SlideShare a Scribd company logo
1 of 33
1
2
Cognitive Behavioral Theory
Patrice Scope
Capella University
SWK5003/ Human Behavior Social Env 1
Aileen McCabe-Maucher
01/29/2022
Cognitive Behavioral Theory
Introduction
Critical comprehension of theoretical basis in understanding
human Behavior and actions is vital in decision-making to sleet
and apply the appropriate theoretical approach for a client on a
case-by-case basis. Notably, embracing an appropriate
theoretical framework to manage clients' social Behavior gives
a client-centric approach that increases effectiveness and
overall outcome in managing clients’ cases. In an attempt to
identify Joe as a character in the film, Joe the King, there
fundamental asocial Behavior and scenarios witnessed in Joe as
the major character’s behavior such as stealing and shoplifting
to compensate for life frustrations due to lacking parental
guidance, constant humiliation causing anti-social Behavior
such as petty theft, tardiness at school, and difficulty in
developing a constructive relationship with others underpins a
case for consideration. Cognitive Behavioral Therapy is a
fundamental theoretical basis that offers effective articulation,
concepts, ideas, and framework that provides a fundamental
platform for case management. Particularly, Cognitive
Behavioral Therapy describes a psychotherapeutic treatment
method, enabling an individual to learn to identify and change
maladaptive behavior, replacing them with positive ones as a
short-term treatment method. Accordingly, providing a detailed
presentation on Cognitive Behavioral Therapy as a theoretical
basis and how it resonates with human behavior and
development, accommodating Joe’s situation in the film is
underpinning.
The CBT
Cognitive Behavioral Therapy Overview
Cognitive Behavioral Therapy describes a psychotherapeutic
treatment method, enabling an individual to learn to identify
and change maladaptive Behavior, replacing them with positive
ones as a short-term treatment method, accommodating negative
thought patterns and feeling that posit negative influence on
behavior and emotions (Ruggiero et al. 2018). In this case, the
Cognitive-behavioral Theory (CBT) focuses on identifying and
changing automatic negative thoughts and feelings that are
destructive and posit negative influence on human behavior and
emotions. Noteworthy, the CBT accommodates three
fundamental articulations in managing anti-social behavior as a
short-term treatment method including identifying, changing,
replacing destructive thought and feeling patterns with realistic,
objective, and positive feelings and thoughts. According to the
authors, CBT emerged in the 1960s from Aron Beck's concept
of automated negative thoughts and feelings, developing
cognitive therapy (Ruggiero et al. 2018). Admittedly, the CBT
theoretical basis accommodates individual thoughts and feelings
that are negative and destructive, promoting asocial behavior by
replacing such destructive thoughts with realistic and objective
ones. Thus, the CBT is a fundamental theory to identify Joe’s
negative thoughts and feelings causing stealing and shoplifting
behavior with positive ones in the society.
CBT Approaches
As a short-term psychotherapeutic treatment, CBT encompasses
a range of techniques and approaches for comprehensive
applications in managing clients’ asocial behaviors, thoughts,
and emotions. Notably, the CBT involves therapeutic
approaches including cognitive therapy, dialectical behavior
therapy, multimodal therapy, and rational emotive behavioral
therapy, all accommodating different approaches to manage
underlying thoughts and feeling patterns contribution to
psychological conditions (King and Boswell, 2019). A cognitive
therapy strategy is an approach that indulges in identifying and
changing destructive thoughts, feeling, and behavior emotional
responses with positive thought patterns. Consequently,
dialectical behavior therapy is an approach that accommodates a
platform to address thought and behavior through emotional
regulation and mindfulness. Additionally, multimodal therapy is
a fundamental approach in the CBT that incorporates seven
independent but interconnected modalities including behavior,
impact, sensation, imagery, cognition, interpersonal drivers,
drugs, and biological considerations in highlighting
psychological issues that promote negative and destructive
behaviors, feelings, and emotions (King and Boswell, 2019.
Finally, Rational Emotive behavior therapy constitutes the
identification of irrational behavior, beliefs, and learning to
embrace a change in destructive thoughts. Similarly, the CBT
approaches including cognitive therapy, dialectical behavior
therapy, multimodal therapy, and rational emotive behavioral
therapy are effective in handling Joe’s situation in the film, Joe
the King.
CBT Techniques
In psychotherapeutic treatment, CBT uses various strategies
involving clients and therapists in identifying negative thoughts
and a fundamental range of techniques to change such negative
behavior, feelings, and emotions. Fundamentally, the CBT
accommodates final intervention including identifying negative
thoughts, practicing new skills, goal setting, problem solving,
and self-monitoring (Tsitsas and Paschali, 2014). Identifying
negative thoughts involves feelings, situations, and thoughts
that contribute to maladaptive behavior (Lincoln et al. 2017).
Similarly, in the film, asocial Behavior, and scenarios witnessed
in Joe as the major character's behavior such as stealing and
shoplifting to compensate for life frustrations due to lacking
parental guidance, constant humiliation causing anti-social
Behavior such as pretty theft, tardiness at school, and difficulty
in developing a constructive relationship with others underpins
identification of situations and events causing maladaptive
behaviors. Practicing new skills is a fundamental strategy that
the CBT accommodates for effective case management,
accommodating real-world situations. For example, Joe's case of
stealing and shoplifting need the practice of new positive skills
such as positive relationship with society rehearsing. Goal
setting is another vital facet of the CBT technique that is vital
in mental illness recovery and improving the health and life of
clients. For instance, a therapist can assist a client in setting
goals, acknowledging SMART goals, and short-term and long-
term goals for the process and outcome.
Additionally, problem solving is a crucial technique
incorporated in the CBT theoretical basis for human behavior
assessment, evaluation, and improvement involving the
identification of factors causing maladaptive behaviors among
clients. In the CBT, problem solving accommodates a
significant stepwise phase including problem identification,
listing all possible solutions, strengths, and weakens evaluation
of the options, selecting a solution for implementation, and
implementing the solution (Sburlati et al. 2015). Finally,
developing a self-monitoring technique in the CBT when
dealing with maladaptive behaviors acknowledge tracking
behavior, symptoms, and experiences and sharing such with a
therapist to improve treatment method in the CBT. Similarly,
the film, Joe the King, particularly on Joe the Characters
required fundamental presentation on techniques such as
identifying negative thoughts, practices new skills, goal setting,
problem-solving, and self-monitoring to provide an effective
platform for comprehensive anti-social behavior management
for the client.
Strengths of the CBT
The CBT operates under the praxis that individual thoughts and
feeling influences behavior, emotions, and actions. According
to the authors, embracing and identifying individual negative
thoughts and replacing such feelings and thoughts with positive
ones offers an effective platform for controlling how
interpreting feelings and thoughts give a supportive
environment (Ruggiero et al. 2018). According to the research-
based findings, the CBT treatment method gives a platform for
healthy thinking through identifying negative thoughts and
feelings (Stefan et al. 2019). Additionally, CBT is one
fundamental and effective short-term treatment method and
improvements are seeable in 5 to 20 sessions. Additionally,
CBT has accommodated a fundamental range of applications in
managing maladaptive behaviors and is comparatively
affordable than other therapy types. According to the
researchers, CBT is an effective treatment method in virtual and
physical applications and replaces psychotropic medications
(Kumar et al. 2017). Thus, fundamental research-based evidence
offers effective strengths and effectiveness of the CBT and
applications in managing maladaptive behavior among clients.
The CBT Weakness
Despite fundamental strengths in the CBT applications in the
treatment of maladaptive behaviors, some fundamental
weaknesses and challenges require consideration for effective
outcomes. Notably, difficulties in changes, structured CBT,
lacking the willingness to change among the clients, and
gradual process, interfere with the CBT applications
effectiveness. Change can be difficult, especially among clients
who perceive that identifying irrational and destructive thoughts
and feelings have no significance in impacting positive feelings
and though for pro-social behavior. Similarly, the CBT is a
structured therapeutic approach unlike psychoanalytic
psychotherapy that recognizes fundamental articulation on
unconsciousness drivers in maladaptive behavior; hence the
effectiveness of the CBT depends on the clients’ comfort ability
on structured and focused psychotherapy strategy. Additionally,
the effectiveness of Cognitive Behavioral Therapy depends on
the client’s willingness to change which presents an effective
weakness when a client is not willing to change destructive
thoughts and feelings to realistic and objective feelings and
thoughts for positive human behavior and development. Finally,
the CBT treatment method is a gradual process that requires
case-by-case analysis in managing maladaptive behavior and
failure to accommodate a step may cause negative outcomes.
Therefore, a comprehensive application of the CBT for
assessment, evaluation, and intervention to locate negative
human behavior and development requires effective
considerations of the CBT weakness, incorporating strengths for
a positive therapeutic outcome among clients with maladaptive
behaviors.
The CBT Cultural Competency
The CBT accommodates fundamental cultural competency for
effective and multidimensional applications. Notably,
increasing multi-cultural societies creates a significant platform
for the CBT to establish multicultural groups for effective
applications. Similarly, the culturally informed Tran diagnostic
model offers an integrative platform to acknowledge cultural
articulation on case management. Specifically, the movie, Joe
the King, occurs within the 1970s in a multicultural society that
managing maladaptive behavior for Joe requires an informed
Tran diagnostic model for effective applications. Noteworthy,
the CBT manages cultural diversity in the theory applications
via grouping and contextual sensitivity, supporting the CBT on
cultural completely and applications (Hinton and Patel, 2017).
Fundamentally, the CBT accommodates cultural competency
through accommodating core cultural values and validating the
clients’ experience, considering environmental changes. The
CBT accommodates individuals, families, groups, organizations,
communities, and societies, reinforcing cultural competency.
Similarly, the movie, Joe the King, resonates with the CBT
applications in managing maladaptive behavior from the
character's behavior, situations, feelings, and thoughts,
acknowledging social and person-in-environment for effective
cultural competency. Therefore, the CBT acknowledges social
environment, person-in-environment, and other
multidisciplinary theoretical frameworks in engaging with
clients enhancing cultural competencies and awareness.
Assessment intervention, and evaluation for the CBT in the
movie case study.
In an attempt to identify Joe as a character in the film, Joe the
King, there are fundamental asocial Behavior and scenarios
witnessed in Joe as the major character’s behavior such as
stealing and shoplifting to compensate for life frustrations due
to lacking parental guidance, constant humiliation causing anti -
social Behavior such as pretty theft, tardiness at school, and
difficulty in developing a constructive relationship with others
underpins a case for consideration. Specifically, assessing the
case can accommodate the CBT approaches such as cognitive
therapy, dialectical behavior therapy, multimodal therapy, and
rational emotive behavioral therapy, all accommodating
different approaches to manage underlying thoughts and feeling
patterns contribution to psychological conditions (King and
Boswell, 2019). Specifically, the strategies give an effective
platform to identify Joe's frustration with life from a
dysfunctional family and non-welcoming school environment
and how the character acquires such occurrences with
maladaptive behaviors such as stealing and shoplifting and
negative relationship with others.
Cognitive therapy enables a therapist to identify Joe’s
destructive thoughts, feeling, and emotions while dialectical
behavior therapy is an approach that accommodates a platform
to address thought and behavior through emotional regulation
and mindfulness regulating Joe’s maladaptive behavior.
Similarly, multimodal therapy incorporates seven independent
but interconnected modalities including behavior, impact,
sensation, imagery, cognition, interpersonal drivers, drugs, and
biological considerations that assist in highlighting multi -
dimensional factors, influencing Joe’s feelings, thoughts,
emotions, and behavior in the movie for practical maladaptive
behavior management by the CBT as the theoretical basis for
case-by-case management. Thus, the CBT will provide an
effective platform for psychotherapeutic treatment methods,
enabling an individual to learn to identify and change
maladaptive behavior, replacing them with positive ones as a
short-term treatment method for Joe in the movie, Joe the King.
Conclusion
In conclusion, the paper has provided effective articulation on
Cognitive Behavioral Therapy as a theoretical basis and how it
resonated with human behavior and development,
accommodating Joe’s situation in the movie, Joe the King. The
CBT acknowledges therapeutic strategies such as cognitive
therapy, dialectical behavior therapy, multi modal therapy, and
rational emotive behavioral therapy, all accommodating
different approaches to managing underlying thoughts and
feeling patterns contributing to psychological conditions.
Similarly, the CBT has prevented evidence-based effectiveness
in assessment, intervention, evaluation, and identification of
potential factors fueling maladaptive behavior for Joe,
accommodating cultural competency Thus, the CBT is an
effective theoretical basis for case-by-case analysis to manage
maladaptive behaviors and clients.
References
Hinton, D., and Patel, A. (2017). Cultural Adaptations of
Cognitive Behavioral Therapy. The Psychiatric clinics of North
America. DOI: 10.1016/j.psc.2017.08.006
King, R., and Boswell, F. (2019). Therapeutic Strategies and
Techniques in Early Cognitive-Behavioral Therapy.
Psychotherapy, 9, (56)1: 35-40
Kumar V, Sattar Y, Bseiso A, Khan S, Rutkofsky IH. (2017).
The effectiveness of internet-based Cognitive Behavior Therapy
in the treatment of Psychiatric disorders. Cureus, 9(8):e1626.
Lincoln, T.M., Riehle, M., Pillny, M, et al. (2017). Using
Functional Analysis as a framework to guide individualized
treatment for negative.Front Psychol.
doi:10.3389/fpsyg.2017.02108
Ruggiero, G., Spada, G., Caselli, G., and Sassaroli, S. (2018). A
Historical and Theoretical Review of Cognitive-Behavioral
Therapies: From Structural SelfKnowledge to Functional
Processes. J Rat-Emo Cognitive-Behav Ther (36):378–403
https://doi.org/10.1007/s10942-018-0292-8
Sburlati, E. S., Lyneham, H. J., Schniering, C. A., et al. (2015).
Evidence-Base CBT for anxiety and depression in children and
adolescents, competencies-based approach. John Wiley & Sons;
2014. doi:10.1002/9781118500576.ch17
Stefan, S., Cristea, I., Tatar, A., David, D. (2019).
Cognitive‐ behavioral therapy (CBT) for a generalized anxiety
disorder: Contrasting various CBT approaches in a randomized
clinical trial. Journal of Clinical Psychology, (2019),1–15
Tsitsas GD, Paschali, A. (2014). A cognitive-behavior therapy
applied to social anxiety disorder and specific phobia, case
study. Health Psychol Res, 2(3):1603.
doi:10.4081/hpr.2014.1603
IT for Management: On-Demand Strategies for Performance,
Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 4
Networks, Collaborative Technology, and The Internet of
Things
Learning Objectives (1 of 4)
2
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals Defined
A computer network is a set of computers connected together
for the purpose of sharing recourses.
3
Copyright ©2018 John Wiley & Sons, Inc.
Common Network
TypesAcronymTypeCharacteristicsExampleLANLocal Area
NetworkShort distance connection Office
School
HomeWANWide Area NetworkSpans large physical
distanceInternet
Large companyWLANWireless LANLAN based on Wi-Fi
technology
Internet
Large company
4
Copyright ©2018 John Wiley & Sons, Inc.
Intranets, Extranets, and Virtual Private Networks
Intranets are used within a company for data access, sharing,
and collaboration.
Extranets are private, company-owned networks that can be
logged into remotely via the Internet.
Virtual Private Networks (VPNs) are used where security of
transmissions is a concern, because they encrypt the packets
before they are transferred over the network.
5
Copyright ©2018 John Wiley & Sons, Inc.
Virtual Private Networks
A virtual tunnel routed through the Internet with software and
hardware encryption.
6
Copyright ©2018 John Wiley & Sons, Inc.
6
Network Terminology
Modem: a device that modulates/demodulates signal for
transportation
Modulation and Coding: Techniques used by modem to adapt
the signal to the media
Signal: Binary information we want to send.
Signal Frequency Spectrum: All the frequency components of a
signal
Media Bandwidth: Limit in range of frequency signals
Capacity Bandwidth: Maximum bits per second that can be
transmitted
7
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
8
Copyright ©2018 John Wiley & Sons, Inc.
Quality of Service (QoS)
Latent-sensitivity: data such as real-time voice and high-quality
video.
Prioritized Traffic: data and apps that are time-delay-sensitive
or latency-sensitive apps.
Throttle Traffic: gives latency-sensitive apps priority, other
types of traffic need to be held back (throttled).
Traffic Shaping: the ability to prioritize and throttle network
traffic.
9
Copyright ©2018 John Wiley & Sons, Inc.
The Net Neutrality Debate
Net neutrality is the principle that Internet Service Providers
(ISPs) and their regulators treat all Internet traffic the same
way.
Traffic shaping prioritizes the flow of traffic by delaying the
flow of less important network traffic.
In 2010, the FCC ruled in favor of “net semi-neutrality”, not
explicitly forbidding paid prioritization.
The FCC under the current administration may take further
steps to roll back net neutrality rulings, which could favor the
cable companies over consumers.
10
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals
Name different types of networks.
What is meant by “bandwidth”?
What is the difference between an intranet and an extranet?
How does a virtual private network (VPN) provide security?
What is the purpose of a modem?
Describe the basic functions of business networks.
How do investments in network infrastructure impact an
organization?
Name the two tiers of traffic to which Quality-of-Service is
applied.
11
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
11
Learning Objectives (2 of 4)
12
Copyright ©2018 John Wiley & Sons, Inc.
Internet Protocols, APIs, and Network Capabilities
Internet Protocol (IP) is the basic technology that makes global
communication possible. Each devise attached to a network has
a unique IP address that enables it to send and receive files
made up of packets.
13
Copyright ©2018 John Wiley & Sons, Inc.
IP Addresses and Packets
Figure 4.5: IPv4 addresses have four groups of four
alphanumeric characters, which allows for 232 or roughly 4.3
billion unique IP address. IPv6 addresses have eight groups of
alphanumeric characters, which allows for 2128 , or 340
trillion, trillion addresses. IPv6 offers also enhanced quality of
service that is needed by the latest in video, interactive games,
and e-commerce.
14
Copyright ©2018 John Wiley & Sons, Inc.
14
Broadband Technology: 3G/4G/5G
3G networks support multimedia and broadband services over a
wider distance and at faster speeds than prior generation
networks. They use large satellite connections to
telecommunication towers.
4G networks are digital, or IP, networks that enable even faster
data transfer rates. 4G delivers average realistic download rates
of 3 Mbps or higher (as opposed to theoretical rates, which are
higher).
5G networks, the coming generation of broadband technology.
5G will dramatically increase the speed at which data is
transferred across the network.
15
Copyright ©2018 John Wiley & Sons, Inc.
Network Technology Standards
WiMAX
IEEE 802.16
30-mile range
70 Megabits per second (Mbps)
Line-of-site not required
Same principles as Wi-Fi (using radio signals)
Long-Term Evolution (LTE)
GSM deployed by Verizon, AT&T, and T-Mobile
100 Mbps downlink, 50 Mbps uplink
16
Copyright ©2018 John Wiley & Sons, Inc.
Circuit vs. Packet Switching
Circuit switching
Older technology that originated with telephone calls
Inefficient for digital transmission
Packet Switching
Transfers data or voice
Files are broken into packets, numbered sequentially, routed
individually to their destinations
When received at the destination, the packets are reassembled
into their proper sequences
17
Copyright ©2018 John Wiley & Sons, Inc.
Application Programming Interfaces and Operating Systems
Application Program Interface (API) consists of a set of
functions, commands, and protocols used by programmers for
OS-interactivity without having to write a program from
scratch.
Can be automated for simplified usability
Twitter
Facebook
Amazon
18
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.7 API value chain in business.
19
Copyright ©2018 John Wiley & Sons, Inc.
Internet Protocols (IP), APIs, and Network Capabilities
Why has IPv6 become increasingly important?
What is the difference between IPv4 and IPv6?
What is the purpose of an IP address?
What are the benefits of using an API?
What is the difference between 4G and 5G?
What is the most current network standard?
What benefits will the upcoming 5G network standard offer
businesses?
What is the difference between circuit switching and packet
switching?
20
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
IPv4 can support roughly 4.3 billion unique IP address. IPv6
can support 340 trillion, trillion, trillion addresses. IPv6 offers
also enhanced quality of service that is needed by the latest in
video, interactive games, and e-commerce. In April 2014 ARIN,
the group that oversees Internet addresses, reported that IPv4
addresses were running out—making it urgent that enterprises
move to the newer IPv6
IP Version 4 (IPv4) has been Internet protocol for over three
decades, but has reached the limits of its 32-bit address design.
IP Version 6 (IPv6) is the most recent version of the Internet
Protocol. IPv6 is replacing IPv4 because of IPv4’s limitations in
number of IP addresses it can generate. IPv6 has a 128-bit
address and allows 7.9 x 1028 times as many addresses as IPv4,
which provides about 4.3 billion addresses.
3. Every device that communicates with a network must have a
unique identifying IP address. An IP address is comparable to a
telephone number or home address.
4. For programmers: The benefits of APIs are that they simplify
the programmer’s job and ensure that all programs using the
same API use that resource in the same manner. APIs are the
common method for accessing information, websites, and
databases.
Business benefits of APIs include:
APIs are channels to new customers and markets: APIs enable
partners to use business assets to extend the reach of a
company’s products or services to customers and markets they
might not reach easily.
APIs promote innovation: Through an API, people who are
committed to a challenge or problem can solve it themselves.
APIs are a better way to organize IT: APIs promote innovation
by allowing everyone in a company to use each other’s assets
without delay.
APIs create a path to lots of Apps: Apps are going to be a
crucial channel in the next 10 years. Apps are powered by APIs.
Developers use APIs and combinations of APIs to create new
user experiences.
5. 4G delivers average download rates of 3Mbps or higher. In
contrast, today's 3G networks typically deliver average
download speeds about one-tenth of that rate. Even though
individual networks, ranging from 2G to 3G, started separately
with their own purposes, soon they will be converted to the 4G
network. 4G is based purely on the packet-based Internet
Protocol (IP) – unlike current 2G and 3G networks that have a
circuit-switched subsystem. Users can get 4G wireless
connectivity through one of the following standards:
1. WiMAX is based on the IEEE 802.16 standard and the
metropolitan area network (MAN) access standard.
2. LTE (Long-Term Evolution) is a GSM-based technology that
is deployed by Verizon, AT&T, and T-Mobile. LTE has
download data rates of 100 Mbps and upload data rates of 50
Mbps.
5G networks are the coming generation of broadband
technology. 5G builds on the foundation created by 4G. 5G will
dramatically increase the speed at which data is transferred
across the network.
6. Although 5G isn’t expected until 2020 and many
organizations are already investing in the infrastructure required
to run this new mobile wireless standard.
7. 5G mobile networks will offer huge gains in both speed and
capacity over existing 4G networks−along with opportunities at
the operations and strategic levels. In the short term, the 5G
infrastructure build-out will create new jobs. In the longer term,
5G will create entirely new markets and economic opportunities
driven by superior mobile capabilities in industries ranging
from health care to automotive.
8. The two types of switching are:
Circuit switching: A circuit is a dedicated connection between a
source and a destination. Circuit switching is older technology
that was used for telephone calls. The distinguishing
characteristic is that the circuit cannot be used by any other call
until the session (connection) is ended. It is inefficient for
digital transmission.
Packet switching: Packet switching transfers data or voice in
packets. Files are broken into packets, numb ered sequentially,
and routed individually to their destination. When received at
the destination, the packets are reassembled into their proper
sequence.
The astute student may realize: The path of the signal is digital,
and is neither dedicated nor exclusive. That is, the networks are
shared. When packets are transmitted over a shared network,
such as the Internet, they may follow different paths to the
destination, where they are reassembled into the original
message once all of them have arrived.
20
Learning Objectives (3 of 4)
21
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.8 Four drivers of global mobile traffic through 2020
22
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Data Traffic Milestone by 2020
23
Copyright ©2018 John Wiley & Sons, Inc.
Wireless Networks and Mobile Infrastructure
Mobile Networks
Bluetooth: short-range wireless communication technology
allowing device pairing
Wi-Fi: standard way to wirelessly connect computing devices
through routers commonly connected to the Internet
WiMax: transmits voice, data, and video over high-frequency
radio signals designed as alternative to cable and DSL
24
Copyright ©2018 John Wiley & Sons, Inc.
Data Networks, IP Addresses, and APIs: A mashup of GPS and
Bluetooth
General term referring to the integration of two or more
technologies such as Bluetooth and Wi-Fi
Provide intelligence
Inter-Automobile collision avoidance
Sudden braking
Can automatically call emergency services
25
Copyright ©2018 John Wiley & Sons, Inc.
Data Networks, IP Addresses, and APIs: Near-Field
Communication (NFC)
Enables two devices within close proximity to establish a
communication channel and transfer data using radio waves
More secure than other wireless technologies
Examples:
Apple iWatch
Digital tickets providing access to concerts
Transmit public transport payment through phones
26
Copyright ©2018 John Wiley & Sons, Inc.
Four Important Factors When Choosing a Mobile Network
27
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Networks
What factors are contributing to mobility?
Why is mobile global traffic increasing?
What accounts for the increase in mobile traffic?
Give some examples of VoIP networks.
How is NFC different from RFID?
What are the two components of a wireless network
infrastructure?
What is Near Field Communication and how is it used in
business?
What factors should be considered when evaluating a mobile
network?
28
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1.Answers may vary. Factors contributing to mobility can
include the following:
New wireless technologies such as WiMAX-Wireless Broadband
and standards such as 8.11n
High-speed wireless networks such as 4G
Multitasking mobile devices
More robust mobile OSs and their applications
Increased competitive pressure as others start adopting mobile
technology for strategic applications
2. Organizations are recognizing the strategic value of mobile
technology. So, organizations are moving away from ad hoc
adoption of mobile devices and network infrastruc ture to a more
strategic planning build-out of their mobile capabilities. As
technologies that make up the mobile infrastructure evolve,
identifying strategic technologies and avoiding wasted
investments require more extensive planning and forecasting.
3. In its most recent Visual Networking Index Forecast (VNI),
Cisco reported that mobile data traffic has grown 400 million
times over the past 15 years. They also predict that by 2020
monthly global mobile data traffic will be 30.6 exabytes;
number of mobile-connected devices will exceed 11.6 billion
(exceeding the world’s project population of 7.8 billion) and
smartphones will account for 81% of total mobile traffic. This
includes a major increase in machine-to-machine
communications and the number of wearable technology
devices.
4. Examples of high-capacity networks are wireless mobile,
satellite, wireless sensor, and VoIP (voice over Internet
Protocol) such as Skype.
5. NFC enables two devices within close proximity to establish
a communication channel and transfer data through radio waves.
NFC is location-aware technologies that are more secure than
other wireless technologies like Bluetooth and Wi-Fi. Unlike
RFID, NFC is a two-way communication tool.
6. The two components of wireless infrastructures are wireless
LANs and WiMAX.
7. Answers may vary. Location-aware NFC technology, such as
smartphones, can be used to make purchases in restaurants,
resorts, hotels, theme parks and theaters, at gas stations, and on
buses and trains. They also can provide consumers with content
to complement their current activity, such as recipe or idea
videos when shopping at a supermarket having proper NFC tag-
equipped units.
8. When evaluating mobile network solutions, four factors to
consider are:
1. Simple: Easy to deploy, manage and use.
2. Connected: Always makes the best connection possible.
3. Intelligent: Works behind the scenes, easily integrating
with other systems.
4. Trusted: Enables secure and reliable communications.
28
Learning Objectives (4 of 4)
29
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Virtual Collaboration--Benefits
Information sharing between retailers and suppliers (Example:
Walmart and Proctor & Gamble)
Retailer-supplier collaboration (Example: Asda Corp.)
Lower transportation and inventory costs and reduced stockouts
(Example: Unilever’s Transportation Business Center)
Reduction of product development time (Example: Caterpillar,
Inc.)
30
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Group Work
Group Work and Dynamics can be quite complex
Group workers can be located in different places or work at
different times
Group members may work for the same or different
organizations
Data, information, or knowledge may be located in many
sources that may be external to the organization
31
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Brainstorming in the Cloud
Companies are now using cloud-based online brainstorming
applications
Avoids travel expenses if members are geographically dispersed
No restriction to number of sessions
Examples
Evernote—features function to synchronize user’s notes
iMindmap Online—relies on mind mapping and other structured
approaches to help streamline work processes
32
Copyright ©2018 John Wiley & Sons, Inc.
The Internet of Things (IoT)
Internet of Things (IoT) is the network of physical objects or
“things” embedded with electronics, software, sensors, and
network connectivity, that enables these objects to collect and
exchange data.
Objects we interact with send signals to and from each other,
collecting data
IoT collects that data from millions of sensors embedded in
everything from cars, to refrigerators, to space capsules
Half of U.S. manufacturers report they are currently using IoT
technology to collect machine data (Industry Week study, 2016)
A smaller percentage (44%) are colleting data from sensors
embedded in their products
33
Copyright ©2018 John Wiley & Sons, Inc.
Advantages of IoT
Monitoring performance, quality, and reliability of products and
services
Gaining insight into potential new products and service
Support sales
Better understand product use
Remote troubleshooting of products
Deliver revenue-generating post-sales services
More efficiently deliver post-sales services
34
Copyright ©2018 John Wiley & Sons, Inc.
34
Disadvantages of IoT
Network security
Data privacy
Data analysis capabilities
Data collection capabilities
Realistic efficiency opportunities
Realistic new revenue opportunities
Cost
35
Copyright ©2018 John Wiley & Sons, Inc.
35
Collaboration Technologies and the Internet of Things (IoT)
Why is group work challenging?
What might limit the use of in-person brainstorming?
How can online brainstorming tools overcome those limits?
List ways in which virtual collaboration can be used in
business.
What devices do you have that take advantage of the IoT?
Describe how they impact the way that you live and work.
What is driving the rise of IoT?
What is the main concern that organizations have about the IoT?
Do you think the advantages outweigh the disadvantages of the
IoT? Explain.
36
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1. Group work involves processes that can be quite complex
depending on the following factors:
Group members may be located in different places or work at
different times.
Group members may work for the same or for different
organizations.
Some of the needed data, information, or knowledge may be
located in many sources, several of which are external to the
organization.
Despite the long history and benefits of collaborative work,
groups are not always successful.
2. Answers may vary. In-person brainstorming can be limited by
travel expense if members are geographically dispersed. Other
limiting factors, such as schedules, time zones, and available
resources, such as an available meeting place, may limit in-
person brainstorming.
3. Online brainstorming tools can be accessed virtually from
anywhere Internet access is available. Many of these tools
allow users to post comments on their own time rather than
having to meet at a particular time, however, virtual meetings
may be necessary as well.
4. Virtual Collaboration can be used in business to share
information between retailers and their suppliers, lower
transportation and inventory cists, and reduce product
development time.
5. Everyday items such as cellphones, coffee markers, washing
machines, lamps and headphones all use the IoT. (Answers may
vary on the impact)
6. Several things have created the ‘perfect storm’ for the
creation and growth of the IoT. These include more widely
available broadband Internet, lower cost of connecting,
development of more devices with wi-fi capabilities and
embedded sensors, and the overwhelming popularity of the
smartphone.
7. Network security and data privacy are manufacturers’ top
concerns about IoT technology. With billions of devices
connected together there are a multitude of end-points where
security breaches can occur and individuals or organizations can
be hacked.
8. Answers may vary.
36
Copyright
Copyright © 2018 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work
beyond that permitted in Section 117 of the 1976 United States
Act without the express written permission of the copyright
owner is unlawful. Request for further information should be
addressed to the Permissions Department, John Wiley & Sons,
Inc. The purchaser may make back-up copies for his/her own
use only and not for distribution or resale. The Publisher
assumes no responsibility for errors, omissions, or damages,
caused by the use of these programs or from the use of the
information contained herein.
37
Copyright ©2018 John Wiley & Sons, Inc.
37
Collaborative Technologies and the Internet of Things (IoT)
(105 points)The Internet of Things (IoT) is becoming
increasingly popular in both business and everyday life.
· Explain what the Internet of Things (IoT) is and provide a
brief history, in your own words, of the IoT.
· Discuss the potential impact that IoT can have on how people
live.
· Select a company and explain how the organization has
benefited from the IoT. Detail specific examples of how the
company benefited.
· How has the IoT been impacted by the pandemic? Explain
specific examples.
Your well-written report should be 4-5 pages in length, not
including the title and reference pages. To make it easier to read
and therefore grade, make sure you clearly delineate each
section of your answer so it can be matched with the relevant
question. Use Saudi Electronic University academic writing
standards and APA style guidelines, citing at least two
references as appropriate. Review the grading rubric to see how
you will be graded for this assignment. CT Assignment
RubricCT Assignment Rubric - Alternative Formats
For Your Success
This week, consider the ways in which networks support you at
home, at work, and at school. How do you use network
technologies to get information, communicate, and collaborate?
How do these make it easier?
Learning Outcomes
1. Differentiate between various network types and functions.
2. Examine protocols and network capabilities, and why a
business manager should understand these.
3. Articulate the importance and impact of mobile networks on
business.
4. Analyze the business uses of collaborative technologies and
the Internet of Things.
Readings
Required:
Chapter 4: Networks, Collaborative Technology, and the
Internet of Things in Information Technology for Management:
On-Demand Strategies for Performance, Growth, and
Sustainability
Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the
Special Section on Advances in Internet-based Collaborative
Technologies. ACM Transactions on Internet Technology
(TOIT) - Special Section on Advances in Internet-Based
Collaborative Technologies, 19(3), 1–
4.https://doi.org/10.1145/3361071
Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy
laws and privacy by design schemes for the Internet of Things:
A developer’s perspective. ACM Computing Surveys, 54(5),
102.
Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative
social internet of things in mobile edge networks. IEEE Internet
of Things Journal, 7(12), 11473–11491.
Recommended:
Chapter 4 PowerPoint slides

More Related Content

Similar to 12Cognitive Behavioral TheoryPatrice ScopeCape

2Outline presentation Arlenn CamposDepartment of.docx
2Outline presentation Arlenn CamposDepartment of.docx2Outline presentation Arlenn CamposDepartment of.docx
2Outline presentation Arlenn CamposDepartment of.docx
standfordabbot
 

Similar to 12Cognitive Behavioral TheoryPatrice ScopeCape (9)

2Outline presentation Arlenn CamposDepartment of.docx
2Outline presentation Arlenn CamposDepartment of.docx2Outline presentation Arlenn CamposDepartment of.docx
2Outline presentation Arlenn CamposDepartment of.docx
 
Cbt ppt
Cbt pptCbt ppt
Cbt ppt
 
UNDERSTANDING YOUR MIND 🧠 delve deeper into the fascinating world of the mind.
UNDERSTANDING YOUR MIND 🧠 delve deeper into the fascinating world of the mind.UNDERSTANDING YOUR MIND 🧠 delve deeper into the fascinating world of the mind.
UNDERSTANDING YOUR MIND 🧠 delve deeper into the fascinating world of the mind.
 
cbt-refresher.pptx
cbt-refresher.pptxcbt-refresher.pptx
cbt-refresher.pptx
 
CBT
CBTCBT
CBT
 
Personality disorder Decision Tree.docx
Personality disorder Decision Tree.docxPersonality disorder Decision Tree.docx
Personality disorder Decision Tree.docx
 
lecture 5. cbt theories, models and methods of couple relationships
lecture 5. cbt theories, models and methods of couple relationshipslecture 5. cbt theories, models and methods of couple relationships
lecture 5. cbt theories, models and methods of couple relationships
 
CBT
CBTCBT
CBT
 
Therapeutic approaches to counselling.pptx
Therapeutic approaches to counselling.pptxTherapeutic approaches to counselling.pptx
Therapeutic approaches to counselling.pptx
 

More from ChantellPantoja184

Problem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxProblem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docx
ChantellPantoja184
 
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxProblem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
ChantellPantoja184
 
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxProblem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
ChantellPantoja184
 
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxProblem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
ChantellPantoja184
 
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxProblem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
ChantellPantoja184
 
Problem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxProblem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docx
ChantellPantoja184
 
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxProblem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
ChantellPantoja184
 
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docxPROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
ChantellPantoja184
 
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxProblem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
ChantellPantoja184
 
Problem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxProblem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docx
ChantellPantoja184
 
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxProblem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
ChantellPantoja184
 
Problem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxProblem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docx
ChantellPantoja184
 
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxProblem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
ChantellPantoja184
 
Probation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxProbation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docx
ChantellPantoja184
 
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxProblem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
ChantellPantoja184
 
Probe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxProbe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docx
ChantellPantoja184
 

More from ChantellPantoja184 (20)

Problem 1Problem 2.docx
Problem 1Problem 2.docxProblem 1Problem 2.docx
Problem 1Problem 2.docx
 
Problem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxProblem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docx
 
Problem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docxProblem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docx
 
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxProblem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
 
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxProblem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
 
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxProblem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
 
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxProblem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
 
Problem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxProblem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docx
 
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxProblem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
 
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docxProblem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
 
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docxPROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
 
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxProblem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
 
Problem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxProblem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docx
 
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxProblem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
 
Problem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docxProblem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docx
 
Problem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxProblem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docx
 
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxProblem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
 
Probation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxProbation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docx
 
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxProblem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
 
Probe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxProbe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docx
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
MinawBelay
 

Recently uploaded (20)

How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdf
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 

12Cognitive Behavioral TheoryPatrice ScopeCape

  • 1. 1 2 Cognitive Behavioral Theory Patrice Scope Capella University SWK5003/ Human Behavior Social Env 1 Aileen McCabe-Maucher 01/29/2022 Cognitive Behavioral Theory Introduction Critical comprehension of theoretical basis in understanding human Behavior and actions is vital in decision-making to sleet and apply the appropriate theoretical approach for a client on a case-by-case basis. Notably, embracing an appropriate theoretical framework to manage clients' social Behavior gives a client-centric approach that increases effectiveness and overall outcome in managing clients’ cases. In an attempt to identify Joe as a character in the film, Joe the King, there fundamental asocial Behavior and scenarios witnessed in Joe as the major character’s behavior such as stealing and shoplifting
  • 2. to compensate for life frustrations due to lacking parental guidance, constant humiliation causing anti-social Behavior such as petty theft, tardiness at school, and difficulty in developing a constructive relationship with others underpins a case for consideration. Cognitive Behavioral Therapy is a fundamental theoretical basis that offers effective articulation, concepts, ideas, and framework that provides a fundamental platform for case management. Particularly, Cognitive Behavioral Therapy describes a psychotherapeutic treatment method, enabling an individual to learn to identify and change maladaptive behavior, replacing them with positive ones as a short-term treatment method. Accordingly, providing a detailed presentation on Cognitive Behavioral Therapy as a theoretical basis and how it resonates with human behavior and development, accommodating Joe’s situation in the film is underpinning. The CBT Cognitive Behavioral Therapy Overview Cognitive Behavioral Therapy describes a psychotherapeutic treatment method, enabling an individual to learn to identify and change maladaptive Behavior, replacing them with positive ones as a short-term treatment method, accommodating negative thought patterns and feeling that posit negative influence on behavior and emotions (Ruggiero et al. 2018). In this case, the Cognitive-behavioral Theory (CBT) focuses on identifying and changing automatic negative thoughts and feelings that are destructive and posit negative influence on human behavior and emotions. Noteworthy, the CBT accommodates three fundamental articulations in managing anti-social behavior as a short-term treatment method including identifying, changing, replacing destructive thought and feeling patterns with realistic, objective, and positive feelings and thoughts. According to the authors, CBT emerged in the 1960s from Aron Beck's concept of automated negative thoughts and feelings, developing cognitive therapy (Ruggiero et al. 2018). Admittedly, the CBT theoretical basis accommodates individual thoughts and feelings
  • 3. that are negative and destructive, promoting asocial behavior by replacing such destructive thoughts with realistic and objective ones. Thus, the CBT is a fundamental theory to identify Joe’s negative thoughts and feelings causing stealing and shoplifting behavior with positive ones in the society. CBT Approaches As a short-term psychotherapeutic treatment, CBT encompasses a range of techniques and approaches for comprehensive applications in managing clients’ asocial behaviors, thoughts, and emotions. Notably, the CBT involves therapeutic approaches including cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy, all accommodating different approaches to manage underlying thoughts and feeling patterns contribution to psychological conditions (King and Boswell, 2019). A cognitive therapy strategy is an approach that indulges in identifying and changing destructive thoughts, feeling, and behavior emotional responses with positive thought patterns. Consequently, dialectical behavior therapy is an approach that accommodates a platform to address thought and behavior through emotional regulation and mindfulness. Additionally, multimodal therapy is a fundamental approach in the CBT that incorporates seven independent but interconnected modalities including behavior, impact, sensation, imagery, cognition, interpersonal drivers, drugs, and biological considerations in highlighting psychological issues that promote negative and destructive behaviors, feelings, and emotions (King and Boswell, 2019. Finally, Rational Emotive behavior therapy constitutes the identification of irrational behavior, beliefs, and learning to embrace a change in destructive thoughts. Similarly, the CBT approaches including cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy are effective in handling Joe’s situation in the film, Joe the King. CBT Techniques In psychotherapeutic treatment, CBT uses various strategies
  • 4. involving clients and therapists in identifying negative thoughts and a fundamental range of techniques to change such negative behavior, feelings, and emotions. Fundamentally, the CBT accommodates final intervention including identifying negative thoughts, practicing new skills, goal setting, problem solving, and self-monitoring (Tsitsas and Paschali, 2014). Identifying negative thoughts involves feelings, situations, and thoughts that contribute to maladaptive behavior (Lincoln et al. 2017). Similarly, in the film, asocial Behavior, and scenarios witnessed in Joe as the major character's behavior such as stealing and shoplifting to compensate for life frustrations due to lacking parental guidance, constant humiliation causing anti-social Behavior such as pretty theft, tardiness at school, and difficulty in developing a constructive relationship with others underpins identification of situations and events causing maladaptive behaviors. Practicing new skills is a fundamental strategy that the CBT accommodates for effective case management, accommodating real-world situations. For example, Joe's case of stealing and shoplifting need the practice of new positive skills such as positive relationship with society rehearsing. Goal setting is another vital facet of the CBT technique that is vital in mental illness recovery and improving the health and life of clients. For instance, a therapist can assist a client in setting goals, acknowledging SMART goals, and short-term and long- term goals for the process and outcome. Additionally, problem solving is a crucial technique incorporated in the CBT theoretical basis for human behavior assessment, evaluation, and improvement involving the identification of factors causing maladaptive behaviors among clients. In the CBT, problem solving accommodates a significant stepwise phase including problem identification, listing all possible solutions, strengths, and weakens evaluation of the options, selecting a solution for implementation, and implementing the solution (Sburlati et al. 2015). Finally, developing a self-monitoring technique in the CBT when dealing with maladaptive behaviors acknowledge tracking
  • 5. behavior, symptoms, and experiences and sharing such with a therapist to improve treatment method in the CBT. Similarly, the film, Joe the King, particularly on Joe the Characters required fundamental presentation on techniques such as identifying negative thoughts, practices new skills, goal setting, problem-solving, and self-monitoring to provide an effective platform for comprehensive anti-social behavior management for the client. Strengths of the CBT The CBT operates under the praxis that individual thoughts and feeling influences behavior, emotions, and actions. According to the authors, embracing and identifying individual negative thoughts and replacing such feelings and thoughts with positive ones offers an effective platform for controlling how interpreting feelings and thoughts give a supportive environment (Ruggiero et al. 2018). According to the research- based findings, the CBT treatment method gives a platform for healthy thinking through identifying negative thoughts and feelings (Stefan et al. 2019). Additionally, CBT is one fundamental and effective short-term treatment method and improvements are seeable in 5 to 20 sessions. Additionally, CBT has accommodated a fundamental range of applications in managing maladaptive behaviors and is comparatively affordable than other therapy types. According to the researchers, CBT is an effective treatment method in virtual and physical applications and replaces psychotropic medications (Kumar et al. 2017). Thus, fundamental research-based evidence offers effective strengths and effectiveness of the CBT and applications in managing maladaptive behavior among clients. The CBT Weakness Despite fundamental strengths in the CBT applications in the treatment of maladaptive behaviors, some fundamental weaknesses and challenges require consideration for effective outcomes. Notably, difficulties in changes, structured CBT, lacking the willingness to change among the clients, and gradual process, interfere with the CBT applications
  • 6. effectiveness. Change can be difficult, especially among clients who perceive that identifying irrational and destructive thoughts and feelings have no significance in impacting positive feelings and though for pro-social behavior. Similarly, the CBT is a structured therapeutic approach unlike psychoanalytic psychotherapy that recognizes fundamental articulation on unconsciousness drivers in maladaptive behavior; hence the effectiveness of the CBT depends on the clients’ comfort ability on structured and focused psychotherapy strategy. Additionally, the effectiveness of Cognitive Behavioral Therapy depends on the client’s willingness to change which presents an effective weakness when a client is not willing to change destructive thoughts and feelings to realistic and objective feelings and thoughts for positive human behavior and development. Finally, the CBT treatment method is a gradual process that requires case-by-case analysis in managing maladaptive behavior and failure to accommodate a step may cause negative outcomes. Therefore, a comprehensive application of the CBT for assessment, evaluation, and intervention to locate negative human behavior and development requires effective considerations of the CBT weakness, incorporating strengths for a positive therapeutic outcome among clients with maladaptive behaviors. The CBT Cultural Competency The CBT accommodates fundamental cultural competency for effective and multidimensional applications. Notably, increasing multi-cultural societies creates a significant platform for the CBT to establish multicultural groups for effective applications. Similarly, the culturally informed Tran diagnostic model offers an integrative platform to acknowledge cultural articulation on case management. Specifically, the movie, Joe the King, occurs within the 1970s in a multicultural society that managing maladaptive behavior for Joe requires an informed Tran diagnostic model for effective applications. Noteworthy, the CBT manages cultural diversity in the theory applications via grouping and contextual sensitivity, supporting the CBT on
  • 7. cultural completely and applications (Hinton and Patel, 2017). Fundamentally, the CBT accommodates cultural competency through accommodating core cultural values and validating the clients’ experience, considering environmental changes. The CBT accommodates individuals, families, groups, organizations, communities, and societies, reinforcing cultural competency. Similarly, the movie, Joe the King, resonates with the CBT applications in managing maladaptive behavior from the character's behavior, situations, feelings, and thoughts, acknowledging social and person-in-environment for effective cultural competency. Therefore, the CBT acknowledges social environment, person-in-environment, and other multidisciplinary theoretical frameworks in engaging with clients enhancing cultural competencies and awareness. Assessment intervention, and evaluation for the CBT in the movie case study. In an attempt to identify Joe as a character in the film, Joe the King, there are fundamental asocial Behavior and scenarios witnessed in Joe as the major character’s behavior such as stealing and shoplifting to compensate for life frustrations due to lacking parental guidance, constant humiliation causing anti - social Behavior such as pretty theft, tardiness at school, and difficulty in developing a constructive relationship with others underpins a case for consideration. Specifically, assessing the case can accommodate the CBT approaches such as cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy, all accommodating different approaches to manage underlying thoughts and feeling patterns contribution to psychological conditions (King and Boswell, 2019). Specifically, the strategies give an effective platform to identify Joe's frustration with life from a dysfunctional family and non-welcoming school environment and how the character acquires such occurrences with maladaptive behaviors such as stealing and shoplifting and negative relationship with others. Cognitive therapy enables a therapist to identify Joe’s
  • 8. destructive thoughts, feeling, and emotions while dialectical behavior therapy is an approach that accommodates a platform to address thought and behavior through emotional regulation and mindfulness regulating Joe’s maladaptive behavior. Similarly, multimodal therapy incorporates seven independent but interconnected modalities including behavior, impact, sensation, imagery, cognition, interpersonal drivers, drugs, and biological considerations that assist in highlighting multi - dimensional factors, influencing Joe’s feelings, thoughts, emotions, and behavior in the movie for practical maladaptive behavior management by the CBT as the theoretical basis for case-by-case management. Thus, the CBT will provide an effective platform for psychotherapeutic treatment methods, enabling an individual to learn to identify and change maladaptive behavior, replacing them with positive ones as a short-term treatment method for Joe in the movie, Joe the King. Conclusion In conclusion, the paper has provided effective articulation on Cognitive Behavioral Therapy as a theoretical basis and how it resonated with human behavior and development, accommodating Joe’s situation in the movie, Joe the King. The CBT acknowledges therapeutic strategies such as cognitive therapy, dialectical behavior therapy, multi modal therapy, and rational emotive behavioral therapy, all accommodating different approaches to managing underlying thoughts and feeling patterns contributing to psychological conditions. Similarly, the CBT has prevented evidence-based effectiveness in assessment, intervention, evaluation, and identification of potential factors fueling maladaptive behavior for Joe, accommodating cultural competency Thus, the CBT is an effective theoretical basis for case-by-case analysis to manage maladaptive behaviors and clients.
  • 9. References Hinton, D., and Patel, A. (2017). Cultural Adaptations of Cognitive Behavioral Therapy. The Psychiatric clinics of North America. DOI: 10.1016/j.psc.2017.08.006 King, R., and Boswell, F. (2019). Therapeutic Strategies and Techniques in Early Cognitive-Behavioral Therapy. Psychotherapy, 9, (56)1: 35-40 Kumar V, Sattar Y, Bseiso A, Khan S, Rutkofsky IH. (2017). The effectiveness of internet-based Cognitive Behavior Therapy in the treatment of Psychiatric disorders. Cureus, 9(8):e1626. Lincoln, T.M., Riehle, M., Pillny, M, et al. (2017). Using Functional Analysis as a framework to guide individualized treatment for negative.Front Psychol. doi:10.3389/fpsyg.2017.02108 Ruggiero, G., Spada, G., Caselli, G., and Sassaroli, S. (2018). A Historical and Theoretical Review of Cognitive-Behavioral Therapies: From Structural SelfKnowledge to Functional Processes. J Rat-Emo Cognitive-Behav Ther (36):378–403 https://doi.org/10.1007/s10942-018-0292-8 Sburlati, E. S., Lyneham, H. J., Schniering, C. A., et al. (2015). Evidence-Base CBT for anxiety and depression in children and adolescents, competencies-based approach. John Wiley & Sons; 2014. doi:10.1002/9781118500576.ch17 Stefan, S., Cristea, I., Tatar, A., David, D. (2019). Cognitive‐ behavioral therapy (CBT) for a generalized anxiety disorder: Contrasting various CBT approaches in a randomized clinical trial. Journal of Clinical Psychology, (2019),1–15 Tsitsas GD, Paschali, A. (2014). A cognitive-behavior therapy applied to social anxiety disorder and specific phobia, case study. Health Psychol Res, 2(3):1603. doi:10.4081/hpr.2014.1603
  • 10. IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability Eleventh Edition Turban, Pollard, Wood Chapter 4 Networks, Collaborative Technology, and The Internet of Things Learning Objectives (1 of 4) 2 Copyright ©2018 John Wiley & Sons, Inc. Network Fundamentals Defined A computer network is a set of computers connected together for the purpose of sharing recourses. 3 Copyright ©2018 John Wiley & Sons, Inc. Common Network TypesAcronymTypeCharacteristicsExampleLANLocal Area NetworkShort distance connection Office School HomeWANWide Area NetworkSpans large physical distanceInternet Large companyWLANWireless LANLAN based on Wi-Fi
  • 11. technology Internet Large company 4 Copyright ©2018 John Wiley & Sons, Inc. Intranets, Extranets, and Virtual Private Networks Intranets are used within a company for data access, sharing, and collaboration. Extranets are private, company-owned networks that can be logged into remotely via the Internet. Virtual Private Networks (VPNs) are used where security of transmissions is a concern, because they encrypt the packets before they are transferred over the network. 5 Copyright ©2018 John Wiley & Sons, Inc. Virtual Private Networks A virtual tunnel routed through the Internet with software and hardware encryption. 6 Copyright ©2018 John Wiley & Sons, Inc. 6 Network Terminology Modem: a device that modulates/demodulates signal for transportation
  • 12. Modulation and Coding: Techniques used by modem to adapt the signal to the media Signal: Binary information we want to send. Signal Frequency Spectrum: All the frequency components of a signal Media Bandwidth: Limit in range of frequency signals Capacity Bandwidth: Maximum bits per second that can be transmitted 7 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.4 Basic functions of business networks 8 Copyright ©2018 John Wiley & Sons, Inc. Quality of Service (QoS) Latent-sensitivity: data such as real-time voice and high-quality video. Prioritized Traffic: data and apps that are time-delay-sensitive or latency-sensitive apps. Throttle Traffic: gives latency-sensitive apps priority, other types of traffic need to be held back (throttled). Traffic Shaping: the ability to prioritize and throttle network traffic. 9 Copyright ©2018 John Wiley & Sons, Inc. The Net Neutrality Debate
  • 13. Net neutrality is the principle that Internet Service Providers (ISPs) and their regulators treat all Internet traffic the same way. Traffic shaping prioritizes the flow of traffic by delaying the flow of less important network traffic. In 2010, the FCC ruled in favor of “net semi-neutrality”, not explicitly forbidding paid prioritization. The FCC under the current administration may take further steps to roll back net neutrality rulings, which could favor the cable companies over consumers. 10 Copyright ©2018 John Wiley & Sons, Inc. Network Fundamentals Name different types of networks. What is meant by “bandwidth”? What is the difference between an intranet and an extranet? How does a virtual private network (VPN) provide security? What is the purpose of a modem? Describe the basic functions of business networks. How do investments in network infrastructure impact an organization? Name the two tiers of traffic to which Quality-of-Service is applied. 11 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN.
  • 14. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. 3. Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be
  • 15. synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently. 7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). 11 Learning Objectives (2 of 4) 12 Copyright ©2018 John Wiley & Sons, Inc. Internet Protocols, APIs, and Network Capabilities Internet Protocol (IP) is the basic technology that makes global communication possible. Each devise attached to a network has a unique IP address that enables it to send and receive files made up of packets.
  • 16. 13 Copyright ©2018 John Wiley & Sons, Inc. IP Addresses and Packets Figure 4.5: IPv4 addresses have four groups of four alphanumeric characters, which allows for 232 or roughly 4.3 billion unique IP address. IPv6 addresses have eight groups of alphanumeric characters, which allows for 2128 , or 340 trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce. 14 Copyright ©2018 John Wiley & Sons, Inc. 14 Broadband Technology: 3G/4G/5G 3G networks support multimedia and broadband services over a wider distance and at faster speeds than prior generation networks. They use large satellite connections to telecommunication towers. 4G networks are digital, or IP, networks that enable even faster data transfer rates. 4G delivers average realistic download rates of 3 Mbps or higher (as opposed to theoretical rates, which are higher). 5G networks, the coming generation of broadband technology. 5G will dramatically increase the speed at which data is transferred across the network. 15 Copyright ©2018 John Wiley & Sons, Inc.
  • 17. Network Technology Standards WiMAX IEEE 802.16 30-mile range 70 Megabits per second (Mbps) Line-of-site not required Same principles as Wi-Fi (using radio signals) Long-Term Evolution (LTE) GSM deployed by Verizon, AT&T, and T-Mobile 100 Mbps downlink, 50 Mbps uplink 16 Copyright ©2018 John Wiley & Sons, Inc. Circuit vs. Packet Switching Circuit switching Older technology that originated with telephone calls Inefficient for digital transmission Packet Switching Transfers data or voice Files are broken into packets, numbered sequentially, routed individually to their destinations When received at the destination, the packets are reassembled into their proper sequences 17 Copyright ©2018 John Wiley & Sons, Inc. Application Programming Interfaces and Operating Systems
  • 18. Application Program Interface (API) consists of a set of functions, commands, and protocols used by programmers for OS-interactivity without having to write a program from scratch. Can be automated for simplified usability Twitter Facebook Amazon 18 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.7 API value chain in business. 19 Copyright ©2018 John Wiley & Sons, Inc. Internet Protocols (IP), APIs, and Network Capabilities Why has IPv6 become increasingly important? What is the difference between IPv4 and IPv6? What is the purpose of an IP address? What are the benefits of using an API? What is the difference between 4G and 5G? What is the most current network standard? What benefits will the upcoming 5G network standard offer businesses? What is the difference between circuit switching and packet switching? 20 Copyright ©2018 John Wiley & Sons, Inc.
  • 19. Suggested Answers: IPv4 can support roughly 4.3 billion unique IP address. IPv6 can support 340 trillion, trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce. In April 2014 ARIN, the group that oversees Internet addresses, reported that IPv4 addresses were running out—making it urgent that enterprises move to the newer IPv6 IP Version 4 (IPv4) has been Internet protocol for over three decades, but has reached the limits of its 32-bit address design. IP Version 6 (IPv6) is the most recent version of the Internet Protocol. IPv6 is replacing IPv4 because of IPv4’s limitations in number of IP addresses it can generate. IPv6 has a 128-bit address and allows 7.9 x 1028 times as many addresses as IPv4, which provides about 4.3 billion addresses. 3. Every device that communicates with a network must have a unique identifying IP address. An IP address is comparable to a telephone number or home address. 4. For programmers: The benefits of APIs are that they simplify the programmer’s job and ensure that all programs using the same API use that resource in the same manner. APIs are the common method for accessing information, websites, and databases. Business benefits of APIs include: APIs are channels to new customers and markets: APIs enable partners to use business assets to extend the reach of a company’s products or services to customers and markets they might not reach easily.
  • 20. APIs promote innovation: Through an API, people who are committed to a challenge or problem can solve it themselves. APIs are a better way to organize IT: APIs promote innovation by allowing everyone in a company to use each other’s assets without delay. APIs create a path to lots of Apps: Apps are going to be a crucial channel in the next 10 years. Apps are powered by APIs. Developers use APIs and combinations of APIs to create new user experiences. 5. 4G delivers average download rates of 3Mbps or higher. In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. Even though individual networks, ranging from 2G to 3G, started separately with their own purposes, soon they will be converted to the 4G network. 4G is based purely on the packet-based Internet Protocol (IP) – unlike current 2G and 3G networks that have a circuit-switched subsystem. Users can get 4G wireless connectivity through one of the following standards: 1. WiMAX is based on the IEEE 802.16 standard and the metropolitan area network (MAN) access standard. 2. LTE (Long-Term Evolution) is a GSM-based technology that is deployed by Verizon, AT&T, and T-Mobile. LTE has download data rates of 100 Mbps and upload data rates of 50 Mbps. 5G networks are the coming generation of broadband technology. 5G builds on the foundation created by 4G. 5G will dramatically increase the speed at which data is transferred across the network. 6. Although 5G isn’t expected until 2020 and many organizations are already investing in the infrastructure required to run this new mobile wireless standard. 7. 5G mobile networks will offer huge gains in both speed and capacity over existing 4G networks−along with opportunities at
  • 21. the operations and strategic levels. In the short term, the 5G infrastructure build-out will create new jobs. In the longer term, 5G will create entirely new markets and economic opportunities driven by superior mobile capabilities in industries ranging from health care to automotive. 8. The two types of switching are: Circuit switching: A circuit is a dedicated connection between a source and a destination. Circuit switching is older technology that was used for telephone calls. The distinguishing characteristic is that the circuit cannot be used by any other call until the session (connection) is ended. It is inefficient for digital transmission. Packet switching: Packet switching transfers data or voice in packets. Files are broken into packets, numb ered sequentially, and routed individually to their destination. When received at the destination, the packets are reassembled into their proper sequence. The astute student may realize: The path of the signal is digital, and is neither dedicated nor exclusive. That is, the networks are shared. When packets are transmitted over a shared network, such as the Internet, they may follow different paths to the destination, where they are reassembled into the original message once all of them have arrived. 20 Learning Objectives (3 of 4) 21 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.8 Four drivers of global mobile traffic through 2020
  • 22. 22 Copyright ©2018 John Wiley & Sons, Inc. Mobile Data Traffic Milestone by 2020 23 Copyright ©2018 John Wiley & Sons, Inc. Wireless Networks and Mobile Infrastructure Mobile Networks Bluetooth: short-range wireless communication technology allowing device pairing Wi-Fi: standard way to wirelessly connect computing devices through routers commonly connected to the Internet WiMax: transmits voice, data, and video over high-frequency radio signals designed as alternative to cable and DSL 24 Copyright ©2018 John Wiley & Sons, Inc. Data Networks, IP Addresses, and APIs: A mashup of GPS and Bluetooth General term referring to the integration of two or more technologies such as Bluetooth and Wi-Fi Provide intelligence Inter-Automobile collision avoidance Sudden braking Can automatically call emergency services
  • 23. 25 Copyright ©2018 John Wiley & Sons, Inc. Data Networks, IP Addresses, and APIs: Near-Field Communication (NFC) Enables two devices within close proximity to establish a communication channel and transfer data using radio waves More secure than other wireless technologies Examples: Apple iWatch Digital tickets providing access to concerts Transmit public transport payment through phones 26 Copyright ©2018 John Wiley & Sons, Inc. Four Important Factors When Choosing a Mobile Network 27 Copyright ©2018 John Wiley & Sons, Inc. Mobile Networks What factors are contributing to mobility? Why is mobile global traffic increasing? What accounts for the increase in mobile traffic? Give some examples of VoIP networks. How is NFC different from RFID? What are the two components of a wireless network infrastructure?
  • 24. What is Near Field Communication and how is it used in business? What factors should be considered when evaluating a mobile network? 28 Copyright ©2018 John Wiley & Sons, Inc. Suggested Answers: 1.Answers may vary. Factors contributing to mobility can include the following: New wireless technologies such as WiMAX-Wireless Broadband and standards such as 8.11n High-speed wireless networks such as 4G Multitasking mobile devices More robust mobile OSs and their applications Increased competitive pressure as others start adopting mobile technology for strategic applications 2. Organizations are recognizing the strategic value of mobile technology. So, organizations are moving away from ad hoc adoption of mobile devices and network infrastruc ture to a more strategic planning build-out of their mobile capabilities. As technologies that make up the mobile infrastructure evolve, identifying strategic technologies and avoiding wasted investments require more extensive planning and forecasting. 3. In its most recent Visual Networking Index Forecast (VNI), Cisco reported that mobile data traffic has grown 400 million times over the past 15 years. They also predict that by 2020 monthly global mobile data traffic will be 30.6 exabytes; number of mobile-connected devices will exceed 11.6 billion (exceeding the world’s project population of 7.8 billion) and smartphones will account for 81% of total mobile traffic. This
  • 25. includes a major increase in machine-to-machine communications and the number of wearable technology devices. 4. Examples of high-capacity networks are wireless mobile, satellite, wireless sensor, and VoIP (voice over Internet Protocol) such as Skype. 5. NFC enables two devices within close proximity to establish a communication channel and transfer data through radio waves. NFC is location-aware technologies that are more secure than other wireless technologies like Bluetooth and Wi-Fi. Unlike RFID, NFC is a two-way communication tool. 6. The two components of wireless infrastructures are wireless LANs and WiMAX. 7. Answers may vary. Location-aware NFC technology, such as smartphones, can be used to make purchases in restaurants, resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains. They also can provide consumers with content to complement their current activity, such as recipe or idea videos when shopping at a supermarket having proper NFC tag- equipped units. 8. When evaluating mobile network solutions, four factors to consider are: 1. Simple: Easy to deploy, manage and use. 2. Connected: Always makes the best connection possible. 3. Intelligent: Works behind the scenes, easily integrating with other systems. 4. Trusted: Enables secure and reliable communications. 28
  • 26. Learning Objectives (4 of 4) 29 Copyright ©2018 John Wiley & Sons, Inc. Collaborative Technologies: Virtual Collaboration--Benefits Information sharing between retailers and suppliers (Example: Walmart and Proctor & Gamble) Retailer-supplier collaboration (Example: Asda Corp.) Lower transportation and inventory costs and reduced stockouts (Example: Unilever’s Transportation Business Center) Reduction of product development time (Example: Caterpillar, Inc.) 30 Copyright ©2018 John Wiley & Sons, Inc. Collaborative Technologies: Group Work Group Work and Dynamics can be quite complex Group workers can be located in different places or work at different times Group members may work for the same or different organizations Data, information, or knowledge may be located in many sources that may be external to the organization 31 Copyright ©2018 John Wiley & Sons, Inc.
  • 27. Collaborative Technologies: Brainstorming in the Cloud Companies are now using cloud-based online brainstorming applications Avoids travel expenses if members are geographically dispersed No restriction to number of sessions Examples Evernote—features function to synchronize user’s notes iMindmap Online—relies on mind mapping and other structured approaches to help streamline work processes 32 Copyright ©2018 John Wiley & Sons, Inc. The Internet of Things (IoT) Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, that enables these objects to collect and exchange data. Objects we interact with send signals to and from each other, collecting data IoT collects that data from millions of sensors embedded in everything from cars, to refrigerators, to space capsules Half of U.S. manufacturers report they are currently using IoT technology to collect machine data (Industry Week study, 2016) A smaller percentage (44%) are colleting data from sensors embedded in their products 33 Copyright ©2018 John Wiley & Sons, Inc. Advantages of IoT Monitoring performance, quality, and reliability of products and services
  • 28. Gaining insight into potential new products and service Support sales Better understand product use Remote troubleshooting of products Deliver revenue-generating post-sales services More efficiently deliver post-sales services 34 Copyright ©2018 John Wiley & Sons, Inc. 34 Disadvantages of IoT Network security Data privacy Data analysis capabilities Data collection capabilities Realistic efficiency opportunities Realistic new revenue opportunities Cost 35 Copyright ©2018 John Wiley & Sons, Inc. 35 Collaboration Technologies and the Internet of Things (IoT) Why is group work challenging? What might limit the use of in-person brainstorming? How can online brainstorming tools overcome those limits? List ways in which virtual collaboration can be used in business.
  • 29. What devices do you have that take advantage of the IoT? Describe how they impact the way that you live and work. What is driving the rise of IoT? What is the main concern that organizations have about the IoT? Do you think the advantages outweigh the disadvantages of the IoT? Explain. 36 Copyright ©2018 John Wiley & Sons, Inc. Suggested Answers: 1. Group work involves processes that can be quite complex depending on the following factors: Group members may be located in different places or work at different times. Group members may work for the same or for different organizations. Some of the needed data, information, or knowledge may be located in many sources, several of which are external to the organization. Despite the long history and benefits of collaborative work, groups are not always successful. 2. Answers may vary. In-person brainstorming can be limited by travel expense if members are geographically dispersed. Other limiting factors, such as schedules, time zones, and available resources, such as an available meeting place, may limit in- person brainstorming. 3. Online brainstorming tools can be accessed virtually from anywhere Internet access is available. Many of these tools allow users to post comments on their own time rather than having to meet at a particular time, however, virtual meetings may be necessary as well.
  • 30. 4. Virtual Collaboration can be used in business to share information between retailers and their suppliers, lower transportation and inventory cists, and reduce product development time. 5. Everyday items such as cellphones, coffee markers, washing machines, lamps and headphones all use the IoT. (Answers may vary on the impact) 6. Several things have created the ‘perfect storm’ for the creation and growth of the IoT. These include more widely available broadband Internet, lower cost of connecting, development of more devices with wi-fi capabilities and embedded sensors, and the overwhelming popularity of the smartphone. 7. Network security and data privacy are manufacturers’ top concerns about IoT technology. With billions of devices connected together there are a multitude of end-points where security breaches can occur and individuals or organizations can be hacked. 8. Answers may vary. 36 Copyright Copyright © 2018 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher
  • 31. assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. 37 Copyright ©2018 John Wiley & Sons, Inc. 37 Collaborative Technologies and the Internet of Things (IoT) (105 points)The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life. · Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT. · Discuss the potential impact that IoT can have on how people live. · Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited. · How has the IoT been impacted by the pandemic? Explain specific examples. Your well-written report should be 4-5 pages in length, not including the title and reference pages. To make it easier to read and therefore grade, make sure you clearly delineate each section of your answer so it can be matched with the relevant question. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references as appropriate. Review the grading rubric to see how you will be graded for this assignment. CT Assignment RubricCT Assignment Rubric - Alternative Formats
  • 32. For Your Success This week, consider the ways in which networks support you at home, at work, and at school. How do you use network technologies to get information, communicate, and collaborate? How do these make it easier? Learning Outcomes
  • 33. 1. Differentiate between various network types and functions. 2. Examine protocols and network capabilities, and why a business manager should understand these. 3. Articulate the importance and impact of mobile networks on business. 4. Analyze the business uses of collaborative technologies and the Internet of Things. Readings Required: Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Transactions on Internet Technology (TOIT) - Special Section on Advances in Internet-Based Collaborative Technologies, 19(3), 1– 4.https://doi.org/10.1145/3361071 Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things: A developer’s perspective. ACM Computing Surveys, 54(5), 102. Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative social internet of things in mobile edge networks. IEEE Internet of Things Journal, 7(12), 11473–11491. Recommended: Chapter 4 PowerPoint slides