Technological Development Essays (Examples)

Studyspark

Study Document Study Document

Role Of The Nurse Informaticist In Systems Development And Implementation

Pages: 3 (974 words) Sources: 3 Document Type:Essay Document #:72698912

… computerized nursing systems. NIs ought to assist computer technocrats with analyzing issues, and put forward a computerized solution with desired results. SDLC (System development Life Cycle) represents discrete steps followed by system developers for designing, troubleshooting and executing systems needed by clients (McGonigle and Mastrian, 2015). Within … steps followed by system developers for designing, troubleshooting and executing systems needed by clients (McGonigle and Mastrian, 2015). Within the healthcare domain, system development encompasses needs evaluation that involves doctors and other healthcare practitioners, legal aspects, environmental challenges, and technological elements impacting the domain of healthcare.
Planning and requirements definition
Planning represents the ideal instrument for guaranteeing the success of all operations. The … and requirements definition
Planning represents the ideal instrument for guaranteeing the success of all operations. The nursing leader within the context of system development presents system developers with the intended system plan. Developers ought to then utilize……

References

References

Massey, V., & Satao, K. J. (2012). Evolving a new software development life cycle model (SDLC) incorporated with release management. International Journal of Engineering and Advanced Technology (IJEAT), 1(4).

McCormick, K., & Saba, V. (2015). Essentials of nursing informatics. McGraw-Hill Education.

McGonigle, D., & Mastrian, K. G. (2015). Nursing informatics and the foundation of knowledge (3rd ed.). Burlington, MA: Jones and Bartlett Learning.

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

… Lady Gaga, Jimmy Fallon, and Taylor Swift use Twitter to communicate with their fans, build their public image and spread news (C-141)
1.4. technological
1.4.1. In 2017, Twitter raised character counts to 280 from 140 in order to encourage freedom of expression and make it more comprehensive … a global brand. The blue bird alone communicate twitter worldwide.
Social: Twitter accounts that are at risk of impersonification have a verification badge.
technological: Internet access is readily available in most parts of the world. So, the number of social media users will increase in future.
Legal: … years). Their 2018 ad campaign was successful, yet they only used the bluebird icon (Larry the Bird) and hashtag symbol (C- 142).
3.3 technological development and Infrastructure
· It one of the major secondary activities of Twitter.
· Twitter is investing heavily in technology because more than 85% … heavily in technology because……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

Trolley Problems And Self Driving Cars

Pages: 8 (2362 words) Sources: 8 Document Type:Essay Document #:94581761

… can sleep on the way to work or they can read a novel. The reality is that self-driving is really just a novel technological development that is not even yet perfected (and likely never will be, which is why pilots are still required for air travel). Trusting one’s ……

References

Works Cited

Carter, Stacy M. \\\\\\\\\\\\"Overdiagnosis, ethics, and trolley problems: why factors other than outcomes matter—an essay by Stacy Carter.\\\\\\\\\\\\" Bmj 358 (2017): j3872.

Ewing, J. “German Court Says Tesla Self-Driving Claims Are Misleading.” New York Times, 2020.  https://www.nytimes.com/2020/07/14/business/tesla-autopilot-germany.html 

Himmelreich, Johannes. \\\\\\\\\\\\"Never mind the trolley: The ethics of autonomous vehicles in mundane situations.\\\\\\\\\\\\" Ethical Theory and Moral Practice 21.3 (2018): 669-684.

Marshall, Aarian. “What Can the Trolley Problem Teach Self-Driving Car Engineers?” Wired, 2010.  https://www.wired.com/story/trolley-problem-teach-self-driving-car-engineers/ 

Nyholm, Sven. \\\\\\\\\\\\"The ethics of crashes with self?driving cars: A roadmap, I.\\\\\\\\\\\\" Philosophy Compass 13.7 (2018): e12507.

Nyholm, Sven, and Jilles Smids. \\\\\\\\\\\\"The ethics of accident-algorithms for self-driving cars: An applied trolley problem?.\\\\\\\\\\\\" Ethical theory and moral practice 19.5 (2016): 1275-1289.

Pojman, L. and J. Fieser. Ethics: Discovering Right and Wrong. Cengage, 2012.

Snow, Nancy E. \\\\\\\\\\\\"Neo-Aristotelian Virtue Ethics.\\\\\\\\\\\\" The Oxford Handbook of Virtue. Oxford University Press, 2018. 321.

Studyspark

Study Document Study Document

Manufacturing Systems In Automotive Industry

Pages: 12 (3647 words) Sources: 16 Document Type:Research Paper Document #:87931381

… components together with the production machine, material handling system, computer control system, and human resources (Lee, 1998). In recent times, due to the technological advancement, automation of manufacturing systems has continued to become prevalent. A key aspect in the contemporary automotive manufacturing systems and automotive industries is … machine learning, and artificial intelligence, all of which enable machines to either equal or outmatch humans in a variety of work activities. Contemporary technological development have overcome several of the customary restrictions of robotics and automation. A new-fangled cohort of robots that are more flexible and multipurpose, and ……

References

References

Boone, L. E., Kurtz, D. L., & Khan, M. H. (2009). Contemporary business. Hoboken: John Wiley & Sons.

Chui, M., George, K., Manyika, J., Miremadi, M. (September 2017). Human + machine: A new era of automation in manufacturing. McKinsey & Company.

Deng, W., Luo, Q. (2012). Advanced Technology for Manufacturing Systems and Industry. New York: Pearson.

Groover, M. P. (2007). Fundamentals of modern manufacturing: materials processes, and systems. John Wiley & Sons.

HR Cloud. (2020). HR Automation - The Future of Human Resource Process Management. Retrieved from:  https://kissflow.com/hr-process/ 

Joshi, V., Adhikari, M. S., Patel, R., Singh, R., Gehlot, A. (2018). Industrial Automation: Learn the current and leading-edge research on SCADA Automation. New Delhi: Pearson.

Krar, S. F., & Gill, A. (2003). Exploring advanced manufacturing technologies. Industrial Press, Inc.

Ladet, P., & Vernadat, F. (Eds.). (2013). Integrated manufacturing systems engineering. Springer.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… would have to be asked all anew. Cantarella (2016) notes that “the revelations coming from the Snowden Archives have shown how the recent technological development have led to a quantitative and qualitative breakthrough in Signals Intelligence” but also how “the mass data gathering plans of the NSA and ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

… is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem … by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions, the security of data and other sensitive information has increasingly become a huge concern for the industry (Bueger, 2015). Cybersecurity has become … to those attacks, and be able to recover from those cyber incidents (Kimberly, 2018). Cybersecurity in the maritime industry is not an isolated development, and recent incidents such as the Estonia cybersecurity attack in 2007 and Stuxnet in 2009 should have served……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

Web 2 0 And Online Studio Education

Pages: 6 (1931 words) Sources: 5 Document Type:Research Paper Document #:53632130

… The internet, since then, started becoming the reservoir of knowledge, giving free access to information and educational resources (Loannao, 2018). Because of these development, online courses and online education began and were incorporated in different educational fields as the means of expanding knowledge and enhancing the learning … need to be physically present at the same time and at the same place for fulfilling curriculum goals (Bender, 2006).
Education has incorporated technological innovation for its success, making the online education the solution for today’s modern era, eradicating the issue of distance in pursuing education (Bender, … education (Bender, 2006). This pedagogical and traditional structure of the studio should be changed in order to incorporate the new social, economic, and technological changes (Pasin, 2017). Educational practices have changed due to the integration with technology, proving successful and efficient with the learning procedure and teaching … education not only influences the……

References

References

Bender, D. M. (2006). Using Online Education Technologies to Support Studio Instruction. Educational Technology and Society.

Kurt, S. (2009). An analytic study on the traditional studio environments and the use of the constructivist studio in the architectural design education. Procedia Social and Behavioral Sciences, 401-408.

Loannao, O. (2018). Opening up design studio education using blended and networked formats. International Journal of Educational Technology in Higher Education.

Nottingham, A. (2014). Reshaping design education: teaching graphic design online and onsite. The University of Melbourne.

Pasin, B. (2017). Rethinking the Design Studio-Centered Architectural Education. A Case Study at Schools of Architecture in Turkey. The Design Journal.

Siddiqi, A. A. (2002). ARCHITECTURAL DESIGN STUDIO PROJECTS AND THE CHARADES OF CURRICULUM. The 6th Saudi Engineering Conference, KFUPM. Architecture Department, College of Environmental Design, KFUPM Dhahran.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… affects their lives (Cantor, 2006).
The concerns over violations of personal privacy are well-founded, though, and health care is just one realm where technological innovations have introduced new and novel threats to personal privacy. For instance, one industry analyst emphasizes that, “With development in technological security capability, employers can now monitor their employees’ activity on their computers and other company-provided electronic devices” (Ethical issues facing businesses, 2020, para. ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Technological development Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Clausewitz The Future Of The Air Power

Pages: 5 (1412 words) Sources: 4 Document Type:Essay Document #:29434498

… elements of war are frequently changing. In the theory, Carl focused more on the changing the social elements of war and downplayed the technological ones. In this paper, my argument is that the technological advances and innovations in the airpower, cyberspace, and space industries will alter the future of war and lead to social changes, political changes, … STAFF-JCS. "Joint Operating Environment JOE 2035: The Joint Force in a Contested and Disordered World. US Joint Chiefs of Staff, J7, Joint Force development [cit. 2016-07-01]." (2016).] [3: JOINT CHIEFS OF STAFF-JCS. Joint Operating Environment, 1-5] [4: Clodfelter, Back from the future, 105]
The role of airpower ……

References

References

Bender, Willaim J., and William D. Bryant. Assuring the USAF core missions in the information age. Office of the Secretary of the Air Force Washington United States, 2016.

Clodfelter, Mark. "Back from the future: The impact of change on airpower in the decades ahead." Strategic Studies Quarterly 3, no. 3 (2009): 104-122.

Grissom, Adam. "The future of military innovation studies." Journal of strategic studies 29, no. 5 (2006): 905-934.

JOINT CHIEFS OF STAFF-JCS. "Joint Operating Environment JOE 2035: The Joint Force in a Contested and Disordered World. US Joint Chiefs of Staff, J7, Joint Force Development [cit. 2016-07-01]." (2016).

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".