StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Introduction to Computer - Literature review Example

Cite this document
Summary
This literature review "Introduction to Computer" discusses two computing stories and their relationship with the actor-network theory is established. It mainly consists of both technical and non-technical elements. It mainly deals with the heterogeneous nature of the actor networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Introduction to Computer
Read Text Preview

Extract of sample "Introduction to Computer"

Introduction to computer Contents Introduction 3 Discussion 3 Conclusion 7 References 9 Introduction Actor network theory can be defined as the social theory that is developed for evaluating and determining the capacity of the non-humans to act or respond in particular networks or systems. This theory was developed and propagated by Michel Callon in the year 1991 and by Bruno Latour in the year 1992. Their analysis was based on the concept that a network comprises of both human and non-human actors. In this paper two computing stories are discussed and their relationship with the actor network theory is established. It mainly consists of both technical and non-technical elements. It mainly deals with the heterogeneous nature of the actor networks. Discussion The two computing stories selected for discussion are entertainment hack of Sony pictures and twice hacking of e bay. Sony pictures entertainment experienced a series of cyber-attacks which resulted in shutting down of the computer system of the company and it revealed all personal information of its employees including the social security numbers, salaries and addresses. It also leaked the confidential information and the financial data of the company by revealing the inner secrets of the film studio. It severely affected the top level executives of the organization, its employees and the individuals or the entity that are associated with the concerned company (Choi, 2014). Application of the network theory This theory was applied in order to protect the interest of the stakeholders of Sony entertainment. It determines how actors form and involve other actors and also use the non-human actors towards strengthening such alliances and protecting or safeguarding their interest’s .It mainly deals with two important concepts which include inscription and translation. The application of the actor network theory and other computing technology such as the cloud based technology assist in protecting the software and operating system of the concerned company. It combines various terminal devices and offer different online and software services. This theory or the concept is considered as the software plus services that will prevent the leakage of the confidential data or information from the organization or the company. It supports the secondary market and bridges the new market. Other example of computing service is hacking of e bay twice. EBay encountered hacking twice. The user name, password, address and the contact numbers of the customers were hacked and therefore the company faced much criticism due to the problem that was encountered by its customers. The password keys of the customers were stolen by the hackers. This caused due to the technological default of the company in maintaining and protecting the password of its customers. The data base which was hacked by the hackers mainly included the information of its customers but it did not include any confidential financial data or information related to the company or the organization (Later, 2002). Application of the actor network theory in case of e bay Actor network theory is applied and implemented in eBay online for protecting the interest of its customers. It ensured efficient and effective supply chain processes in their computing technology for their online store partners. It will adopt more services and technology related with the supply chain processes. It connects with the online SME market and interests their ISV partners to join the actor network technology. Its business value depends on integrating the physical logistics process and performing online services. From the above two computing stories it can be observed that both the companies encountered security problem. They failed to prevent their operating system from the hackers. Therefore the company’s preferred to use and implement computing technology for protecting and safeguarding their security system. The actor network technology is applied for bringing value to the companies. This concept is sometimes criticized by the users since it is subjected to manipulation in their networks, this concept is mainly adopted by the organization for securing its operating system and it is considered as a flexible and pragmatic approach as it is advocated for tackling or overcoming the issues related to security and protection of the operating system. The truth, profitability, interests and efficiency are considered as the properties of the network system. The actors can use or apply this concept for fulfilling the interest of its stakeholders. The innovation and development in the information technology is considered as the result or the outcome that is not merely determined by the properties or the features off the technology. The application of this theory by the concerned companies in their operating system will prevent its attackers Adoption of this concept will assist the companies in addressing various issues and the actions that are required to be implemented in order to encounter the issues or the problems. The main intention or objective of each organization is to maintain confidentiality. Therefore the concerned companies focused on protecting and safeguarding its operating system and financial information from being leaked or hacked by the hackers. The company mainly aimed to secure their password and other data. The advancement in computing technology assisted the company in securing its passwords from hacking (Robb, 2014). Importance to management This concept can enhance the management function effectively and efficiently. This theory can be easily demonstrated in the management information system. This mainly focuses on increasing the accountability and transparency of the operating system. Technology is considered as the heterogeneous element that is considered in designing and implementing the successful information system. The actor network theory is formulated and designed for implementing successful information system. It assists the management of the organization in determining and identifying the repetitive activity across space and time. It is required to maintain consistency in the organization. The various management functions can be effectively performed with the application of this technology. This concerned concept guides the management in solving the internet problems that are associated with the purpose of protecting the password and other confidential information or data of its various stakeholders who are directly or indirectly associated with the company or the organization. It explores various technologies for establishing technical and social relation involved in the implementation and development of new technologies in the organizations or the companies. The development in the computing technology will provide independence to the small and the independent software vendor’s partners which are located across the world to use the protected server or internet. These computing services help the companies to develop their own software or computing server according to their needs and requirements. This computing technology is generally applied by the large organization. The management is mainly concerned with the internal and confidential activity of the organization; therefore the computing technology plays an important role in safeguarding the interest of the companies. The cloud computing technology is based on the concept of actor network theory. The cloud services or the cloud computing technology assisted the company in transmitting its network system for operating smoothly and effectively. The cloud services assist the companies or the organization in getting or generating more profit. This cloud based technology will assist the management to carry out their activities efficiently and effectively. It will help them in realizing the goals and objectives of the organization within the specific period of time. This technology is defined as the coordinated set of actors that interact with each other to produce, develop and distribute the goods and services effectively. It generates value for the organization or the companies. In order to compare and contrast the theory, the theory is preferred by many companies on the other hand it encountered various limitation and disadvantages in its applications. The main limitation of this theory is that it does not distinguish between the technical and social factors. The theorist such as Labour was of the view that it failed to meet the indeterminacy and the other criticism in applying this technology is that it is subjected to manipulation of the networks. The concerned concept encounters conflict with different human groups. The advantages or benefit of this theory is that it is required to tackle the complexity of the socio technical situation. The application of this theory assist the organization in applying the computing based technology effectively and efficiently for safeguarding and protecting the interest of the stakeholders of the organization. This technology is influenced by the development band the implementation of the actor network theory. This theory is considered as a unique concept since it identifies and considers the technology as an actor (Stanforth, 2006). Conclusion On the basis of the above discussion, contemporary media and the assemblage theory, the use of computer is very important and it plays a vital role in various cultural aspects of the organization. The factors such as cultural, social and political factors play an important role in the improvement and development of technology. For example the main purpose behind the invention of computer is to meet the organizational needs but now it is also used for personal purposes. It is considered as the symbol of improvement in the technology. The organization generally prefers to use this computer and computer based technology for operating effectively and efficiently. References Choi, C. 2014. Ebay hacked: What to do now to protect your accounts. [Online]. Available at: < http://www.itv.com/news/story/2014-05-21/ebay-users-urged-to-change-passwords-after-hacking/ >. [Accessed on 1st July 2015]. Labour, B. 2002. Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts. [Pdf]. Available at: < http://www.bruno-latour.fr/sites/default/files/50-MISSING-MASSES-GB.pdf >. [Accessed on 1st July 2015]. Robb, D. 2014. Sony hack: a timeline. [Online]. Available at: < http://deadline.com/2014/12/sony-hack-timeline-any-pascal-the-interview-north-korea-1201325501/ >. [Accessed on 1st July 2015]. Stanforth, C. 2006. Using actor-network theory to analyse e-government implementation in developing countries. [Pdf]. Available at: < http://itidjournal.org/itid/article/viewFile/229/99 >. [Accessed on 1st July 2015]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Introduction to Computer Literature review Example | Topics and Well Written Essays - 1500 words, n.d.)
Introduction to Computer Literature review Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/technology/1881618-introduction-to-computer
(Introduction to Computer Literature Review Example | Topics and Well Written Essays - 1500 Words)
Introduction to Computer Literature Review Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/technology/1881618-introduction-to-computer.
“Introduction to Computer Literature Review Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/technology/1881618-introduction-to-computer.
  • Cited: 0 times

CHECK THESE SAMPLES OF Introduction to Computer

Stagecoach Company's Risk Areas

Date Auditing Stagecoach Company is among the leading transport companies in the United Kingdom.... The company is a quoted company and that means that it has to publish its financial reports on an annual basis.... The reports are usually published so that the stakeholders of the company can use them....
8 Pages (2000 words) Case Study

Cryptosystems Based on Discrete Logarithm

Any data we input into the computer with the help of the key board is converted into numbers of the binary system in accordance with ASCII code.... For instance the character 'A' is entered as 10100001 in the binary notation (Subramaniun, 140), which corresponds to the number 161 in the usual decimal notation....
4 Pages (1000 words) Essay

Secure Computer System

hellip; The author states that a computer security incident can be a result of a computer virus, a system intruder, other malicious code, sabotage from an insider or an outsider.... The term may also cover to broadly describe incidents which resulted from rigorous malicious technical activity, and expert replies could produce severe damage Firewalls are the most common security measures for computer networks.... To assign the user to create accounts and passwords in the computer to control the users who can access the system....
2 Pages (500 words) Essay

Computer Science

Each pixel both below and above are drawn thus resulting in a curve that has a thickness of 2n+1 pixel in the y axis (Drawing Lines and Curves (Introduction to Computer Graphics Using Java 2D and 3D).... Bresenham's algorithm calculates the locations of the pixels in the first 45 degrees....
4 Pages (1000 words) Lab Report

Number Systems Calculations

of different symbols that is used in a number system.... A system which uses 10 different symbols is said to be a decimal no.... system (ITL Education Solutions Limited, 2011).... Similarly a system which uses 2 different… system.... In order to represent the base of a no.... system first of all the no....
4 Pages (1000 words) Essay

Different Types of Logic Gates

Introduction to Computer science.... Basics of computer science.... NOT gate is most primarily form of logic gate.... This logic gate's output is reverse of its input.... For instance, output (X) is regarded as true if and only if Input (Y) is NOT True.... Truth table for X=NOT… The AND gates states that if both inputs are true then only the output will be true else it would be false....
2 Pages (500 words) Essay

Storge device of computer

ork citedIntroduction to computer Science.... computer is a programmable electronic device that uses given a set of instructions in well-defined way and execute prerecorded instructions (a program).... Without a storage device, in the computer, the computer may not be able to save information or any settings hence would be portrayed a dumb terminal.... Likewise, a storage STORAGE DEVICE OF computer computer is a programmable electronic device that uses given a set of instructions in well-defined way and execute prerecorded instructions (a program)....
2 Pages (500 words) Essay

Should Computer Scientists Experiment More

The article also states that experimentations can also be helpful to computer scientists if they need to understand other models applicable in the systems.... For instance, the author asserts that computer science deals with programs and software that are human creations.... This implies that computer scientists do not want to waste resources SHOULD computer SCIENTISTS DO EXPERIMENTS?... Summary Walter Tichy's article discusses reasons why computer scientists should not conduct experiments....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us