Wednesday, December 11, 2019
Technology and Social Good Phenomenons
Question: Discuss about the Technology and Social Good Phenomenons. Answer: Introduction: A number of global phenomenons have cropped up in the recent years which are drastically involved with the after effects and consequences that follow it. The human dignity and social framework depends on many factors which are directly related to the Information Technology. Technological advancement is one of the most powerful arms of the society (Heisey-Grove et al. 2014). Extensive research and a range of experiments have resulted in a network which is indeed very useful. All the innovations that are being noticed in the corpus of technology and data analytics have facilitated the lives of millions of people. One of the primary challenges which damage the impetus to contribute to the society is the magnitude of the data (Xiang, Magnini and Fesenmaier 2015). Information technology operates on a huge platform. The function of data is undeniably one of the most essential factors that govern it. Mainly dealing with unstructured data is one of the difficult situations that arise while attempting to reach to a conclusion about any social demographics. A number of important decisions and implementations regarding social enhancement have been postponed due to this reason. Optimization is one of the key objectives of the Information Technology, which also gets hampered (Taylor, Fritsch and Liederbach 2014). The operations that are carried out by this virtual sector to retain the natural flow of information and simultaneous interpretation hamper social justice. Electronic data interchange can foster the communication patterns which can be helpful for supporting the minority groups and cause social harmony. This is also conditional in nature due to the biggest challenge that is currently being faced by the enthusiasts of the information technology. It is the breach of data and the impeachment of the security. This will absolutely disallow the endeavors to cause any social impact on the future generation because protecting confidentiality is a potent issue for this industry. Often the bugs and escalation which arise while running a systematic process can harness the current requirements. There have been past instances where the troubleshooting that occurs while coding disables the security of a global effort by concerned government. The multiple networks and the variations of associations that form due to the collaborations assigned in computing and software technology have been allocated for utility in retail, production, growth and biological fields. It also enables and fosters the development of the group activity through social and cultural reforms, which can falter if the whole system corrupts due to technical backlogs. One of the primary and skillful uses of information technology is for the fight against the global threat of terrorism which makes us of superior intelligence (Heisey-Grove et al. 2014). The unsocial activities can be tackled if the information which is perceived and terminated carefully so that it does not harm the environment and the social animals residing in it. The scenario have significantly changed over the years and in coming years the estimations for data management crisis can prove to be very fateful to the whole sector. In fact, positive effects that have impacted over the world has aided in recreating the modern civilization with a mechanized lifestyle. Regardless of this result, the broader perspective which has been observed over the last 50 years in due stages of advancement and progress certainly has not been an easy ride. In order to achieve the best result from highly enabled technological resources, one must also identify the limitations that come in the way of development. According to the Global Sustainable Development Pact, there should be brilliant collaborations between different sectors which will eventually lead to advocacy among human beings and empower the livings beings. The contribution of technology to the recurrent lifestyle and economic structure can never be neglected, as it holds an insane account of all the records and past histories. Therefore breaching the digital law for malicious practices through wrong access is a big threat to the whole ecosystem. It acts as the support systems in many business aspects that deal in global decisions or the ones which evaluates the consumption percentage for the whole population (Xiang, Magnini and Fesenmaier 2015). There are several challenges that the industries still have to fight tediously in order to bring about a sound impact for changing the global state of affairs. There is huge risk that is involved and the accountability that the whole world faces due to several this challenges is very lethal in nature (Taylor, Fritsch and Liederbach 2014). Reference Galliers, R.D. and Leidner, D.E., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Genovese, A., Lenny Koh, S.C., Kumar, N. and Tripathi, P.K., 2014. Exploring the challenges in implementing supplier environmental performance measurement models: a case study.Production Planning Control,25(13-14), pp.1198-1211. Heisey-Grove, D., Danehy, L.N., Consolazio, M., Lynch, K. and Mostashari, F., 2014. A national study of challenges to electronic health record adoption and meaningful use.Medical care,52(2), pp.144-148. Khan, H.U., Artail, H.A., Malik, Z. and Niazi, M., 2014, August. Information technology adoption, possible challenges, and framework of supply chain management: a case study of a leading gulf economy. InEngineering Technology and Technopreneuship (ICE2T), 2014 4th International Conference on(pp. 1-5). IEEE. Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014.Digital crime and digital terrorism. Prentice Hall Press. Xiang, Z., Magnini, V.P. and Fesenmaier, D.R., 2015. Information technology and consumer behavior in travel and tourism: Insights from travel planning using the internet.Journal of Retailing and Consumer Services,22, pp.244-249.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.