Tuesday, May 5, 2020
Introduction to Computing
Question: Describe about actor network theory is a suitable theory to study computing and the enhancement of management functions in the stories? Answer: Introduction Within modern computing, every actant acts on or is acted upon by at least one other actant, in order to fulfill the aims of the assemblage. There is significant evolution in the field of technology because of the rapid advancement in information technology that uses the logical computing (Zadeh 2013).The progression in the field of information technology gives advancement in data innovation that forms an array of progression. The advancements benefit the science and technology field as it contains a few parts of it. The Actor network theory is applied as a framework for the analysis of the modern computing that is used to define the actant and to show the connection between the human and non-human aspect of the actor network theory by forming a framework of data. In this actor network theory framework the focus will be on applying ANT to the stories in order to prove the connection between them (Barry 2013). The depiction will be in the form of argument between the two stories that is covered to discuss different actants and the non-human part which describes the information technology system. The framework will be discussed by providing the contemporary debate with views from theorists. Actor Network Theory is a suitable theory to study computing The actor network theory describes how the connections lead in the creation of new entities that do not practice only the sum of the constituted entities but also the in-depth analysis. The actor network theory describes how actors play role in the network theory to study computing (Pollack et al., 2013).The basic concept lies in the sociological aspect of the data that fits with its interpretation and socio-technical network. It is a research method that focuses on the connection between both human and non-human entities. The term actant is used to remove the confusion for the actor of the human role like a film star. The actant can be defined as the interaction between human factors and materials in a network for any process. The actor network theory is a suitable theory for studying computing as it gives a in-depth investigation for carrying the framework even when the context is found and the research is done by forming a group of socio-technical entities then the actants with ag ency is made and the difference between the objects and things is discussed (Iyamu and Roode 2012). Lastly, the notion of actor-network is made and the translation is done by which these actor-networks are made and remade. Computing News Story 1: Apple announces iPhone SE: a smaller, cheaper smart phone The story that is researched is about Apple which unveils smaller iPhone and this article is taken from the BBC computing news story dated on the 21st of March 2016 in the technology section of the BBC news website (Gibbs 2016). This article shows how a new version of iPhone is launched in order to cope with the large screen phones and do business by attracting people who want to purchase small screen smart phone. The actant in this research is the Apple iPhone SE and its features. The screen, a hardware actant, acts on potential phone buyers, human actants, and enrolls them as consumers of Apple products due to its size. The digital point of view says that, big screen is in trend but if a popular brand like apple launches a small screen smart phone with more features then it is worth purchasing (Barry 2013). It is a revamped version of the iPhone 5S and is the only iPhone which is made of a screen smaller than the 4.7 inches since the iPhone 6 was released. The main connection is between the hardware actant and human actacts as it reflects the purchasing of the iPhone. The software used for developing the iPhone SE has the processing performance of the iPhone 6.The iOS 9 is used which has many features like the iCloud, AirDrop, Siri, Night shift etc. all these software features helps the enhancement of technology. The hardware actant is the main reason behind developing the small screen iphone. The hardware used in the iPhone SE is a metal body, 4-inch screen, touch ID fingerprint scanner, camera flush lenses (Zadeh 2013). All these features make the hardware of the iPhone SE and it has a 64-bit A9 chip architecture with embedded M9 motion coprocessor implemented in it. The human aspect associated with the manufacturing of iPhone SE is that by selling it the technology improves as more people becomes tech aware and learn about new technology. It also helps in the improvement of the society as they teach a lesson in many different ways. The actant helps in defining the actor network theory and the cultural aspect is maintained by giving additional features like the environmental control by recycling its products through the complete recycle approach (Roberts 2014). It takes a holistic view of people and waste management. It also gives various language support which helps in the selection of different languages by different cultural group of people. The structure is followed in the making of iPhone SE by using the recycled materials and helping in the consumption of green technology and the supply chain management. Computing News Story 2: Creators of modern cryptography win TURING AWARD The modern cryptographer won a TURNING AWARD for his research work in the field of cryptography. This article was published in the wired website on the 2nd march 2016(Wired UK 2016). The TURING AWARDS recognize major and important contributions towards computing and this award was given to Whitfield Diffie and Martin E. Hellmanfor their contribution to cryptography. The acrant is the cryptography as it is frame worked in the actor network theory. They developed a technology to communicate over a secure channel and this process is used by millions of people when they use online banking, send emails or shop online (Buchmann 2013).They used encryption method to exchange message that is a digital actant by sharing a public encryption key and a private decryption key. The cryptography uses digital codes to encrypt the data in order to secure it from being accessed by unintended user. The security is very crucial as it helps to maintain privacy. The software used is of the cryptography which is a process to encrypt message a digital actant in the actor network theory to the cipher codes and decrypt the data in to simple language (Bueger 2013). A key is created for the encryption process and a duplicate key is sent to the intended receiver. This is done by giving a key to the receiver so that he can decode the message a digital actant and read it. The software for cryptography is used in order to encrypt the data and then decrypt it. The public-key cryptography is commonly used to encrypt the data. The human actant associated with cryptography is the ability to protect private data by knowing an owners identity then sharing a key with the intended user (Katz and Lindell 2014). The integrity and the confidentiality of communication are maintained. The cultural aspect is used in the cryptography process by helping the people that is the human actant to access crucial and important informations through the encryption and decryption process. This has helped in a lot of ways as it secures important messages. The structural information is associated with the mechanism of cryptography and it is unleashed by following the proper structure of the cryptography process. The enhancement of management functions in the stories The management plays a vital role in every aspect as its function is included in everything. According to the theorists people like Morozov, Shirky, Carr, Sparrow, Small, Greenfield the two different computing stories have a specific level of technical and non-technical elements that act in the business process for the network assemblage. The story of the Apple iPhone is to launch a new version iPhone SE which is inspired by the small screen display. It gave a lot of features and made it small in order to follow a business strategy for selling the phone (Sayes 2012).The strategic planning by Apple is important to do business and it can be done by the management. The story about creators of modern cryptography won the critical category in the TURING AWARD. This is achieved because of their important contribution in the field of computing which helped them in building an encryption and decryption pattern that can help to secure the crucial messages. It is found that Apple uses strategies to promote its products so much that everybody purchases the product. This advancement is comprised of some parts of correspondence studies and science (Roberts 2014). It is really vital to perform a result oriented assessment of the framework array that includes the recognition of human and non-human actors and the actants collaborate with one another by analysis individual parts and then shape a system for data framework. The views or issues raised in the stories The issues raised in the first story is to increase the sale of Apple so they launched a new version of iPhone that is SE in order to get a hold of their business. They targeted the loyal customers who wanted a small screen iPhone, so they tried to get them back by making a smaller size iPhone (Davis and Pyper 2015). According, to the theorists people like Morozov, Shirky, Carr, Sparrow, Small, Greenfield when this issue is looked from the perspective of actor network theory then it determines the strategic process of selling goods by the interaction of human actants. The issues raised in the second story is the cryptography is also concerned with security as the key can be stolen and important message can be read by someone else. The all-round information framework will definitely build profit, execution, proficiency, versatility and many more. Conclusion The stories are viewed from the point of view of participant actants assemblage of system network. A thorough investigation resulted in determining the views of actors and the actants system helps in determining the human and non-human actants and the way the actants take action inside the collaborative concerned system. The two stories which are uncommon and not related to each other can be researched and written using the actor network theory that has hardware and software actants, related to each other. The IT is an important part in the selection of techniques that can be used in the business and to implement technology in business. The data innovation presentation is important to get the result by considering the sector of aggressive business and business conduction. References Barry, A., 2013. The translation zone: Between actor-network theory and international relations.Millennium-Journal of International Studies,41(3), pp.413-429. Buchmann, J., 2013.Introduction to cryptography. Springer Science Business Media. Bueger, C., 2013. Actorà Network Theory, Methodology, and International Organization.International Political Sociology,7(3), pp.338-342. Davis, P. and Pyper, N., 2015. Applying actor network theory and pragmatist thinking to the process of implementing scenarios.International Journal of Foresight and Innovation Policy,10(2-4), pp.88-102. Gibbs, S. 2016. Apple announces iPhone SE: a smaller, cheaper smartphone. [online] the Guardian. Available at: https://www.theguardian.com/technology/2016/mar/21/iphone-se-4in-apple-smartphone-launched-cheaper-price [Accessed 25 Mar. 2016]. Iyamu, T. and Roode, D., 2012. The Use of Structuration Theory and Actor Network Theory for Analysis: Case Study of.Social Influences on Information and Communication Technology Innovations, p.1. Katz, J. and Lindell, Y., 2014.Introduction to modern cryptography. CRC Press. Pollack, J., Costello, K. and Sankaran, S., 2013. Applying ActorNetwork Theory as a sensemaking framework for complex organisational change programs.International Journal of Project Management,31(8), pp.1118-1128. Roberts, J.M., 2012. Poststructuralism against poststructuralism: Actor-network theory, organizations and economic markets.European Journal of Social Theory,15(1), pp.35-53. Sayes, E., 2014. ActorNetwork Theory and methodology: Just what does it mean to say that nonhumans have agency?.Social Studies of Science,44(1), pp.134-149. Wired UK. 2016. Turing Award 2016: modern cryptography recognised (Wired UK). [online] Available at: https://www.wired.co.uk/news/archive/2016-03/02/turing-award-cryptography [Accessed 24 Mar. 2016]. Zadeh, L.A. ed., 2013.Computing with words in Information/Intelligent systems 1: Foundations(Vol. 33). Physica.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.