now needs to be changed to information management. In this release, there are tremendous changes in the information business. Information technology is exceedingly promoted as a strong mechanism to promote health care security (Choudhury & Kirubanand, 2018). The irony is that there is little focus on the security of healthcare IT. Computer scientists and professionals have
oadly studied the issue of ensuring performance in the safety of critical computing frameworks and systems. They developed a conceptual approach and a set of strategies or techniques for inco
ect or abnormal operations (or the result of the proper operation, exceptions in context) that could jeopardize the user, the public, and the environment. However, such methods are not usually used in the healthcare IT, which is usually developed without special consideration of a unique requirement of special factors as well as safe operation.
Is IT safe: Security & encryption
There is always a need for secure and secret communication in the field of database systems. When transmitting data, it is always possible to intercept on the outside of the sender-receiver domain. Modern digitalized encryption methods form a unique basis of database security in today's digital world. Earlier data encryption was used by the military as well as by government organizations to keep their information secret but is cu
ently used to protect information in its various citizen systems. In the year 2007, the US Government reported that almost 7% of large and small companies surveyed the encryption or partial data used during the transport. Using an Encryption Algorithm (password), the information (simple text) is defined as the process of converting a non-readable form (encrypted information called Shift) so that no one Even without the knowledge of decrypting this information, it could not be accessed. "Encoding data from a specific algorithm that is unreadable without any decryption key from any program" is known as encryption (Setyaningsih & Iswahyudi, 2012). In the computing world, encryption is a way by which simple text or different type of data is easily converted into a readable version in an encoded version which can be decoded by another organization if they have smooth access to the decryption key. Encryption is the most significant way to provide data security, particularly for the security of the data transmitted over the network. Encryption is
oadly utilized on the internet to safeguard user information or data sent between the
owser and the server to keep the secrets, including strong passwords, payment related data and any other personal or delicate information that must be considered private. Several organizations moreover individuals generally encrypt security for sensitive data which is stored on computers, mobile devices such as phones or tablets and servers.
Positive and negative effects
Positive Points
Encryption always provides protection for data: Generally, data is weakest when moving from one different location. Encryption works throughout data transfer or rest, and this is the ideal solution whether anyone is archived or how to use it. Encryption must be standard for each and every data stored at all times, no matter whether it is considered "important" or not.
Maintains encrypted data integrity: Hackers can not only steal information but can also change the data to fraud. Although the technician can change the encrypted data, the data received will be capable to detect the damage and thus will respond quickly to cyber attacks (Zhang & Wang, 2012).
Encryption is part of compliance: Several industries have strict compliance needs and requirements to assist in the protection of organizations that collect personal industries. HIPAA, FIPS, and other rules rely on safe methods for example encryption to secure and protect data, and enterprises can utilize encryption for complete security.
Negative Points
Does not protect the data in transit: Encryption is still has its own drawback the first is that it cannot protect the data in transit. In particular, if a user shares data between devices or sends data by email, the data in transit is not protected. Hackers can easily steal it.
Slow down the computer: In addition, in the case of full disk encryption, the entire drive is encrypted. In this case, the authentication key is required to decrypt the drive data whenever the user attempts...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here