SlideShare a Scribd company logo
1 of 16
Title of Presentation
Student’s name
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
1
Introduction
Includes
The name of the student evaluated and the topic
Also should detail the purpose and flow of the presentation
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Format of Paper
Evaluate the following three questions regarding the overall
format of the paper.
Were all required sections included?
Were they clearly distinguished from one another?
If not, were reasons given for not including some?
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Historical Timeline and Predecessor Assessment Evaluation
Assess the following three components as detailed on the
Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation.
Add them to play up the visual appeal of this slide but be sure
to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Analysis of Impact Evaluation
Assess the following three components as detailed on the
Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation.
Add them to play up the visual appeal of this slide but be sure
to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Ethical Considerations Evaluation
Assess the following three components as detailed on the
Student Evaluation Form
Sources
Content
Writing Skills
Remember that graphics go a long way in a visual presentation.
Add them to play up the visual appeal of this slide but be sure
to cite them in proper APA format.
Add additional slides as needed for this section.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Concluding Remarks
Summarize the areas of the writer's strengths and weakness as
presented in your presentation and remember to always end on a
positive note!
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
References
Reference all sources used in completing this assignment.
Remember that in-text citations are just as important in a
presentation as they are in papers.
The references listed here should be a list of what you have
posted on your previous slides, including any images that you
used, unless they are clipart.
Feel free to adjust the color and scheme of this template. Color
and design are recommended in an appealing visual
presentation.
‹#›
Should be at least 300 words. No paper format required
Innovation, intrapreneurship, and creativity are closely related
concepts and each is vital to building a knowledge-creating
organization. Discuss the relationship among the three concepts.
Describe the challenges for managing innovation,
intrapreneurship, and creativity processes within an
organization, and any ethical considerations that need to be
taken into account when fostering innovation, intrapreneurship,
and creativity. Which of the processes is (or are) most likely to
be successful in the early phase of an organization’s life cycle.
Why? Which of the processes is (or are) most likely to be
successful in the growth phase of an organization’s life cycle?
Why?
PEER EVALUATION PRESENTATION ASSESSMENT FORM:
TO BE USED TO EVALUATE YOUR TEAMMATE’S COURSE
PAPER
DIRECTIONS:
1. Please use this form to evaluate your assigned peer’s final
research paper according to
the criteria below.
2. Specific information should be supplied for each item; that
is, do not simply answer Yes or No.
3. This form can be downloaded and expanded to allow space
for your report.
4. This is a graded assignment.
1. Evaluate your assigned classmate’s paper according to the
following instructions:
FORMAT:
a. Were all required sections included?
b. Were they clearly distinguished from one another?
c. If not, were reasons given for not including some?
FOR EACH SECTION:
SOURCES:
d. Were in-text references used?
e. Were they properly formatted?
f. Were primary sources used?
g. Were they formatted properly?
h. Were sources from our textbook used?
i. Were they formatted properly?
j. Were the length requirements observed?
CONTENT:
k. Did the paper have a thesis and introduction?
l. Was it clear to you?
m. Did each section relate to the thesis? Evaluate by section.
n. If any of the sections did not apply to the paper, was a reason
given?
o. Was some form of quantitative reasoning used?
p. If so, did it apply to the thesis?
q. Conclusion: did it accurately summarize the author’s
argument?
r. Was a Works Cited page included?
s. Was it properly formatted?
WRITING SKILLS:
t. Evaluate the writing of the paper. The following includes all
elements of writing: spelling, grammar, punctuation, sentence
structure, and clarity of expression.
1. Excellent: Virtually error free
2. Very good: Very few insignificant errors
3. Good: Some errors; somewhat distracting
4. Fair: Significant number of writing errors; distracting
5. Poor: Unacceptable level of writing errors
Impact of Bring Your Device (BYOD) at workplace
2
Final Research Report
Aakash Patel
DeVry University
Technology Society and Culture
Paul winters
Impact of Bring Your Device (BYOD) at workplace
Introduction
BYOD is an information technology policy where
employees are allowed to bring their personal devices to the
workplace. Some of the devices include mobile phones, personal
computers, and other handheld devices that are portable. The
devices are then used to access company systems and data.
Today, it's the desire of everybody to own a device such as a
tablet which is considered convenient in the current setup. A
device such as a table is similar to a mobile computer such as a
laptop which is easier to carry and more discrete. It can also use
3G internet from most places, unlike a laptop. The only
disadvantage of this technology is that it can't be put on your
lap, and it has to be held in your hands. It's also difficult to
keep the gadget with your hands and at the same time use the
same hands to operate it. Touchscreen technology has emerged
and has become more common currently than ever before.
Almost every device today has this technology implemented in
it be it a computer, a mobile phone, televisions or even DVD
players. The technology has made it easier to work with these
devices in our daily activities. However, the transition from the
old version to this newly emergent technology has taken time
and has been improving consistently from older versions (Jin,
2014).
Several technologies have led to the emergence of the current
technological advancement. Grid computing is among the major
technologies that have led to this improvement. Grid computing,
which is a form of distributed computing solves a problem by
utilizing resources of several networked computers. It's
recognized as the predecessor of the current cloud computing.
Since time has been available and network workload has
considerably decreased, Grid computing utilizes this downtime
in combination with its computing power for purposes of
scientific research, collaborative projects, etc. that need
resources to attain their goals. This, at last, led to using specific
software's including Globus Toolkit and Boinc so as to enjoy
free resources on computers as well as share information to be
processed by computers within the grid. This has improved
computations and increased efficiency that has finally led to the
current technology hike (Kranzberg & Pursell, 2015).
Other than grid, computing, there are other related technologies
with great impacts on the current world we are today.
Distributed computing has provided possibilities of running
applications on many computers at the same time. Moreover,
utility computing as a business model allows resources
including storage, computing among others to be provided and
charged as well. These have led to the emergence of web
services offering computing services dynamically on demand
resulting in the evolution of web 2.0 to deliver services to all its
users (Jones, 2012). These technologies have provided
abstraction as well as isolation of lower functionality from the
underlying hardware hence allowing portability and sharing of
physical resources. These funds are made available to many
clients within the same infrastructure making it possible to
share data and remedies in multi-tenant architectures.
Artificial intelligence has major impacts on the current
technological advancement. For a long time, people have made
software's and machines with human attributes which exhibit
greater intelligence. These devices and software's have been
capable of learning, reasoning, perception, planning, knowledge
as well as understanding the natural language processing, as
well as abilities to manipulate and move objects. This is among
the major fields which have profoundly impact today's
technological advancement in conjunction with robotics which
is closely related to AI. This has led to technologies such as
robots, space crafts among others (Jones, 2012).
Ethical Consideration
A detailed evaluation of the ethical considerations associated
with the technology in relation to its impact on humanity
Most people agree that technology is one of the most important
aspects of human lives. With considerations of humanity and
ethics, technology has a great impact. Humanity is the ability of
human beings to reason and thinks before they involve in any
form of action on anything. It is what separates human beings
from machines like computers and robots, which are
programmed to involve in a certain course of action and respond
to certain situations. The impact that technology has is both
positive and negative.
To begin with, it is through education that people have managed
to highly acquire education concerning ethics. Organizations
that have demonstrated the need for ethics has been set up on
technological grounds. A company like Apple Inc., for example,
is among the many organizations that explain about the
necessity of ethics in the workplace, and personal ethics of
every individual and its total existence is mainly because of
technological existence. Technology has therefore made a
positive contribution towards ethics of human beings and
promoted humanity.
Technology, on the other hand, has also caused a great negative
impact on humanity and ethics. To begin with, certain
individuals like hackers, who have mastered numerous
technological skills have been tempted by technology to commit
crimes that are against humanity and ethical grounds and have
made the decisions to involve in them. These involve the many
inhuman terrorist actions that have taken place being aided by
technology for efficiency. At the same time, it has also cause
peoples’ everyday lives to change, simply because they expect
perfection from other people like the machines that they work
with all the time. It has depleted issues like patience, and thus
some people expect other to respond to their demands and
requirements immediately. Technology has therefore had both
positive and negative effects on people’s humanity and ethics.
An illustration of at least two specific ethical theories that
differentiates their varying approaches in consideration of the
questions raised by the selected technology
There are many theories that technology has fully affected
in a certain way. The figure below fully explains a number of
these theories.
As shown in the visual presentation, one of the ethical theories
that technology has a great impact upon is the theory of virtual
ethics. Virtual ethics is a form of guiding theories that explains
that the behavior of an individual relies on certain virtues that
they have and what they believe is right. Technology has
changed the belief of people from what they used to be before.
It has done this through its ability to enable people to socialize
with others. When people view other individuals through certain
platforms like social media, they acquire new virtual and
beliefs. People, for example, might believe that dressing in a
certain way is right, simply because they saw other individuals
who might be practicing different cultures dressing similarly.
The other theory that technology has affected is
consequentialism. This theory as described in the visual
presentation explains that the best action that an individual
should involve in is the one that provides the greater good. With
technology, however, people can involve in actions that affect
areas that may be geographically far away from them, and do it
in certain ways that the actions cannot be traced to them. When
these individuals do not care much about others, therefore, they
might involve in these forms of actions and believe that they are
ethical since, despite the harm they may do to others, they
would still benefit greatly from them (Broad, 2014).
Benefits associated with the program
Many businesses have had to keep up with the changing
times and the IT departments struggle to keep up with changing
technological advances. BYOD is part of an ongoing trend that
involves IT based practices aimed at consumerism of
technology. The proponents of BYOD term, it as productive as
employees, can access mail at their convenience, therefore,
reducing costs. However if it is not entirely understood it will
threaten the security of the company putting it at risk. The
following is an assessment of the significant benefits and
concerns that are associated with the system.
According to French, Guo and Shim, (2014) BYOD is
thought to improve employee productivity and satisfaction as
they are more likely to be comfortable when using their own
devices. It has been noted that employees are always seeking
flexible work options and the ability to work in remote areas. If
they are allowed to use the same device that they use at home in
the office then, it allows for an easy transition and therefore
enhanced output and efficiency. It is noted that surveys taken in
relevance to employees who use their own devices will feel
more ownership over their work. The policy can be an incentive
that brings about talent in the recruitment efforts. Companies
that embrace BOYD are embraced more positively as they are
thought to have a more innovative, agile and modern culture.
Concerning operating costs, companies are more likely to adopt
the policy as it drives the cost away from them. For example,
the programs shift the costs to the users as workers pay for most
of their voice and data services. A proper consideration is
companies that have a lot of employees who cater for their
individual data and voice call needs thus saving the company a
lot of money that can be allocated elsewhere. Technology is
also always changing and requires an upgrade from time to
time. In a workplace where the employer has to take care of the
upgrade, it would be costly for the enterprise. BOYD devices
usually consist of cutting age devices unlike IT issued ones,
therefore, allowing companies to reap benefits of modern
technology.
Companies that embraced the use of BOYD policy increase
the engagement of workers both in the workplace and after
hours. If the employees are likely to work outside the office,
their responsiveness will be improved when they have the
means to communicate outside the office. It means that they are
more available to respond to emails, answer calls and even carry
out daily tasks when outside the office. Despite these benefits,
there are various matters that must be taken into consideration
such as security of company information. In the mobile and
communication world, security threats are imminent which
means that BOYD can be disastrous (Lennon, 2012).
Risks associated with BOYD
According to Raths, (2012) there are significant risks
associated with the policy and it is up to the IT departments to
ensure that information does not end up with the wrong people.
Therefore, security measures are called for when dealing with
the remote devices. Surveys carried out extensive national show
that many senior IT security and technology decision makers
report serious security breaches and violations in relevance to
personal mobile device use. Security threats are related to the
end node problem where devices used by employees are also
used for internet access. There might also be data breaches if an
employee loses their phone and other un-trusted parties retrieve
information and any unsecured data on the phone. There are
also instances where an employee leaves a company and since
the device is personally owned they leave with the data and
company applications. There are also employees who sell their
devices without taking time to wipe company data.
Privacy fears
Employees have privacy concerns that are entirely
justified. Some of the BOYD policies provide employees with
software that track their every move. Workers who agree to the
BOYD program might find themselves accepting software
installations done by the IT department. The programs might be
used to monitor their device usage, collection of personal
information. The IT department might be able to remove
personal data from users’ devices. Most employees have raised
concerns about access to contacts, facebook account data,
installed applications and browser histories. Even when
companies take time to separate personal and business data,
there might be discovery requests especially when it comes to
litigations.
Cost to the employees and device disparities.
As noted earlier on the costs of the BOYD are transferred to the
employee. However, not everyone has a device that can be used
in the program. It is therefore quite demanding when one is told
that they should get a device such as an iPhone or a laptop.
There are also risks such as damage to the device that can’t be
attributed to the employer. In this case, the employees are not
quite happy to shoulder the costs. It is also evident that when
employees are allowed to select their own devices they might
bring different devices with distinct capabilities. It 's hard for
programmers to cover various platforms that are brought to
work but more often they still manage to do so.
It is, therefore, evident that various considerations have to
be taken to ensure that the process is successful. If employees
are more technologically driven and have high-quality devices
hen, it might be good to adopt BOYD. Employees should also
know the stand of the company especially when it comes to
access to personal information. Legal matters are inevitable,
and these matters are of concern to employees. Informing them
in advance might serve well to increase their productivity and
ensure protection of data (Ghosh et al., 2013).
Conclusion
BOYD policies have been very useful and practical when it
comes to the benefits that are accrued. However, the threats to
security and cost are a threat to the advancement of the program
in the United States. Most companies that appreciated the
method earlier on are now considering alternatives due to
security breaches that have been experienced in the past.
Employees are nowadays aware of security threats, and if more
companies choose to take up the policy, it will be easier to
protect data and information. Policy issues when implementing
the program are imperative, and companies have to ensure that
the right measures are taken to account.
The significant technology developments seen today have
undergone through several phases with slight changes in each
step leading to the hi-tech world that we live in today. The old
version technology has been critical to this development, and
there is still room for more in the late future.
Major Resources
Vickerman, J. A. (2013). Bring your own device to work. Risk
Management, 60(1), 38. This article clearly, elaborates the
various aspects of work life balance of various employees, and
how the various work dynamics are influencing the integration
of both in work place. He illustrates this by using an analogy of
an employee been restricted to use his or her phone at work and
the impact it has on overall performance. In the current
technological era, the phone has a dual purpose as it can be
conveniently used to increase efficiency in task performance.
Ballagas, R., Rohs, M., Sheridan, J. G., & Borchers, J.
(2004, September). Byod: Bring your own device.
In Proceedings of the Workshop on Ubiquitous Display
Environments, Ubicomp (Vol. 2004). In this article, the writer
looks at the changed sorts of client communications and
arrangement issues encompassing extensive open presentations.
He then chooses and build up a use worldview in which
individuals use individual gadgets to collaborate with extensive
open showcases. This clarifies the significance of telephones in
buyer responsiveness.
Gilbert, J., & Gilbert, J. B. (2012). Bring Your Own Device to
Work. Employees of organizations large and small continue to
“consumerism” the enterprise by
adopting mobile technology and bringing it to the workplace.
Many organizations have
allowed employees to use personal smart phones for quite some
time. But some are rethinking this idea by putting into
consideration, research work on the continued use.
Bradley, T. (2011). Pros and cons of bringing your own device
to work. PC World, December 20 2011. In this article the writer
gives an in-depth analysis of a worker taken with them a phone
to their respective work station. This he says is important as
they are able to concentrate more, as all situations that can
occur, they can easily get updates. Although this helps them
feel comfortable, it can interfere with their performance, if the
phones are used during working hours. Representatives are
increasingly liable to compose their own lives utilizing a
brilliant phone. They convey this desire to the work
environment and need to utilize their phones to arrange their
work life as well. This aim is much of the time called Bring
Your Own Device (BYOD) and is creating IT divisions some
worry.
Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M.,
& Steggles, P. (1999, September). Towards a better
understanding of context and context-awareness. In Handheld
and ubiquitous computing (pp. 304-307). Springer Berlin
Heidelberg. The reason for this article is to analyse the
variables that figure out if representatives take after Bring Your
Own Device (BYOD) arrangements through the perspective of
the Protection Motivation Theory. BYOD is quickly turning into
the standard instead of the special case. Subsequently, firms are
building up BYOD arrangements to address the danger intrinsic
in permitting people to utilize their own gadgets to get to or
store organization information. This paper reports the
aftereffects of a study of bookkeeping understudies, non-
bookkeeping understudies, and full-time workers.
References
Broad, C. (2014). Five types of ethical theory. London:
Routledge.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status,
issues, and future of bring your own device (BYOD).
Communications of the Association for Information Systems,
35(10), 191-197.
Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your own
device (BYOD): Security risks and mitigating strategies.
Journal of Global Research in Computer Science, 4(4), 62-70.
Jin, Z. (2014). Global technological change: from hard
technology to soft technology. Bristol, England; Portland:
Intellect Books.
Jones, S. (2012). Cybersociety 2.0: Revisiting computer-
mediated community and Technology. Thousand Oaks: SAGE
Publications.
Kranzberg, M., & Pursell, C. W. (2015). Technology in Western
Civilization. New York: Oxford Univ. Press.
Lennon, R. G. (2012). Bring your own device (BYOD) with
cloud 4 education. In Proceedings of the 3rd annual conference
on Systems, programming, and applications: software for
humanity (pp. 171-180). ACM.
Raths, D. (2012). Are You Ready for BYOD: Advice from the
Trenches on How to Prepare Your Wireless Network for the
Bring-Your-Own-Device Movement. THE Journal
(Technological Horizons In Education), 39(4), 28.

More Related Content

Similar to Title of PresentationStudent’s nameFeel free to adjust the c.docx

The Technology Process (Updated)
The Technology Process (Updated)The Technology Process (Updated)
The Technology Process (Updated)Kay Smythe
 
Btt 1 o8 ethical issues in developing technologies
Btt 1 o8 ethical issues in developing technologiesBtt 1 o8 ethical issues in developing technologies
Btt 1 o8 ethical issues in developing technologiesshanzehhh
 
Question 1a Research and Planning
Question 1a Research and PlanningQuestion 1a Research and Planning
Question 1a Research and PlanningMr Smith
 
Presentation1.update.pptx
Presentation1.update.pptxPresentation1.update.pptx
Presentation1.update.pptxsefefehunegnaw1
 
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxADDY50
 
Introduction to Section A Question 1a
Introduction to Section A Question 1aIntroduction to Section A Question 1a
Introduction to Section A Question 1aZoe Lorenz
 
G325 section-a-reasearch and-planning
G325 section-a-reasearch and-planningG325 section-a-reasearch and-planning
G325 section-a-reasearch and-planningcigdemkalem
 
1a digital technology
1a digital technology1a digital technology
1a digital technologysparkly
 
These are topics we have worked in residency week in group project
These are topics we have worked in residency week in group projectThese are topics we have worked in residency week in group project
These are topics we have worked in residency week in group projectchestnutkaitlyn
 
These are topics we have worked in residency week in group project.docx
These are topics we have worked in residency week in group project.docxThese are topics we have worked in residency week in group project.docx
These are topics we have worked in residency week in group project.docxrandymartin91030
 
User Experience as an Organizational Development Tool
User Experience as an Organizational Development ToolUser Experience as an Organizational Development Tool
User Experience as an Organizational Development ToolDonovan Chandler
 
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docx
ENG 510 Module Nine Journal Guidelines and Rubric  Ov.docxENG 510 Module Nine Journal Guidelines and Rubric  Ov.docx
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docxpoulterbarbara
 
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docx
 ENG 510 Module Nine Journal Guidelines and Rubric  Ov.docx ENG 510 Module Nine Journal Guidelines and Rubric  Ov.docx
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docxShiraPrater50
 
324587-project-setting-guidance.pdf
324587-project-setting-guidance.pdf324587-project-setting-guidance.pdf
324587-project-setting-guidance.pdfMrRZapata
 
Improving Application Development Effectiveness
Improving Application Development Effectiveness Improving Application Development Effectiveness
Improving Application Development Effectiveness Computer Aid, Inc
 
NEED FOR A SOFT DIMENSION
NEED FOR A SOFT DIMENSIONNEED FOR A SOFT DIMENSION
NEED FOR A SOFT DIMENSIONcsandit
 
introtosectionaquestion1a-120312082933-phpapp02.pdf
introtosectionaquestion1a-120312082933-phpapp02.pdfintrotosectionaquestion1a-120312082933-phpapp02.pdf
introtosectionaquestion1a-120312082933-phpapp02.pdfZoran Radoman
 

Similar to Title of PresentationStudent’s nameFeel free to adjust the c.docx (20)

The Technology Process (Updated)
The Technology Process (Updated)The Technology Process (Updated)
The Technology Process (Updated)
 
The Modern Software Architect
The Modern Software ArchitectThe Modern Software Architect
The Modern Software Architect
 
Btt 1 o8 ethical issues in developing technologies
Btt 1 o8 ethical issues in developing technologiesBtt 1 o8 ethical issues in developing technologies
Btt 1 o8 ethical issues in developing technologies
 
Question 1a Research and Planning
Question 1a Research and PlanningQuestion 1a Research and Planning
Question 1a Research and Planning
 
Presentation1.update.pptx
Presentation1.update.pptxPresentation1.update.pptx
Presentation1.update.pptx
 
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
 
Introduction to Section A Question 1a
Introduction to Section A Question 1aIntroduction to Section A Question 1a
Introduction to Section A Question 1a
 
G325 section-a-reasearch and-planning
G325 section-a-reasearch and-planningG325 section-a-reasearch and-planning
G325 section-a-reasearch and-planning
 
1a digital technology
1a digital technology1a digital technology
1a digital technology
 
These are topics we have worked in residency week in group project
These are topics we have worked in residency week in group projectThese are topics we have worked in residency week in group project
These are topics we have worked in residency week in group project
 
These are topics we have worked in residency week in group project.docx
These are topics we have worked in residency week in group project.docxThese are topics we have worked in residency week in group project.docx
These are topics we have worked in residency week in group project.docx
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
User Experience as an Organizational Development Tool
User Experience as an Organizational Development ToolUser Experience as an Organizational Development Tool
User Experience as an Organizational Development Tool
 
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docx
ENG 510 Module Nine Journal Guidelines and Rubric  Ov.docxENG 510 Module Nine Journal Guidelines and Rubric  Ov.docx
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docx
 
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docx
 ENG 510 Module Nine Journal Guidelines and Rubric  Ov.docx ENG 510 Module Nine Journal Guidelines and Rubric  Ov.docx
ENG 510 Module Nine Journal Guidelines and Rubric Ov.docx
 
L16 Documenting Software
L16 Documenting SoftwareL16 Documenting Software
L16 Documenting Software
 
324587-project-setting-guidance.pdf
324587-project-setting-guidance.pdf324587-project-setting-guidance.pdf
324587-project-setting-guidance.pdf
 
Improving Application Development Effectiveness
Improving Application Development Effectiveness Improving Application Development Effectiveness
Improving Application Development Effectiveness
 
NEED FOR A SOFT DIMENSION
NEED FOR A SOFT DIMENSIONNEED FOR A SOFT DIMENSION
NEED FOR A SOFT DIMENSION
 
introtosectionaquestion1a-120312082933-phpapp02.pdf
introtosectionaquestion1a-120312082933-phpapp02.pdfintrotosectionaquestion1a-120312082933-phpapp02.pdf
introtosectionaquestion1a-120312082933-phpapp02.pdf
 

More from herthalearmont

TNEEL-NE Theoretical Perspectives Learning Activ.docx
TNEEL-NE Theoretical Perspectives   Learning Activ.docxTNEEL-NE Theoretical Perspectives   Learning Activ.docx
TNEEL-NE Theoretical Perspectives Learning Activ.docxherthalearmont
 
To Board of Directors of Reed Elsevier Plc.From Report.docx
To       Board of Directors of Reed Elsevier Plc.From   Report.docxTo       Board of Directors of Reed Elsevier Plc.From   Report.docx
To Board of Directors of Reed Elsevier Plc.From Report.docxherthalearmont
 
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docxTMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docxherthalearmont
 
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docxTitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docxherthalearmont
 
TitleAuthorSetting.docx
TitleAuthorSetting.docxTitleAuthorSetting.docx
TitleAuthorSetting.docxherthalearmont
 
TitleAJS504 Week 1 AssignmentName of StudentI.docx
TitleAJS504 Week 1 AssignmentName of StudentI.docxTitleAJS504 Week 1 AssignmentName of StudentI.docx
TitleAJS504 Week 1 AssignmentName of StudentI.docxherthalearmont
 
TitleABC123 Version X1Working in Diverse GroupsPSY.docx
TitleABC123 Version X1Working in Diverse GroupsPSY.docxTitleABC123 Version X1Working in Diverse GroupsPSY.docx
TitleABC123 Version X1Working in Diverse GroupsPSY.docxherthalearmont
 
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docxTitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docxherthalearmont
 
TitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxTitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxherthalearmont
 
TitleABC123 Version X1Week Two Assignment Worksheet.docx
TitleABC123 Version X1Week Two Assignment Worksheet.docxTitleABC123 Version X1Week Two Assignment Worksheet.docx
TitleABC123 Version X1Week Two Assignment Worksheet.docxherthalearmont
 
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docxTitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docxherthalearmont
 
TitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docxTitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docxherthalearmont
 
TitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docxTitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docxherthalearmont
 
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docxTitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docxherthalearmont
 
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docxTitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docxherthalearmont
 
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docxTMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docxherthalearmont
 
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docxTL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docxherthalearmont
 
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docxTitle The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docxherthalearmont
 
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docxTitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docxherthalearmont
 
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docxTitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docxherthalearmont
 

More from herthalearmont (20)

TNEEL-NE Theoretical Perspectives Learning Activ.docx
TNEEL-NE Theoretical Perspectives   Learning Activ.docxTNEEL-NE Theoretical Perspectives   Learning Activ.docx
TNEEL-NE Theoretical Perspectives Learning Activ.docx
 
To Board of Directors of Reed Elsevier Plc.From Report.docx
To       Board of Directors of Reed Elsevier Plc.From   Report.docxTo       Board of Directors of Reed Elsevier Plc.From   Report.docx
To Board of Directors of Reed Elsevier Plc.From Report.docx
 
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docxTMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
 
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docxTitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
 
TitleAuthorSetting.docx
TitleAuthorSetting.docxTitleAuthorSetting.docx
TitleAuthorSetting.docx
 
TitleAJS504 Week 1 AssignmentName of StudentI.docx
TitleAJS504 Week 1 AssignmentName of StudentI.docxTitleAJS504 Week 1 AssignmentName of StudentI.docx
TitleAJS504 Week 1 AssignmentName of StudentI.docx
 
TitleABC123 Version X1Working in Diverse GroupsPSY.docx
TitleABC123 Version X1Working in Diverse GroupsPSY.docxTitleABC123 Version X1Working in Diverse GroupsPSY.docx
TitleABC123 Version X1Working in Diverse GroupsPSY.docx
 
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docxTitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
 
TitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxTitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docx
 
TitleABC123 Version X1Week Two Assignment Worksheet.docx
TitleABC123 Version X1Week Two Assignment Worksheet.docxTitleABC123 Version X1Week Two Assignment Worksheet.docx
TitleABC123 Version X1Week Two Assignment Worksheet.docx
 
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docxTitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
 
TitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docxTitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docx
 
TitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docxTitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docx
 
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docxTitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
 
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docxTitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
 
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docxTMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
 
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docxTL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
 
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docxTitle The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
 
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docxTitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
 
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docxTitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
 

Recently uploaded

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Title of PresentationStudent’s nameFeel free to adjust the c.docx

  • 1. Title of Presentation Student’s name Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation. 1 Introduction Includes The name of the student evaluated and the topic Also should detail the purpose and flow of the presentation Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation. ‹#› Format of Paper Evaluate the following three questions regarding the overall format of the paper. Were all required sections included? Were they clearly distinguished from one another? If not, were reasons given for not including some? Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation.
  • 2. ‹#› Historical Timeline and Predecessor Assessment Evaluation Assess the following three components as detailed on the Student Evaluation Form Sources Content Writing Skills Remember that graphics go a long way in a visual presentation. Add them to play up the visual appeal of this slide but be sure to cite them in proper APA format. Add additional slides as needed for this section. Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation. ‹#› Analysis of Impact Evaluation Assess the following three components as detailed on the Student Evaluation Form Sources Content Writing Skills Remember that graphics go a long way in a visual presentation. Add them to play up the visual appeal of this slide but be sure to cite them in proper APA format. Add additional slides as needed for this section. Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual
  • 3. presentation. ‹#› Ethical Considerations Evaluation Assess the following three components as detailed on the Student Evaluation Form Sources Content Writing Skills Remember that graphics go a long way in a visual presentation. Add them to play up the visual appeal of this slide but be sure to cite them in proper APA format. Add additional slides as needed for this section. Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation. ‹#› Concluding Remarks Summarize the areas of the writer's strengths and weakness as presented in your presentation and remember to always end on a positive note! Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation. ‹#›
  • 4. References Reference all sources used in completing this assignment. Remember that in-text citations are just as important in a presentation as they are in papers. The references listed here should be a list of what you have posted on your previous slides, including any images that you used, unless they are clipart. Feel free to adjust the color and scheme of this template. Color and design are recommended in an appealing visual presentation. ‹#› Should be at least 300 words. No paper format required Innovation, intrapreneurship, and creativity are closely related concepts and each is vital to building a knowledge-creating organization. Discuss the relationship among the three concepts. Describe the challenges for managing innovation, intrapreneurship, and creativity processes within an organization, and any ethical considerations that need to be taken into account when fostering innovation, intrapreneurship, and creativity. Which of the processes is (or are) most likely to be successful in the early phase of an organization’s life cycle. Why? Which of the processes is (or are) most likely to be successful in the growth phase of an organization’s life cycle? Why? PEER EVALUATION PRESENTATION ASSESSMENT FORM: TO BE USED TO EVALUATE YOUR TEAMMATE’S COURSE PAPER DIRECTIONS: 1. Please use this form to evaluate your assigned peer’s final
  • 5. research paper according to the criteria below. 2. Specific information should be supplied for each item; that is, do not simply answer Yes or No. 3. This form can be downloaded and expanded to allow space for your report. 4. This is a graded assignment. 1. Evaluate your assigned classmate’s paper according to the following instructions: FORMAT: a. Were all required sections included? b. Were they clearly distinguished from one another? c. If not, were reasons given for not including some? FOR EACH SECTION: SOURCES: d. Were in-text references used? e. Were they properly formatted? f. Were primary sources used? g. Were they formatted properly? h. Were sources from our textbook used? i. Were they formatted properly? j. Were the length requirements observed? CONTENT: k. Did the paper have a thesis and introduction? l. Was it clear to you? m. Did each section relate to the thesis? Evaluate by section. n. If any of the sections did not apply to the paper, was a reason given? o. Was some form of quantitative reasoning used? p. If so, did it apply to the thesis? q. Conclusion: did it accurately summarize the author’s argument? r. Was a Works Cited page included?
  • 6. s. Was it properly formatted? WRITING SKILLS: t. Evaluate the writing of the paper. The following includes all elements of writing: spelling, grammar, punctuation, sentence structure, and clarity of expression. 1. Excellent: Virtually error free 2. Very good: Very few insignificant errors 3. Good: Some errors; somewhat distracting 4. Fair: Significant number of writing errors; distracting 5. Poor: Unacceptable level of writing errors Impact of Bring Your Device (BYOD) at workplace 2 Final Research Report Aakash Patel DeVry University Technology Society and Culture Paul winters Impact of Bring Your Device (BYOD) at workplace
  • 7. Introduction BYOD is an information technology policy where employees are allowed to bring their personal devices to the workplace. Some of the devices include mobile phones, personal computers, and other handheld devices that are portable. The devices are then used to access company systems and data. Today, it's the desire of everybody to own a device such as a tablet which is considered convenient in the current setup. A device such as a table is similar to a mobile computer such as a laptop which is easier to carry and more discrete. It can also use 3G internet from most places, unlike a laptop. The only disadvantage of this technology is that it can't be put on your lap, and it has to be held in your hands. It's also difficult to keep the gadget with your hands and at the same time use the same hands to operate it. Touchscreen technology has emerged and has become more common currently than ever before. Almost every device today has this technology implemented in it be it a computer, a mobile phone, televisions or even DVD players. The technology has made it easier to work with these devices in our daily activities. However, the transition from the old version to this newly emergent technology has taken time and has been improving consistently from older versions (Jin, 2014). Several technologies have led to the emergence of the current technological advancement. Grid computing is among the major technologies that have led to this improvement. Grid computing, which is a form of distributed computing solves a problem by utilizing resources of several networked computers. It's recognized as the predecessor of the current cloud computing. Since time has been available and network workload has considerably decreased, Grid computing utilizes this downtime in combination with its computing power for purposes of scientific research, collaborative projects, etc. that need resources to attain their goals. This, at last, led to using specific
  • 8. software's including Globus Toolkit and Boinc so as to enjoy free resources on computers as well as share information to be processed by computers within the grid. This has improved computations and increased efficiency that has finally led to the current technology hike (Kranzberg & Pursell, 2015). Other than grid, computing, there are other related technologies with great impacts on the current world we are today. Distributed computing has provided possibilities of running applications on many computers at the same time. Moreover, utility computing as a business model allows resources including storage, computing among others to be provided and charged as well. These have led to the emergence of web services offering computing services dynamically on demand resulting in the evolution of web 2.0 to deliver services to all its users (Jones, 2012). These technologies have provided abstraction as well as isolation of lower functionality from the underlying hardware hence allowing portability and sharing of physical resources. These funds are made available to many clients within the same infrastructure making it possible to share data and remedies in multi-tenant architectures. Artificial intelligence has major impacts on the current technological advancement. For a long time, people have made software's and machines with human attributes which exhibit greater intelligence. These devices and software's have been capable of learning, reasoning, perception, planning, knowledge as well as understanding the natural language processing, as well as abilities to manipulate and move objects. This is among the major fields which have profoundly impact today's technological advancement in conjunction with robotics which is closely related to AI. This has led to technologies such as robots, space crafts among others (Jones, 2012). Ethical Consideration A detailed evaluation of the ethical considerations associated with the technology in relation to its impact on humanity
  • 9. Most people agree that technology is one of the most important aspects of human lives. With considerations of humanity and ethics, technology has a great impact. Humanity is the ability of human beings to reason and thinks before they involve in any form of action on anything. It is what separates human beings from machines like computers and robots, which are programmed to involve in a certain course of action and respond to certain situations. The impact that technology has is both positive and negative. To begin with, it is through education that people have managed to highly acquire education concerning ethics. Organizations that have demonstrated the need for ethics has been set up on technological grounds. A company like Apple Inc., for example, is among the many organizations that explain about the necessity of ethics in the workplace, and personal ethics of every individual and its total existence is mainly because of technological existence. Technology has therefore made a positive contribution towards ethics of human beings and promoted humanity. Technology, on the other hand, has also caused a great negative impact on humanity and ethics. To begin with, certain individuals like hackers, who have mastered numerous technological skills have been tempted by technology to commit crimes that are against humanity and ethical grounds and have made the decisions to involve in them. These involve the many inhuman terrorist actions that have taken place being aided by technology for efficiency. At the same time, it has also cause peoples’ everyday lives to change, simply because they expect perfection from other people like the machines that they work with all the time. It has depleted issues like patience, and thus some people expect other to respond to their demands and requirements immediately. Technology has therefore had both positive and negative effects on people’s humanity and ethics. An illustration of at least two specific ethical theories that differentiates their varying approaches in consideration of the questions raised by the selected technology
  • 10. There are many theories that technology has fully affected in a certain way. The figure below fully explains a number of these theories. As shown in the visual presentation, one of the ethical theories that technology has a great impact upon is the theory of virtual ethics. Virtual ethics is a form of guiding theories that explains that the behavior of an individual relies on certain virtues that they have and what they believe is right. Technology has changed the belief of people from what they used to be before. It has done this through its ability to enable people to socialize with others. When people view other individuals through certain platforms like social media, they acquire new virtual and beliefs. People, for example, might believe that dressing in a certain way is right, simply because they saw other individuals who might be practicing different cultures dressing similarly. The other theory that technology has affected is consequentialism. This theory as described in the visual presentation explains that the best action that an individual should involve in is the one that provides the greater good. With technology, however, people can involve in actions that affect areas that may be geographically far away from them, and do it in certain ways that the actions cannot be traced to them. When these individuals do not care much about others, therefore, they might involve in these forms of actions and believe that they are ethical since, despite the harm they may do to others, they would still benefit greatly from them (Broad, 2014). Benefits associated with the program Many businesses have had to keep up with the changing times and the IT departments struggle to keep up with changing technological advances. BYOD is part of an ongoing trend that involves IT based practices aimed at consumerism of technology. The proponents of BYOD term, it as productive as employees, can access mail at their convenience, therefore, reducing costs. However if it is not entirely understood it will
  • 11. threaten the security of the company putting it at risk. The following is an assessment of the significant benefits and concerns that are associated with the system. According to French, Guo and Shim, (2014) BYOD is thought to improve employee productivity and satisfaction as they are more likely to be comfortable when using their own devices. It has been noted that employees are always seeking flexible work options and the ability to work in remote areas. If they are allowed to use the same device that they use at home in the office then, it allows for an easy transition and therefore enhanced output and efficiency. It is noted that surveys taken in relevance to employees who use their own devices will feel more ownership over their work. The policy can be an incentive that brings about talent in the recruitment efforts. Companies that embrace BOYD are embraced more positively as they are thought to have a more innovative, agile and modern culture. Concerning operating costs, companies are more likely to adopt the policy as it drives the cost away from them. For example, the programs shift the costs to the users as workers pay for most of their voice and data services. A proper consideration is companies that have a lot of employees who cater for their individual data and voice call needs thus saving the company a lot of money that can be allocated elsewhere. Technology is also always changing and requires an upgrade from time to time. In a workplace where the employer has to take care of the upgrade, it would be costly for the enterprise. BOYD devices usually consist of cutting age devices unlike IT issued ones, therefore, allowing companies to reap benefits of modern technology. Companies that embraced the use of BOYD policy increase the engagement of workers both in the workplace and after hours. If the employees are likely to work outside the office, their responsiveness will be improved when they have the means to communicate outside the office. It means that they are more available to respond to emails, answer calls and even carry out daily tasks when outside the office. Despite these benefits,
  • 12. there are various matters that must be taken into consideration such as security of company information. In the mobile and communication world, security threats are imminent which means that BOYD can be disastrous (Lennon, 2012). Risks associated with BOYD According to Raths, (2012) there are significant risks associated with the policy and it is up to the IT departments to ensure that information does not end up with the wrong people. Therefore, security measures are called for when dealing with the remote devices. Surveys carried out extensive national show that many senior IT security and technology decision makers report serious security breaches and violations in relevance to personal mobile device use. Security threats are related to the end node problem where devices used by employees are also used for internet access. There might also be data breaches if an employee loses their phone and other un-trusted parties retrieve information and any unsecured data on the phone. There are also instances where an employee leaves a company and since the device is personally owned they leave with the data and company applications. There are also employees who sell their devices without taking time to wipe company data. Privacy fears Employees have privacy concerns that are entirely justified. Some of the BOYD policies provide employees with software that track their every move. Workers who agree to the BOYD program might find themselves accepting software installations done by the IT department. The programs might be used to monitor their device usage, collection of personal information. The IT department might be able to remove personal data from users’ devices. Most employees have raised concerns about access to contacts, facebook account data, installed applications and browser histories. Even when companies take time to separate personal and business data, there might be discovery requests especially when it comes to litigations. Cost to the employees and device disparities.
  • 13. As noted earlier on the costs of the BOYD are transferred to the employee. However, not everyone has a device that can be used in the program. It is therefore quite demanding when one is told that they should get a device such as an iPhone or a laptop. There are also risks such as damage to the device that can’t be attributed to the employer. In this case, the employees are not quite happy to shoulder the costs. It is also evident that when employees are allowed to select their own devices they might bring different devices with distinct capabilities. It 's hard for programmers to cover various platforms that are brought to work but more often they still manage to do so. It is, therefore, evident that various considerations have to be taken to ensure that the process is successful. If employees are more technologically driven and have high-quality devices hen, it might be good to adopt BOYD. Employees should also know the stand of the company especially when it comes to access to personal information. Legal matters are inevitable, and these matters are of concern to employees. Informing them in advance might serve well to increase their productivity and ensure protection of data (Ghosh et al., 2013). Conclusion BOYD policies have been very useful and practical when it comes to the benefits that are accrued. However, the threats to security and cost are a threat to the advancement of the program in the United States. Most companies that appreciated the method earlier on are now considering alternatives due to security breaches that have been experienced in the past. Employees are nowadays aware of security threats, and if more companies choose to take up the policy, it will be easier to protect data and information. Policy issues when implementing the program are imperative, and companies have to ensure that the right measures are taken to account. The significant technology developments seen today have undergone through several phases with slight changes in each step leading to the hi-tech world that we live in today. The old version technology has been critical to this development, and
  • 14. there is still room for more in the late future. Major Resources Vickerman, J. A. (2013). Bring your own device to work. Risk Management, 60(1), 38. This article clearly, elaborates the various aspects of work life balance of various employees, and how the various work dynamics are influencing the integration of both in work place. He illustrates this by using an analogy of an employee been restricted to use his or her phone at work and the impact it has on overall performance. In the current technological era, the phone has a dual purpose as it can be conveniently used to increase efficiency in task performance. Ballagas, R., Rohs, M., Sheridan, J. G., & Borchers, J. (2004, September). Byod: Bring your own device. In Proceedings of the Workshop on Ubiquitous Display Environments, Ubicomp (Vol. 2004). In this article, the writer looks at the changed sorts of client communications and arrangement issues encompassing extensive open presentations. He then chooses and build up a use worldview in which individuals use individual gadgets to collaborate with extensive open showcases. This clarifies the significance of telephones in buyer responsiveness. Gilbert, J., & Gilbert, J. B. (2012). Bring Your Own Device to Work. Employees of organizations large and small continue to “consumerism” the enterprise by adopting mobile technology and bringing it to the workplace. Many organizations have allowed employees to use personal smart phones for quite some time. But some are rethinking this idea by putting into consideration, research work on the continued use. Bradley, T. (2011). Pros and cons of bringing your own device to work. PC World, December 20 2011. In this article the writer gives an in-depth analysis of a worker taken with them a phone
  • 15. to their respective work station. This he says is important as they are able to concentrate more, as all situations that can occur, they can easily get updates. Although this helps them feel comfortable, it can interfere with their performance, if the phones are used during working hours. Representatives are increasingly liable to compose their own lives utilizing a brilliant phone. They convey this desire to the work environment and need to utilize their phones to arrange their work life as well. This aim is much of the time called Bring Your Own Device (BYOD) and is creating IT divisions some worry. Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M., & Steggles, P. (1999, September). Towards a better understanding of context and context-awareness. In Handheld and ubiquitous computing (pp. 304-307). Springer Berlin Heidelberg. The reason for this article is to analyse the variables that figure out if representatives take after Bring Your Own Device (BYOD) arrangements through the perspective of the Protection Motivation Theory. BYOD is quickly turning into the standard instead of the special case. Subsequently, firms are building up BYOD arrangements to address the danger intrinsic in permitting people to utilize their own gadgets to get to or store organization information. This paper reports the aftereffects of a study of bookkeeping understudies, non- bookkeeping understudies, and full-time workers. References Broad, C. (2014). Five types of ethical theory. London: Routledge. French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your own device (BYOD). Communications of the Association for Information Systems, 35(10), 191-197. Ghosh, A., Gajar, P. K., & Rai, S. (2013). Bring your own device (BYOD): Security risks and mitigating strategies.
  • 16. Journal of Global Research in Computer Science, 4(4), 62-70. Jin, Z. (2014). Global technological change: from hard technology to soft technology. Bristol, England; Portland: Intellect Books. Jones, S. (2012). Cybersociety 2.0: Revisiting computer- mediated community and Technology. Thousand Oaks: SAGE Publications. Kranzberg, M., & Pursell, C. W. (2015). Technology in Western Civilization. New York: Oxford Univ. Press. Lennon, R. G. (2012). Bring your own device (BYOD) with cloud 4 education. In Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity (pp. 171-180). ACM. Raths, D. (2012). Are You Ready for BYOD: Advice from the Trenches on How to Prepare Your Wireless Network for the Bring-Your-Own-Device Movement. THE Journal (Technological Horizons In Education), 39(4), 28.