SlideShare a Scribd company logo
1 of 45
IT for Management: On-Demand Strategies for Performance,
Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 4
Networks, Collaborative Technology, and The Internet of
Things
Smarthinking.
2
Copyright ©2018 John Wiley & Sons, Inc.
If you are having any issues
This is worth visiting
Smarthinking.
3
Copyright ©2018 John Wiley & Sons, Inc.
Smarthinking.
4
Copyright ©2018 John Wiley & Sons, Inc.
Smarthinking.
5
Copyright ©2018 John Wiley & Sons, Inc.
Smarthinking.
6
Copyright ©2018 John Wiley & Sons, Inc.
Smarthinking.
7
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
8
Copyright ©2018 John Wiley & Sons, Inc.
It appears some people do not realize where the rubrics for ea ch
assignment are
These are what I have to use to grade your work
Rubrics
9
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
10
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
11
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
12
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
13
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
14
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
15
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
16
Copyright ©2018 John Wiley & Sons, Inc.
Rubrics
17
Copyright ©2018 John Wiley & Sons, Inc.
Discussions
18
Copyright ©2018 John Wiley & Sons, Inc.
Academic Writing Standards
Discussion Board
Use Saudi Electronic University academic writing standards and
APA style guidelines
This is something we all have had to learn
That includes us Professors!
What many do not realize is that Microsoft have made it easy.
They include some very valuable referencing tools in their
program
The website includes images explaining exactly what to do
https://support.office.com/en-us/article/add-citations-in-a-word-
document-ab9322bb-a8d3-47f4-80c8-63c06779f127
Academic Writing Standards
Academic Writing Standards
Assignments for Module 4
Critical Thinking Assignment
Conduct research and write a paper on either mobile
technologies or the Internet of Things (IoT)
In your paper, address the following:
Briefly define the technology (collaborative technologies or IoT
technologies).
How and why are organizations applying this technology?
Identify and describe one real-world example.
What are the benefits of the technology to organizations?
For example, does the technology reduce costs?
Assignments for Module 4
How does the technology benefit the organization’s internal and
external users?
What are some challenges or potential problems of the
technology to the organization?
In your opinion, do the benefits outweigh these concerns?
Explain.
Your well-written report should be 4-5 pages in length, not
including the title and reference pages.
Check Your Understanding
5-10 multiple choice, true/false, fill in the blank questions, etc.
Learning Objectives (1 of 4)
24
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals Defined
A computer network is a set of computers connected together
for the purpose of sharing recourses.
25
Copyright ©2018 John Wiley & Sons, Inc.
Common Network
TypesAcronymTypeCharacteristicsExampleLANLocal Area
NetworkShort distance connection Office
School
HomeWANWide Area NetworkSpans large physical
distanceInternet
Large companyWLANWireless LANLAN based on Wi-Fi
technology
Internet
Large company
26
Copyright ©2018 John Wiley & Sons, Inc.
Common Network
TypesAcronymTypeCharacteristicsExampleLANLocal Area
NetworkShort distance connection Office
School
HomeWANWide Area NetworkSpans large physical
distanceInternet
Large companyWLANWireless LANLAN based on Wi-Fi
technology
Internet
Large company
27
Copyright ©2018 John Wiley & Sons, Inc.
Common Network
TypesAcronymTypeCharacteristicsExampleLANLocal Area
NetworkShort distance connection Office
School
HomeWANWide Area NetworkSpans large physical
distanceInternet
Large companyWLANWireless LANLAN based on Wi-Fi
technology
Internet
Large company
28
Copyright ©2018 John Wiley & Sons, Inc.
Common Network Types
29
Copyright ©2018 John Wiley & Sons, Inc.
There are many different types of network
They can be used for different purposes by different types of
people and organization
Here are some of the network types that you might come across:
Local Area Networks (LAN)
A local area network or LAN is a network that connects
computers within a limited area
This might be in a school, an office or even a home
Common Network Types
30
Copyright ©2018 John Wiley & Sons, Inc.
Personal Area Networks (PAN)
A personal area network is a network that is based on an
individual's workspace
The individual's device is the center of the network, with other
devices connected to it
There are also wireless personal area networks.
Home Area Networks (HAN)
A home area network connects devices within a home
environment
It might include personal computers, tablets, smartphones,
printers, TVs and other devices
Common Network Types
31
Copyright ©2018 John Wiley & Sons, Inc.
Wide Area Networks (WAN)
A wide area network is a network that covers a larger
geographical area, usually with a radius of more than a
kilometer
Campus Networks
A campus network is a LAN or set of connected LANs which is
used by a government agency, university, corporation or similar
organization
It is typically a network across a set of buildings that are close
together
Common Network Types
32
Copyright ©2018 John Wiley & Sons, Inc.
Metropolitan Area Networks (MAN)
Metropolitan area networks are networks that stretch across a
region the size of a metropolitan area
A MAN is a series of connected LANs in a city, which might
also connect to a WAN
Enterprise Private Networks
An enterprise private network is used by a company to connect
its various sites so that the different locations can share
resources
Common Network Types
33
Copyright ©2018 John Wiley & Sons, Inc.
Internetworks
Internetworks connect different networks together to build a
larger network
Internetworking is often used to describe building a large,
global network
Backbone Networks (BBN)
A backbone is a part of a network that connects different pieces
and provides a path for information to be exchanged.
Global Area Networks (GAN)
A global area network is a worldwide network that connects
networks all over the globe, such as the internet
Intranets, Extranets, and Virtual Private Networks
Intranets are used within a company for data access, sharing,
and collaboration
Extranets are private, company-owned networks that can be
logged into remotely via the Internet
Virtual Private Networks (VPNs) are used where security of
transmissions is a concern
They encrypt the packets before they are transferred over the
network
34
Copyright ©2018 John Wiley & Sons, Inc.
Virtual Private Networks
A virtual tunnel routed through the Internet with software and
hardware encryption.
35
Copyright ©2018 John Wiley & Sons, Inc.
35
Virtual Private Networks
A VPN provides the opportunity to establish a protected
network connection when using public networks
VPNs encrypt your internet traffic and disguise a person’s
online identity
This makes it more difficult for third parties to track activities
online and steal data
The encryption takes place in real time
They essentially create a data tunnel between a local network
and an exit node in another location
Which could be thousands of miles away
Making it seem as if the user is in another place
36
Copyright ©2018 John Wiley & Sons, Inc.
36
Virtual Private Networks
37
Copyright ©2018 John Wiley & Sons, Inc.
37
Virtual Private Networks
38
TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol)
38
Network Terminology
Modem: a device that modulates/demodulates signal for
transportation
Modulation and Coding: Techniques used by modem to adapt
the signal to the media
Signal: Binary information we want to send.
Signal Frequency Spectrum: All the frequency components of a
signal
Media Bandwidth: Limit in range of frequency signals
Capacity Bandwidth: Maximum bits per second that can be
transmitted
39
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
40
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
41
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
42
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
43
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
44
Copyright ©2018 John Wiley & Sons, Inc.
Quality of Service (QoS)
Latent-sensitivity: data such as real-time voice and high-quality
video.
Prioritized Traffic: data and apps that are time-delay-sensitive
or latency-sensitive apps.
Throttle Traffic: gives latency-sensitive apps priority, other
types of traffic need to be held back (throttled).
Traffic Shaping: the ability to prioritize and throttle network
traffic.
45
Copyright ©2018 John Wiley & Sons, Inc.
The Net Neutrality Debate
Net neutrality is the principle that Internet Service Providers
(ISPs) and their regulators treat all Internet traffic the same
way.
Traffic shaping prioritizes the flow of traffic by delaying the
flow of less important network traffic.
In 2010, the FCC ruled in favor of “net semi-neutrality”, not
explicitly forbidding paid prioritization.
The FCC under the current administration may take further
steps to roll back net neutrality rulings, which could favor the
cable companies over consumers.
46
Copyright ©2018 John Wiley & Sons, Inc.
The Net Neutrality Debate
47
Copyright ©2018 John Wiley & Sons, Inc.
What is net neutrality and how could it affect you?
https://www.youtube.com/watch?v=zq-2Yk5OgKc
Network Fundamentals
Name different types of networks
Local Area Network (LAN)
Wide Area Network (WAN)
Wireless Local Area Network (WLAN)
Metropolitan Network (MAN)
Storage Area Network (SAN)
Campus Area Network/Cluster Area Network (CAN)
Personal Area Network (PAN)
48
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
48
Network Fundamentals
What is meant by “bandwidth”?
Bandwidth refers to the limitation in the range of frequency
signals that can move through media without significant
attenuation
The bandwidth of the media varies by type
Which is limited and typically can’t accept the entire signals
frequency spectrum
The range of frequencies that can move through the media
without significant attenuation is called bandwidth and it is also
measured in hertz
49
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
49
Network Fundamentals
What is the difference between an intranet and an extranet?
Intranets are used within a company for data access, sharing,
and collaboration
They are portals or gate-ways that provide easy and inexpensive
browsing and search capabilities
An extranet is a private, company-owned network that can be
logged into remotely via the Internet
Typical users are suppliers, vendors, partners, or customers.
Basically, an extranet is a network that connects two or more
companies so they can securely share information
50
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
50
Network Fundamentals
How does a virtual private network (VPN) provide security?
Virtual private networks (VPNs) provide security by encrypting
the packets before they are transferred over the network
In effect, instead of using a leased line to create a dedicated,
physical connection
A company can invest in VPN technology to create virtual
connections routed through the Internet from the company’s
private network to the remote site or employee
51
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
51
Network Fundamentals
What is the purpose of a modem?
A modem is a device used to adapt/modify the information
signals in a way that can be transported by the media
The word modem is composed of two terms: Modulator and
Demodulator
The Modulator adapts the information signal in order to be
transported by the media
The Demodulator does the inverse process at reception
Digital Modems are called “CSU/DSU” (Channel Service
Unit/Data Service Units)
52
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
52
Network Fundamentals
Describe the basic functions of business networks
The basic business functions supported by business networks
are
Communication
Mobility
Collaboration
Relationships
Search
53
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network.
Bandwidth is the amount of data that passes through a network
connection over time as measured in bits per second (bps). For
an analogy to bandwidth, consider a pipe used to transport
water. The larger the diameter of the pipe, the greater the
throughput (volume) of water that flows through it and the
faster water is transferred through it.
3. Intranets are used within a company for data access, sharing,
and collaboration.
An extranet is a private, company-owned network that can be
accessed remotely via the Internet. It connects two or more
companies, suppliers, vendors, partners, or customers, so they
can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets
before they are transferred over the network and decrypt at the
receiving end.
5. A modem is a device designed to adapt/modify the
information signals in a way that can be transport-ed by the
media. The word modem is composed of two terms: Modulator
and Demodulator, the Modulator adapts the information signal
in order to be transported by the media and the Demodulator
does the inverse process at reception.
6. Business networks support basic functions including:
communication, mobility, collaboration, relationships, and
search.
Communication: Provides sufficient capacity for human and
machine generated transmissions, such as being able to talk,
text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any
mobile device anywhere at satisfactory download (DL) and
upload (UL) speeds.
Collaboration: Supports teamwork activities that may be
synchronous or asynchronous; brain storming; and knowledge
and document sharing.
Relationships: Manages interaction with customers, supply
chain partners, shareholders, employees, regulatory agencies,
etc.
Search: Able to locate data, contracts, documents, spreadsheets,
and other knowledge within an organization easily and
efficiently.
7. Investments in network infrastructure, including data
networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity,
security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive
or latency-sensitive apps, such as voice and video, are given
priority on the network.
• Throttle traffic: In order to give latency-sensitive apps
priority, other types of traffic need to be held back (throttled).
53
Network Fundamentals
How do investments in network infrastructure impact an
organization?
Investments in network infrastructure, including data networks,
IP addresses, routers, and switches are business decisions
Because of their impact on productivity, security, user
experiences, and customer service
54
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN,
MAN. SAN, CAN, PAN.
2. Bandwidth is the communication …
Running head: ANNOTATED BIBLIOGRAPHY
1
6
ANNOTATED BIBLIOGRAPHY
Annotated bibliography
Introduction
PICOT question:
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXX
Annotated Bibliography
1. Ann, M. H., Davis, A., & Glowatz, T. (2015). Development
of a diabetes learning needs assessment tool to promote an
individualized predischarge patient education plan. The Journal
of Continuing Education in Nursing, 46(11), 484-486.
doi:http://dx.doi.org/10.3928/00220124-20151020-12
The purpose of this artic le is to motivate nurses’ staff to
empower patient to improve their understanding of their
diabetes management. The article emphasizes the importance of
the knowledge and successful glycemic control in diabetic
patients. Therefore, Authors promote the necessity of implement
a pre-discharge patient education plan to identify and address
the knowledge and skill needed for diabetic patients after
discharge. The pre-discharge need assessment consist in several
questions that the nurse can ask to patient such us: What
medication do you take? Do you know how to administer
correctly those medications? Are you in insulin? Do you how to
how to drawing it up and injecting it? Do you know what A1C
is? Etc. The experiment was done to 44 diabetes patients. The
need assessment was used in the admission and in discharge
day. Nurses used the data collected to select appropriate
learning materials and used them to reinforce the patients’
knowledge. As a result, the diabetic education increased in from
36% to 63% in five months. The documentation of diabetes
education also increased because nurses understood the
importance of the education in diabetic patients.
2. Blackman, N. (2008). The development of an assessment tool
for the bereavement needs of people with learning disabilities.
British Journal Of Learning Disabilities, 36(3), 165-170.
Retrieved from:
http://search.ebscohost.com/login.aspx?direct=true&db=tfh&AN
=33863849&site=ehost-live
The aim of this article is the development of a bereavement
needs assessment tool to assess the need for crisis intervention
for people with learning disabilities after a family death. With
the assessment tools, health professionals can make a
comprehensive assessment at the bereavement time to discover
the problem and a plan can be put it in action. The tool was
developed with the recompilation of several collected
experience over the years of supporting grieving people with
learning disabilities. The assessment tool has ten questions wi th
sub- questions. The main points of the assessment are the
practical issues, social issues, and emotional issues. The
assessment tool has been tried out in three community teams
and their results are being used to redefine the tool. The author
will incorporate findings from research results to the assessment
tool to refine the bereavement assessment. The used of the
bereavement assessment toll will promote discussion and
reflection among health care providers about losses in people
with learning disability.
3. Ewing, G., & Grande, G. (2013). Development of a carer
support needs assessment tool (CSNAT) for end-of-life care
practice at home: A qualitative study. Palliative Medicine,
27(3), 244-56. doi:http://dx.doi.org/10.1177/0269216312440607
The authors of this article recognized the need to assess and
support the care givers that are providing end- of – life care to
help them in their caring role. The purpose of this article is to
collect care givers’ perception of key aspects of end of life care
at home and to create a need assessment tool that can be used
every day. A qualitative research method was done. Seventy
five adult care givers for hospice patients we interviewed in the
United Kingdom. They were divided in nine focus groups.
Twenty two participants had private interviews no more than ten
minutes in duration. All participants sing their informed consent
before the experiment started. The assessment tool used
evaluated 14 domains of support needs within physical,
practical, social, financial, physiological, and spiritual needs
that the care givers may have. The experimental study identified
two brad groups of support that the care givers need. The first
one was to enable them to care for their relatives and the second
one to have more support for them. The Carer Support Needs
Assessment Tool that was used in this research is an evidence
based toll to measure the care givers support needs.
4. Jenkins, J. O. (2010). A multi-faceted formative assessment
approach: better recognizing the learning needs of students.
Assessment & Evaluation In Higher Education, 35(5), 565-
576.Retrieved from:
http://search.ebscohost.com/login.aspx?direct=true&db=tfh&AN
=53155623&site=ehost-live
The purpose of this article is to create a multi-faceted formative
assessment that enabled student to be more engage in the
assessment process. The assessment will better meet the
students’ learning and assessment needs. The approaches in this
article put the students in the center of the learning experience
to improve students understanding the assessment. The
multifaceted formative assessment had six initiatives: (1) The
creation of subject specific reader that present more clearly the
purpose of the assessment, (2) The assessment was refocused
depend on the hours involved and not in the number of words
that it has, (3) The amount of assignment was reduced, (4) The
assessment had detailed guidance notes to help creating an
effective self-study environment, (4) an assignment tutorial was
created to facilitate discussion of the assignment to improve
learning, and (6) an E-learning environment was introduced to
enhance the assignment submissions and comments that will
help in the assessment’s formative process. The results of the
assessment were done by reading and analyzing the students’
feedback and perceptions of the assessment process. The results
of this study indicate that the development of a module reader
was useful for the students to be engaged with the subject being
studied. It also shown that the assignment tutorial and guidance
note helped them to be more engage with the assessment.
Therefore, the author of this article recommends that other
subjects use the readers, assignment –based tutorials and the
guidance note to help the student with their learning process
5. Kamaraj, D. C., Dicianno, B. E., & Cooper, R. A. (2014). A
participatory approach to develop the power mobility screening
tool and the power mobility clinical driving assessment tool.
BioMed Research International,
doi:http://dx.doi.org/10.1155/2014/541614
The development of evidence based training protocol for
electric powered wheelchair users such us disability persons has
been a challenge because of a lack of standardized assessment
toll. The purpose of this article is to develop the Power
Mobility Screening Tool (PMST) and the Power Mobility
Clinical Driving Assessment (PMCDA). The research method
was a qualitative participatory research. The research was done
an approved by the University of Pittsburgh’s Institutional.
Twenty one participants were agreed to participate in the
surveys and in the focus groups phases of the research. In the
process, there were two surveys to create a list of items that
will be including in the PMST and in the PMCDA. The
participants rank, in the surveys, each of the screening tests in
order of importance. After the survey was done, he participant
were invited to participate in a focus group in which they
discuss two sections the screen tool and the assessment tool.
The results of this research realized tree standards that need to
be fallow in the creation of the assessments. First, the goal of
the PMCDA should toward improving mobility and
independence of individual with disability rather than improve
the access to the wheel chair. Second, the goal should be
measurable so can identify progress with training. Third, the
measurement should be able to recognized areas in which
trainings should improve. Because this research was done with a
small sample group, authors subject that further testing is
needed to evaluate the effectivity of administrating these tools
in clinical environment
6. Macan, T., Konczak, L., & Breaugh, J. (2013). At your
service: Blending science and practice to develop a customer
service assessment tool. Applied H.R.M.Research, 13(1), 24-36.
Retrieved from
http://search.proquest.com/docview/1448424808?accountid=458
This article describes specific strategies and factors that can be
utilized to achieve the high quality customer services oriented
in an organization. This article explains a detail a project that
involves the development of a customer service oriented paper
and pencil assessment. The purpose of this article was to share
different approaches to be considered in order to achieve high
quality services. The article included five practical challenges
that the organizations can face in this project. Those challenges
explain were (1) Cost effectiveness and administrative
efficiency,(2) Get the attention to the stakeholders, (3)Diversity
of the applicants, (4) Balance statistic and practical
significance, and (5) Gather multiple forms of validity
evidence. The authors created an assessment tools taking into
consideration those five challenge. They created an assessment
tool to measure employee performance for part time positions.
The assessment tool has 27 items that can be done in ten
minutes and it is ease to score by hand. The assessment tool was
made by taking into consideration age and race diversity of the
applicants. The assessment is ease to read with the fifth grade
reading level. The authors highlight the necessity of doing more
researchers to provide more evidence for using the different
approaches used in the study to have better strategies in
implementing an innovative and scientific assessment measures.
Running head: CENTRAL LINE INFECTIONS 1
CENTRAL LINE INFECTIONS 2
Infection associated with Centrals lines
Infection Associated with Centrals Lines
Central line-associated bloodstream infection is one of serious
infection that takes place germs commonly bacteria and viruses
penetrate bloodstream via the central line. The infection causes
millions of deaths every year despite the infections being
preventable. The central line gets infected when contaminated
catheter devices especially before the insertion, contaminated
infusate, and contaminated catheter hub are used (Kirk, 2018).
Skin organisms are also named as the cause of the infection.
The central line of the patient gets infected when the virus or
bacteria or other related germs enter into the bloodstream
causing serious infections. Central line infection may become
serious but can be successfully treated by health workers. The
common central lines that are commonly infected are “Femoral
central venous catheters”.
Most infections occur when doctors put the central line also
called a central venous catheter in a large vein found in the
neck, groin, chest, or arm so that to provide blood, other fluids,
or medication in the areas. The insertion of the central venous
catheters may not effective and therefore causing catheter
malfunction, thrombosis or central vein stenosis, and other
catheter-associated infections (Kuriakose, 2020). The common
risks that have been found to increase central line infection
include ICU placement of the central nervous catheter, the
existence of the nonoperative cardiovascular illness, and the
existence of the gastrostomy tube in the veins.
Problem Statement
The central line-associated bloodstream infections are
regarded as the most lethal-hospital acquired disorder impacting
high costs to health care institutions approximately $ 46 000 in
every infection and causing a mortality rate of 18%. The health
care institutions have noticed that when patients are infected
with CLABSI, the number of days to 12 weeks is extended as
well as the antibiotics to improve the situation of the patients.
The infections of central lines in hospitals do not only affect the
reimbursement but also create a negative perception of the
hospitals and therefore training is required for the ICU nurses
within one week (Tan et al. 2017). The hospital-acquired rates
of infections are alarming hence there is need for training of
ICU nurses or medics through establishing a compelling
program that will help nurses remedy the situation. Preventing
hospital-acquired CLABSI will improve the quality of care and
enhance patient wellness. There is a need for quality
interventions to be conducted to attain the goal of high infection
of the central line and reduce the number of days taken in the
ICU unit.
PICOT Question
It is unknown the application of an educational program to ICU
nurses about central line management. Will improve central line
infection rate compared with the infection rate before the
teaching within12 week?
The ICU nurses play a vital role in proper maintaining of the
central lines hence preventing the development of the CLABSI.
The ICU nurses have more access to central lines daily when
offering services as blood draws, medication administration as
well as delivery of parenteral nutrition to the affected
individuals. It is very critical for ICU nurses as the population
of interest to be much aware of evidence-based interventions
both the current and past to optimize the process of maintaining
central lines and prevent infections (Ayala, 2019). ICU nurses
should be trained for twelve weeks to improve service delivery
that will help reduce the number of infections. Nurses should be
equipped well enough to make them determined to offer quality
and effective nursing services that will reduce the high cost and
the lengths of care taken by the patients in the hospital. ICU
nurses are one of the key components in the treatments of
central line infections and should be equipped with adequate
skills and knowledge through training. Implementing effective-
based interventions in the field of nursing care especially in the
occurrence of CLABSI will help to decrease the instances of
infections among people. ICU nurse is the population of
interest that can be improved and reduce the mortality and
infections of CLABSI in hospital-based settings through
competent nursing interventions.
Intervention of Interests
Training of ICU nurses is the key intervention used in this
project to reduce infection of central lines. Training of ICU
nurses within 12 weeks on how to manage and reduce the
incidences of the infection was conducted based on nursing
evidence-based approaches seeking to equip ICU nurses with
sufficient knowledge of reducing the incidence associated with
causing central line infections. Preventing the introduction of
bacteria and viruses (microorganisms) to the central lines which
take place in hospitals is the most key area the training focused
on to control CLABSI. The efforts of preventing central line
infections lie in the hand of nurses because they are the ones
mandated for the routine care and maintenance of the central
lines (Kuriakose, 2020). The actions and compliance of the
nurses depicting the best evidence-based practices depicted a
direct impact on patient outcomes. The intervention required
the ICU nurses to strictly adhere to intervention measures of not
introducing microorganisms in central lines. Putting more effort
into the insertion and post-insertion maintenance should be well
monitored and evaluated by nursing professionals through
training because they are the major processes that cause risks of
infections.
The interventions through training purposed to analyze the
intrinsic and extrinsic factors to have a better understanding of
the disease considering the age, patient’s gender, or other
underlying conditions of the patients because they are the main
clients served by ICU nurses on matters relating to central lines.
The training also intervened and articulated conditions that lead
to –prolonged hospitalization before the process of insertion is
enacted. The education on the use of Chlorhexidine gluconate
(CHG) was emphasized (antiseptic solution) due to its ability to
possess wide spectrum activity that reacts against bacteria,
viruses, and other microorganisms that are to the central line-
associated bloodstream infections (Lacerna, 2020).
The use of CHG helps to prevent CLABSI, especially on the
skin. Other evidence-based steps that the training as the
intervention addressed for CLABSI prevention include the use
of the appropriate hand hygiene during and after central line
insertion, use of "chlorhexidine” for skin preparation, stopping
using the "femoral vein” by the ICU nurses for catheters
especially in adult patients, removing catheters that are
considered unnecessary and lastly utilizing full barrier
precautions or warnings during the insertion process of the
central venous catheter (Moore, 2016).
Comparison
The central line-associated bloodstream infections rate will
have analyzed and concluded after the interventions that involve
training of ICU nurses and making a comparison with the
outcomes or results obtained before starting the training and at
the end of the 12 weeks where will evaluated the knowledge of
nurses. The outcome of this alternative intervention will better
outcomes in preventing central line-associated bloodstream
infection.
Outcome
The training process aims to reduce the baseline incidences of
CLABSI, according to Taylor et al. (2017) are 40/1000 days of
central line, after the training of ICU nurses, it is expected that
there will be a significant reduction. Likewise, it is intended to
reduce the incidence of central line-based bloodstream
infections, showing the positive impact of training in the effort
to prevent or reduce central line infections that occur in the
hospital environment.
Approximately 98 ICU nurses (sample convenience) will be
used in the project. At the end of the 12 weeks of training for
ICU nurses, a maximum reduction of 50% in CLABSI is
expected after the adoption of prevention measures, compared
to starting the training. CLABSI rates tend to vary from
healthcare to healthcare based on facilities (Kirk, 2018).
Therefore, reduction in the costs of post-training care is also
expected. Likewise, it is expected to take into account
associated factors such as limited space between beds, shor tage
of ICU nursing staff, little knowledge and training of hospital
institutions for health personnel, incomplete documentation,
among other possible reasons that are also intended. identify
before the 12 week training is completed.
Time
The period taken for the interventions listed above to achieve an
outcome is 12 weeks. The training of ICU nurses to achieve the
intended purpose of reducing the infection incidences of central
lines was completed at the end of the twelve weeks. This
stipulated time allowed ICU nurses to be equipped with
sufficient knowledge that aimed to influence patients positively.
Conclusion
The intensive education through training sessions with the
response originating from ICU nurses over 12 weeks led to the
significant improvement of matters about central line-associated
bloodstream infections. The recollection of data in phase three
of the training reaffirmed the significance and role of education
in reducing infection incidences. During the project, it was
found that high adherence to the “CL bundle intervention’’
adopted through training of ICU seemed to correlate positively
to the reduction of central line infections in the ICU (Taylor et
al. 2017). The study reveals that data from NHSN was more
comprehensive as well as an effective benchmarking tool that
established comparison to INICC as it tries to represent or
depict those countries developing surveillance systems. More
studies on projects should be conducted to formulate or design
the national policy that can be used to benchmark the
surveillance outcome of proposed devices or tools that are
associated with infections of central lines in ICU.
References
Ayala, J. L. (2019). Development and Evaluation of a Nurse
Leader-Directed Compliance Coach Program to Improve Central
Line Maintenance. Wilmington University (Delaware).
Kuriakose, L. (2020). Decreasing Central Line-Associated
Bloodstream Infection Through Limiting the Use of Central
Venous Catheters for Routine Blood Draws. Journal of Doctoral
Nursing Practice.
Moore, M. A. (2016). Evaluation of Central Line Insertion
Bundle Practices in a Trauma/Surgical Intensive Care Unit.
Kirk, M. P. H. (2018). Healthy Work Environment Improves
Nurse-Sensitive Patient Outcomes (Doctoral dissertation, Grand
Canyon University).
Lacerna, C. (2020). Application of Sustainability Framework for
Quality Improvement in an Integrated Health System.
Taylor, J. E., McDonald, S. J., Earnest, A., Buttery, J.,
Fusinato, B., Hovenden, S., ... & Tan, K. (2017). A quality
improvement initiative to reduce central line infection in
neonates using checklists. European journal of
pediatrics, 176(5), 639-646.

More Related Content

What's hot

Corporate Profile
Corporate ProfileCorporate Profile
Corporate ProfileBen Livson
 
Atos dig. transformation
Atos dig. transformationAtos dig. transformation
Atos dig. transformationTamir Taha
 
Company Profile - IPSCo (IT)
Company Profile - IPSCo (IT)Company Profile - IPSCo (IT)
Company Profile - IPSCo (IT)hishamserry
 
Connecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian ExperienceConnecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian ExperienceTata Communications
 
Ulwando Communication Solutions Profile
Ulwando Communication Solutions ProfileUlwando Communication Solutions Profile
Ulwando Communication Solutions ProfileLanga Nyati
 
Company summary for research in motion limited
Company summary for research in motion limitedCompany summary for research in motion limited
Company summary for research in motion limitedamitdj1012
 
Tokio marine success story
Tokio marine success storyTokio marine success story
Tokio marine success storyCorticon
 
Strategic Management - Mphasis (IT Company)
Strategic Management - Mphasis (IT Company)Strategic Management - Mphasis (IT Company)
Strategic Management - Mphasis (IT Company)Ronak Shah
 
Software and services
Software and servicesSoftware and services
Software and servicesShare Trading
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalKhiro Mishra
 
What Comes after ERP?
What Comes after ERP?What Comes after ERP?
What Comes after ERP?SAP Ariba
 
What Comes after ERP?
What Comes after ERP?What Comes after ERP?
What Comes after ERP?SAP Ariba
 
Intersil corporation final
Intersil corporation finalIntersil corporation final
Intersil corporation finalMahenderjiS
 
Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...
Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...
Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...white paper
 

What's hot (20)

Corporate Profile
Corporate ProfileCorporate Profile
Corporate Profile
 
Atos dig. transformation
Atos dig. transformationAtos dig. transformation
Atos dig. transformation
 
Company Profile - IPSCo (IT)
Company Profile - IPSCo (IT)Company Profile - IPSCo (IT)
Company Profile - IPSCo (IT)
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Enterprise 2.0 General
Enterprise 2.0 GeneralEnterprise 2.0 General
Enterprise 2.0 General
 
Connecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian ExperienceConnecting a Continent With 802.16d - The Indian Experience
Connecting a Continent With 802.16d - The Indian Experience
 
#TFT14 Mark Smalley, My Favorite IT Paradigms
#TFT14 Mark Smalley, My Favorite IT Paradigms#TFT14 Mark Smalley, My Favorite IT Paradigms
#TFT14 Mark Smalley, My Favorite IT Paradigms
 
Ulwando Communication Solutions Profile
Ulwando Communication Solutions ProfileUlwando Communication Solutions Profile
Ulwando Communication Solutions Profile
 
Company summary for research in motion limited
Company summary for research in motion limitedCompany summary for research in motion limited
Company summary for research in motion limited
 
Total Network Solutions
Total Network SolutionsTotal Network Solutions
Total Network Solutions
 
4G readiness index, fitce workshop 2010
4G readiness index, fitce workshop 20104G readiness index, fitce workshop 2010
4G readiness index, fitce workshop 2010
 
Tokio marine success story
Tokio marine success storyTokio marine success story
Tokio marine success story
 
#TFT12: Mark Smalley
#TFT12: Mark Smalley#TFT12: Mark Smalley
#TFT12: Mark Smalley
 
Strategic Management - Mphasis (IT Company)
Strategic Management - Mphasis (IT Company)Strategic Management - Mphasis (IT Company)
Strategic Management - Mphasis (IT Company)
 
Software and services
Software and servicesSoftware and services
Software and services
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_final
 
What Comes after ERP?
What Comes after ERP?What Comes after ERP?
What Comes after ERP?
 
What Comes after ERP?
What Comes after ERP?What Comes after ERP?
What Comes after ERP?
 
Intersil corporation final
Intersil corporation finalIntersil corporation final
Intersil corporation final
 
Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...
Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...
Achieving Compliance and Control of Software-as-a-Service and Cloud-Based App...
 

Similar to It for management on demand strategies for performance, growth,

Overview of telecommunications and network
Overview of telecommunications and networkOverview of telecommunications and network
Overview of telecommunications and networkAnkush Mehrotra
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyJennifer York
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Laurie Lamberth
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015bmcmenemy
 

Similar to It for management on demand strategies for performance, growth, (20)

Week 6
Week 6Week 6
Week 6
 
Chapter 04 it-8ed-volonino
Chapter 04 it-8ed-voloninoChapter 04 it-8ed-volonino
Chapter 04 it-8ed-volonino
 
Tg05
Tg05Tg05
Tg05
 
Tg05
Tg05Tg05
Tg05
 
Overview of telecommunications and network
Overview of telecommunications and networkOverview of telecommunications and network
Overview of telecommunications and network
 
Class module 4- itm
Class module 4- itmClass module 4- itm
Class module 4- itm
 
Mis 2
Mis 2Mis 2
Mis 2
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our Society
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
 
Internet
InternetInternet
Internet
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
6 sop
6 sop6 sop
6 sop
 

More from ssuserd93c47

Macy’s, inc.—2018 david, f. r., david, f. r., & david, m. e. (
Macy’s, inc.—2018   david, f. r., david, f. r., & david, m. e. (Macy’s, inc.—2018   david, f. r., david, f. r., & david, m. e. (
Macy’s, inc.—2018 david, f. r., david, f. r., & david, m. e. (ssuserd93c47
 
Level 2—permission level 2 is based entirely on relationships.
Level 2—permission level 2 is based entirely on relationships. Level 2—permission level 2 is based entirely on relationships.
Level 2—permission level 2 is based entirely on relationships. ssuserd93c47
 
Lecture 6 hello everyone. welcome back to lh 4430, history of
Lecture 6 hello everyone. welcome back to lh 4430, history ofLecture 6 hello everyone. welcome back to lh 4430, history of
Lecture 6 hello everyone. welcome back to lh 4430, history ofssuserd93c47
 
Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013). Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013). ssuserd93c47
 
Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).ssuserd93c47
 
Learning resources note to access this module’s required libra
Learning resources note to access this module’s required libraLearning resources note to access this module’s required libra
Learning resources note to access this module’s required librassuserd93c47
 
Last name 1 last name 1namemy nameclassdateth
Last name 1 last name 1namemy nameclassdatethLast name 1 last name 1namemy nameclassdateth
Last name 1 last name 1namemy nameclassdatethssuserd93c47
 
June 2013 (122) mis quarterly executive 65 misq uarterl
June 2013 (122)  mis quarterly executive   65 misq uarterlJune 2013 (122)  mis quarterly executive   65 misq uarterl
June 2013 (122) mis quarterly executive 65 misq uarterlssuserd93c47
 
James c. schwab, editor hazard mitigation integrating be
James c. schwab, editor hazard mitigation integrating beJames c. schwab, editor hazard mitigation integrating be
James c. schwab, editor hazard mitigation integrating bessuserd93c47
 
Its 531 – business intelligence research project you are team of
Its 531 – business intelligence research project you are team of Its 531 – business intelligence research project you are team of
Its 531 – business intelligence research project you are team of ssuserd93c47
 
Ism3230 in class lab module 3 – working with strings and strin
Ism3230 in class lab module 3 – working with strings and strinIsm3230 in class lab module 3 – working with strings and strin
Ism3230 in class lab module 3 – working with strings and strinssuserd93c47
 
Introduction to macroeconomics 1 page 2 of 2 introduction to m
Introduction to macroeconomics 1 page 2 of 2 introduction to mIntroduction to macroeconomics 1 page 2 of 2 introduction to m
Introduction to macroeconomics 1 page 2 of 2 introduction to mssuserd93c47
 
Intl esay essaycomplete the midterm exam by composing a 6–8 pg.
Intl esay essaycomplete the midterm exam by composing a 6–8 pg.Intl esay essaycomplete the midterm exam by composing a 6–8 pg.
Intl esay essaycomplete the midterm exam by composing a 6–8 pg.ssuserd93c47
 
Interpersonal communication questions1. what is plain speech wh
Interpersonal communication questions1. what is plain speech whInterpersonal communication questions1. what is plain speech wh
Interpersonal communication questions1. what is plain speech whssuserd93c47
 
Interdisciplinary care plan7 class nur3400
Interdisciplinary care plan7 class nur3400Interdisciplinary care plan7 class nur3400
Interdisciplinary care plan7 class nur3400ssuserd93c47
 
Int 220 module six assignment conference call invitation templat
Int 220 module six assignment conference call invitation templatInt 220 module six assignment conference call invitation templat
Int 220 module six assignment conference call invitation templatssuserd93c47
 
Instructions recently, you have noticed a change in the way your
Instructions recently, you have noticed a change in the way your Instructions recently, you have noticed a change in the way your
Instructions recently, you have noticed a change in the way your ssuserd93c47
 
Instructions for this unit vi assignment, continue with the indus
Instructions for this unit vi assignment, continue with the indusInstructions for this unit vi assignment, continue with the indus
Instructions for this unit vi assignment, continue with the indusssuserd93c47
 
Instructions be advised, the template workbooks and worksheets are
Instructions be advised, the template workbooks and worksheets are Instructions be advised, the template workbooks and worksheets are
Instructions be advised, the template workbooks and worksheets are ssuserd93c47
 
Instructions· replace placeholder text with your text· your ou
Instructions· replace placeholder text with your text· your ouInstructions· replace placeholder text with your text· your ou
Instructions· replace placeholder text with your text· your oussuserd93c47
 

More from ssuserd93c47 (20)

Macy’s, inc.—2018 david, f. r., david, f. r., & david, m. e. (
Macy’s, inc.—2018   david, f. r., david, f. r., & david, m. e. (Macy’s, inc.—2018   david, f. r., david, f. r., & david, m. e. (
Macy’s, inc.—2018 david, f. r., david, f. r., & david, m. e. (
 
Level 2—permission level 2 is based entirely on relationships.
Level 2—permission level 2 is based entirely on relationships. Level 2—permission level 2 is based entirely on relationships.
Level 2—permission level 2 is based entirely on relationships.
 
Lecture 6 hello everyone. welcome back to lh 4430, history of
Lecture 6 hello everyone. welcome back to lh 4430, history ofLecture 6 hello everyone. welcome back to lh 4430, history of
Lecture 6 hello everyone. welcome back to lh 4430, history of
 
Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013). Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013).
 
Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).
 
Learning resources note to access this module’s required libra
Learning resources note to access this module’s required libraLearning resources note to access this module’s required libra
Learning resources note to access this module’s required libra
 
Last name 1 last name 1namemy nameclassdateth
Last name 1 last name 1namemy nameclassdatethLast name 1 last name 1namemy nameclassdateth
Last name 1 last name 1namemy nameclassdateth
 
June 2013 (122) mis quarterly executive 65 misq uarterl
June 2013 (122)  mis quarterly executive   65 misq uarterlJune 2013 (122)  mis quarterly executive   65 misq uarterl
June 2013 (122) mis quarterly executive 65 misq uarterl
 
James c. schwab, editor hazard mitigation integrating be
James c. schwab, editor hazard mitigation integrating beJames c. schwab, editor hazard mitigation integrating be
James c. schwab, editor hazard mitigation integrating be
 
Its 531 – business intelligence research project you are team of
Its 531 – business intelligence research project you are team of Its 531 – business intelligence research project you are team of
Its 531 – business intelligence research project you are team of
 
Ism3230 in class lab module 3 – working with strings and strin
Ism3230 in class lab module 3 – working with strings and strinIsm3230 in class lab module 3 – working with strings and strin
Ism3230 in class lab module 3 – working with strings and strin
 
Introduction to macroeconomics 1 page 2 of 2 introduction to m
Introduction to macroeconomics 1 page 2 of 2 introduction to mIntroduction to macroeconomics 1 page 2 of 2 introduction to m
Introduction to macroeconomics 1 page 2 of 2 introduction to m
 
Intl esay essaycomplete the midterm exam by composing a 6–8 pg.
Intl esay essaycomplete the midterm exam by composing a 6–8 pg.Intl esay essaycomplete the midterm exam by composing a 6–8 pg.
Intl esay essaycomplete the midterm exam by composing a 6–8 pg.
 
Interpersonal communication questions1. what is plain speech wh
Interpersonal communication questions1. what is plain speech whInterpersonal communication questions1. what is plain speech wh
Interpersonal communication questions1. what is plain speech wh
 
Interdisciplinary care plan7 class nur3400
Interdisciplinary care plan7 class nur3400Interdisciplinary care plan7 class nur3400
Interdisciplinary care plan7 class nur3400
 
Int 220 module six assignment conference call invitation templat
Int 220 module six assignment conference call invitation templatInt 220 module six assignment conference call invitation templat
Int 220 module six assignment conference call invitation templat
 
Instructions recently, you have noticed a change in the way your
Instructions recently, you have noticed a change in the way your Instructions recently, you have noticed a change in the way your
Instructions recently, you have noticed a change in the way your
 
Instructions for this unit vi assignment, continue with the indus
Instructions for this unit vi assignment, continue with the indusInstructions for this unit vi assignment, continue with the indus
Instructions for this unit vi assignment, continue with the indus
 
Instructions be advised, the template workbooks and worksheets are
Instructions be advised, the template workbooks and worksheets are Instructions be advised, the template workbooks and worksheets are
Instructions be advised, the template workbooks and worksheets are
 
Instructions· replace placeholder text with your text· your ou
Instructions· replace placeholder text with your text· your ouInstructions· replace placeholder text with your text· your ou
Instructions· replace placeholder text with your text· your ou
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

It for management on demand strategies for performance, growth,

  • 1. IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability Eleventh Edition Turban, Pollard, Wood Chapter 4 Networks, Collaborative Technology, and The Internet of Things Smarthinking. 2 Copyright ©2018 John Wiley & Sons, Inc. If you are having any issues This is worth visiting Smarthinking. 3 Copyright ©2018 John Wiley & Sons, Inc.
  • 2. Smarthinking. 4 Copyright ©2018 John Wiley & Sons, Inc. Smarthinking. 5 Copyright ©2018 John Wiley & Sons, Inc. Smarthinking. 6 Copyright ©2018 John Wiley & Sons, Inc.
  • 3. Smarthinking. 7 Copyright ©2018 John Wiley & Sons, Inc. Rubrics 8 Copyright ©2018 John Wiley & Sons, Inc. It appears some people do not realize where the rubrics for ea ch assignment are These are what I have to use to grade your work Rubrics 9 Copyright ©2018 John Wiley & Sons, Inc.
  • 4. Rubrics 10 Copyright ©2018 John Wiley & Sons, Inc. Rubrics 11 Copyright ©2018 John Wiley & Sons, Inc. Rubrics 12 Copyright ©2018 John Wiley & Sons, Inc.
  • 5. Rubrics 13 Copyright ©2018 John Wiley & Sons, Inc. Rubrics 14 Copyright ©2018 John Wiley & Sons, Inc. Rubrics 15 Copyright ©2018 John Wiley & Sons, Inc.
  • 6. Rubrics 16 Copyright ©2018 John Wiley & Sons, Inc. Rubrics 17 Copyright ©2018 John Wiley & Sons, Inc. Discussions 18 Copyright ©2018 John Wiley & Sons, Inc. Academic Writing Standards
  • 7. Discussion Board Use Saudi Electronic University academic writing standards and APA style guidelines This is something we all have had to learn That includes us Professors! What many do not realize is that Microsoft have made it easy. They include some very valuable referencing tools in their program The website includes images explaining exactly what to do https://support.office.com/en-us/article/add-citations-in-a-word- document-ab9322bb-a8d3-47f4-80c8-63c06779f127 Academic Writing Standards Academic Writing Standards
  • 8. Assignments for Module 4 Critical Thinking Assignment Conduct research and write a paper on either mobile technologies or the Internet of Things (IoT) In your paper, address the following: Briefly define the technology (collaborative technologies or IoT technologies). How and why are organizations applying this technology? Identify and describe one real-world example. What are the benefits of the technology to organizations? For example, does the technology reduce costs? Assignments for Module 4 How does the technology benefit the organization’s internal and external users? What are some challenges or potential problems of the technology to the organization? In your opinion, do the benefits outweigh these concerns? Explain. Your well-written report should be 4-5 pages in length, not including the title and reference pages. Check Your Understanding
  • 9. 5-10 multiple choice, true/false, fill in the blank questions, etc. Learning Objectives (1 of 4) 24 Copyright ©2018 John Wiley & Sons, Inc. Network Fundamentals Defined A computer network is a set of computers connected together for the purpose of sharing recourses. 25 Copyright ©2018 John Wiley & Sons, Inc. Common Network TypesAcronymTypeCharacteristicsExampleLANLocal Area NetworkShort distance connection Office School HomeWANWide Area NetworkSpans large physical distanceInternet Large companyWLANWireless LANLAN based on Wi-Fi technology Internet Large company
  • 10. 26 Copyright ©2018 John Wiley & Sons, Inc. Common Network TypesAcronymTypeCharacteristicsExampleLANLocal Area NetworkShort distance connection Office School HomeWANWide Area NetworkSpans large physical distanceInternet Large companyWLANWireless LANLAN based on Wi-Fi technology Internet Large company 27 Copyright ©2018 John Wiley & Sons, Inc. Common Network TypesAcronymTypeCharacteristicsExampleLANLocal Area NetworkShort distance connection Office School HomeWANWide Area NetworkSpans large physical distanceInternet Large companyWLANWireless LANLAN based on Wi-Fi technology Internet Large company
  • 11. 28 Copyright ©2018 John Wiley & Sons, Inc. Common Network Types 29 Copyright ©2018 John Wiley & Sons, Inc. There are many different types of network They can be used for different purposes by different types of people and organization Here are some of the network types that you might come across: Local Area Networks (LAN) A local area network or LAN is a network that connects computers within a limited area This might be in a school, an office or even a home Common Network Types 30 Copyright ©2018 John Wiley & Sons, Inc. Personal Area Networks (PAN) A personal area network is a network that is based on an individual's workspace The individual's device is the center of the network, with other devices connected to it There are also wireless personal area networks. Home Area Networks (HAN) A home area network connects devices within a home environment It might include personal computers, tablets, smartphones,
  • 12. printers, TVs and other devices Common Network Types 31 Copyright ©2018 John Wiley & Sons, Inc. Wide Area Networks (WAN) A wide area network is a network that covers a larger geographical area, usually with a radius of more than a kilometer Campus Networks A campus network is a LAN or set of connected LANs which is used by a government agency, university, corporation or similar organization It is typically a network across a set of buildings that are close together Common Network Types 32 Copyright ©2018 John Wiley & Sons, Inc. Metropolitan Area Networks (MAN) Metropolitan area networks are networks that stretch across a region the size of a metropolitan area A MAN is a series of connected LANs in a city, which might also connect to a WAN Enterprise Private Networks An enterprise private network is used by a company to connect its various sites so that the different locations can share resources
  • 13. Common Network Types 33 Copyright ©2018 John Wiley & Sons, Inc. Internetworks Internetworks connect different networks together to build a larger network Internetworking is often used to describe building a large, global network Backbone Networks (BBN) A backbone is a part of a network that connects different pieces and provides a path for information to be exchanged. Global Area Networks (GAN) A global area network is a worldwide network that connects networks all over the globe, such as the internet Intranets, Extranets, and Virtual Private Networks Intranets are used within a company for data access, sharing, and collaboration Extranets are private, company-owned networks that can be logged into remotely via the Internet Virtual Private Networks (VPNs) are used where security of transmissions is a concern They encrypt the packets before they are transferred over the network 34 Copyright ©2018 John Wiley & Sons, Inc.
  • 14. Virtual Private Networks A virtual tunnel routed through the Internet with software and hardware encryption. 35 Copyright ©2018 John Wiley & Sons, Inc. 35 Virtual Private Networks A VPN provides the opportunity to establish a protected network connection when using public networks VPNs encrypt your internet traffic and disguise a person’s online identity This makes it more difficult for third parties to track activities online and steal data The encryption takes place in real time They essentially create a data tunnel between a local network and an exit node in another location Which could be thousands of miles away Making it seem as if the user is in another place 36 Copyright ©2018 John Wiley & Sons, Inc.
  • 15. 36 Virtual Private Networks 37 Copyright ©2018 John Wiley & Sons, Inc. 37 Virtual Private Networks 38 TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) 38 Network Terminology Modem: a device that modulates/demodulates signal for transportation Modulation and Coding: Techniques used by modem to adapt the signal to the media Signal: Binary information we want to send.
  • 16. Signal Frequency Spectrum: All the frequency components of a signal Media Bandwidth: Limit in range of frequency signals Capacity Bandwidth: Maximum bits per second that can be transmitted 39 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.4 Basic functions of business networks 40 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.4 Basic functions of business networks 41 Copyright ©2018 John Wiley & Sons, Inc.
  • 17. Figure 4.4 Basic functions of business networks 42 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.4 Basic functions of business networks 43 Copyright ©2018 John Wiley & Sons, Inc. Figure 4.4 Basic functions of business networks 44 Copyright ©2018 John Wiley & Sons, Inc. Quality of Service (QoS) Latent-sensitivity: data such as real-time voice and high-quality video.
  • 18. Prioritized Traffic: data and apps that are time-delay-sensitive or latency-sensitive apps. Throttle Traffic: gives latency-sensitive apps priority, other types of traffic need to be held back (throttled). Traffic Shaping: the ability to prioritize and throttle network traffic. 45 Copyright ©2018 John Wiley & Sons, Inc. The Net Neutrality Debate Net neutrality is the principle that Internet Service Providers (ISPs) and their regulators treat all Internet traffic the same way. Traffic shaping prioritizes the flow of traffic by delaying the flow of less important network traffic. In 2010, the FCC ruled in favor of “net semi-neutrality”, not explicitly forbidding paid prioritization. The FCC under the current administration may take further steps to roll back net neutrality rulings, which could favor the cable companies over consumers. 46 Copyright ©2018 John Wiley & Sons, Inc. The Net Neutrality Debate 47 Copyright ©2018 John Wiley & Sons, Inc. What is net neutrality and how could it affect you?
  • 19. https://www.youtube.com/watch?v=zq-2Yk5OgKc Network Fundamentals Name different types of networks Local Area Network (LAN) Wide Area Network (WAN) Wireless Local Area Network (WLAN) Metropolitan Network (MAN) Storage Area Network (SAN) Campus Area Network/Cluster Area Network (CAN) Personal Area Network (PAN) 48 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it.
  • 20. 3. Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently.
  • 21. 7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). 48 Network Fundamentals What is meant by “bandwidth”? Bandwidth refers to the limitation in the range of frequency signals that can move through media without significant attenuation The bandwidth of the media varies by type Which is limited and typically can’t accept the entire signals frequency spectrum The range of frequencies that can move through the media without significant attenuation is called bandwidth and it is also measured in hertz 49 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses:
  • 22. 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. 3. Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc.
  • 23. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently. 7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). 49 Network Fundamentals What is the difference between an intranet and an extranet? Intranets are used within a company for data access, sharing, and collaboration They are portals or gate-ways that provide easy and inexpensive browsing and search capabilities An extranet is a private, company-owned network that can be logged into remotely via the Internet
  • 24. Typical users are suppliers, vendors, partners, or customers. Basically, an extranet is a network that connects two or more companies so they can securely share information 50 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. 3. Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the
  • 25. information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently. 7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled).
  • 26. 50 Network Fundamentals How does a virtual private network (VPN) provide security? Virtual private networks (VPNs) provide security by encrypting the packets before they are transferred over the network In effect, instead of using a leased line to create a dedicated, physical connection A company can invest in VPN technology to create virtual connections routed through the Internet from the company’s private network to the remote site or employee 51 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. 3. Intranets are used within a company for data access, sharing, and collaboration.
  • 27. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently. 7. Investments in network infrastructure, including data
  • 28. networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). 51 Network Fundamentals What is the purpose of a modem? A modem is a device used to adapt/modify the information signals in a way that can be transported by the media The word modem is composed of two terms: Modulator and Demodulator The Modulator adapts the information signal in order to be transported by the media The Demodulator does the inverse process at reception Digital Modems are called “CSU/DSU” (Channel Service Unit/Data Service Units) 52 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN,
  • 29. MAN. SAN, CAN, PAN. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. 3. Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and
  • 30. upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently. 7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). 52 Network Fundamentals Describe the basic functions of business networks The basic business functions supported by business networks are Communication Mobility Collaboration Relationships Search
  • 31. 53 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN. 2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it. 3. Intranets are used within a company for data access, sharing, and collaboration. An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information. 4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end. 5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator
  • 32. does the inverse process at reception. 6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search. Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc. Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds. Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing. Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc. Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently. 7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service. 8. QoS technologies can be applied to create two tiers of traffic: • Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network. • Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled). 53
  • 33. Network Fundamentals How do investments in network infrastructure impact an organization? Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions Because of their impact on productivity, security, user experiences, and customer service 54 Copyright ©2018 John Wiley & Sons, Inc. Suggested Responses: 1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN. 2. Bandwidth is the communication … Running head: ANNOTATED BIBLIOGRAPHY 1 6 ANNOTATED BIBLIOGRAPHY Annotated bibliography
  • 34. Introduction PICOT question: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXX Annotated Bibliography 1. Ann, M. H., Davis, A., & Glowatz, T. (2015). Development of a diabetes learning needs assessment tool to promote an individualized predischarge patient education plan. The Journal of Continuing Education in Nursing, 46(11), 484-486. doi:http://dx.doi.org/10.3928/00220124-20151020-12 The purpose of this artic le is to motivate nurses’ staff to empower patient to improve their understanding of their diabetes management. The article emphasizes the importance of the knowledge and successful glycemic control in diabetic patients. Therefore, Authors promote the necessity of implement a pre-discharge patient education plan to identify and address the knowledge and skill needed for diabetic patients after discharge. The pre-discharge need assessment consist in several questions that the nurse can ask to patient such us: What medication do you take? Do you know how to administer correctly those medications? Are you in insulin? Do you how to how to drawing it up and injecting it? Do you know what A1C is? Etc. The experiment was done to 44 diabetes patients. The need assessment was used in the admission and in discharge day. Nurses used the data collected to select appropriate
  • 35. learning materials and used them to reinforce the patients’ knowledge. As a result, the diabetic education increased in from 36% to 63% in five months. The documentation of diabetes education also increased because nurses understood the importance of the education in diabetic patients. 2. Blackman, N. (2008). The development of an assessment tool for the bereavement needs of people with learning disabilities. British Journal Of Learning Disabilities, 36(3), 165-170. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=tfh&AN =33863849&site=ehost-live The aim of this article is the development of a bereavement needs assessment tool to assess the need for crisis intervention for people with learning disabilities after a family death. With the assessment tools, health professionals can make a comprehensive assessment at the bereavement time to discover the problem and a plan can be put it in action. The tool was developed with the recompilation of several collected experience over the years of supporting grieving people with learning disabilities. The assessment tool has ten questions wi th sub- questions. The main points of the assessment are the practical issues, social issues, and emotional issues. The assessment tool has been tried out in three community teams and their results are being used to redefine the tool. The author will incorporate findings from research results to the assessment tool to refine the bereavement assessment. The used of the bereavement assessment toll will promote discussion and reflection among health care providers about losses in people with learning disability. 3. Ewing, G., & Grande, G. (2013). Development of a carer support needs assessment tool (CSNAT) for end-of-life care practice at home: A qualitative study. Palliative Medicine, 27(3), 244-56. doi:http://dx.doi.org/10.1177/0269216312440607 The authors of this article recognized the need to assess and support the care givers that are providing end- of – life care to help them in their caring role. The purpose of this article is to
  • 36. collect care givers’ perception of key aspects of end of life care at home and to create a need assessment tool that can be used every day. A qualitative research method was done. Seventy five adult care givers for hospice patients we interviewed in the United Kingdom. They were divided in nine focus groups. Twenty two participants had private interviews no more than ten minutes in duration. All participants sing their informed consent before the experiment started. The assessment tool used evaluated 14 domains of support needs within physical, practical, social, financial, physiological, and spiritual needs that the care givers may have. The experimental study identified two brad groups of support that the care givers need. The first one was to enable them to care for their relatives and the second one to have more support for them. The Carer Support Needs Assessment Tool that was used in this research is an evidence based toll to measure the care givers support needs. 4. Jenkins, J. O. (2010). A multi-faceted formative assessment approach: better recognizing the learning needs of students. Assessment & Evaluation In Higher Education, 35(5), 565- 576.Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=tfh&AN =53155623&site=ehost-live The purpose of this article is to create a multi-faceted formative assessment that enabled student to be more engage in the assessment process. The assessment will better meet the students’ learning and assessment needs. The approaches in this article put the students in the center of the learning experience to improve students understanding the assessment. The multifaceted formative assessment had six initiatives: (1) The creation of subject specific reader that present more clearly the purpose of the assessment, (2) The assessment was refocused depend on the hours involved and not in the number of words that it has, (3) The amount of assignment was reduced, (4) The assessment had detailed guidance notes to help creating an effective self-study environment, (4) an assignment tutorial was created to facilitate discussion of the assignment to improve
  • 37. learning, and (6) an E-learning environment was introduced to enhance the assignment submissions and comments that will help in the assessment’s formative process. The results of the assessment were done by reading and analyzing the students’ feedback and perceptions of the assessment process. The results of this study indicate that the development of a module reader was useful for the students to be engaged with the subject being studied. It also shown that the assignment tutorial and guidance note helped them to be more engage with the assessment. Therefore, the author of this article recommends that other subjects use the readers, assignment –based tutorials and the guidance note to help the student with their learning process 5. Kamaraj, D. C., Dicianno, B. E., & Cooper, R. A. (2014). A participatory approach to develop the power mobility screening tool and the power mobility clinical driving assessment tool. BioMed Research International, doi:http://dx.doi.org/10.1155/2014/541614 The development of evidence based training protocol for electric powered wheelchair users such us disability persons has been a challenge because of a lack of standardized assessment toll. The purpose of this article is to develop the Power Mobility Screening Tool (PMST) and the Power Mobility Clinical Driving Assessment (PMCDA). The research method was a qualitative participatory research. The research was done an approved by the University of Pittsburgh’s Institutional. Twenty one participants were agreed to participate in the surveys and in the focus groups phases of the research. In the process, there were two surveys to create a list of items that will be including in the PMST and in the PMCDA. The participants rank, in the surveys, each of the screening tests in order of importance. After the survey was done, he participant were invited to participate in a focus group in which they discuss two sections the screen tool and the assessment tool. The results of this research realized tree standards that need to be fallow in the creation of the assessments. First, the goal of the PMCDA should toward improving mobility and
  • 38. independence of individual with disability rather than improve the access to the wheel chair. Second, the goal should be measurable so can identify progress with training. Third, the measurement should be able to recognized areas in which trainings should improve. Because this research was done with a small sample group, authors subject that further testing is needed to evaluate the effectivity of administrating these tools in clinical environment 6. Macan, T., Konczak, L., & Breaugh, J. (2013). At your service: Blending science and practice to develop a customer service assessment tool. Applied H.R.M.Research, 13(1), 24-36. Retrieved from http://search.proquest.com/docview/1448424808?accountid=458 This article describes specific strategies and factors that can be utilized to achieve the high quality customer services oriented in an organization. This article explains a detail a project that involves the development of a customer service oriented paper and pencil assessment. The purpose of this article was to share different approaches to be considered in order to achieve high quality services. The article included five practical challenges that the organizations can face in this project. Those challenges explain were (1) Cost effectiveness and administrative efficiency,(2) Get the attention to the stakeholders, (3)Diversity of the applicants, (4) Balance statistic and practical significance, and (5) Gather multiple forms of validity evidence. The authors created an assessment tools taking into consideration those five challenge. They created an assessment tool to measure employee performance for part time positions. The assessment tool has 27 items that can be done in ten minutes and it is ease to score by hand. The assessment tool was made by taking into consideration age and race diversity of the applicants. The assessment is ease to read with the fifth grade reading level. The authors highlight the necessity of doing more researchers to provide more evidence for using the different approaches used in the study to have better strategies in implementing an innovative and scientific assessment measures.
  • 39. Running head: CENTRAL LINE INFECTIONS 1 CENTRAL LINE INFECTIONS 2 Infection associated with Centrals lines Infection Associated with Centrals Lines Central line-associated bloodstream infection is one of serious infection that takes place germs commonly bacteria and viruses penetrate bloodstream via the central line. The infection causes millions of deaths every year despite the infections being preventable. The central line gets infected when contaminated catheter devices especially before the insertion, contaminated infusate, and contaminated catheter hub are used (Kirk, 2018). Skin organisms are also named as the cause of the infection. The central line of the patient gets infected when the virus or bacteria or other related germs enter into the bloodstream causing serious infections. Central line infection may become serious but can be successfully treated by health workers. The
  • 40. common central lines that are commonly infected are “Femoral central venous catheters”. Most infections occur when doctors put the central line also called a central venous catheter in a large vein found in the neck, groin, chest, or arm so that to provide blood, other fluids, or medication in the areas. The insertion of the central venous catheters may not effective and therefore causing catheter malfunction, thrombosis or central vein stenosis, and other catheter-associated infections (Kuriakose, 2020). The common risks that have been found to increase central line infection include ICU placement of the central nervous catheter, the existence of the nonoperative cardiovascular illness, and the existence of the gastrostomy tube in the veins. Problem Statement The central line-associated bloodstream infections are regarded as the most lethal-hospital acquired disorder impacting high costs to health care institutions approximately $ 46 000 in every infection and causing a mortality rate of 18%. The health care institutions have noticed that when patients are infected with CLABSI, the number of days to 12 weeks is extended as well as the antibiotics to improve the situation of the patients. The infections of central lines in hospitals do not only affect the reimbursement but also create a negative perception of the hospitals and therefore training is required for the ICU nurses within one week (Tan et al. 2017). The hospital-acquired rates of infections are alarming hence there is need for training of ICU nurses or medics through establishing a compelling program that will help nurses remedy the situation. Preventing hospital-acquired CLABSI will improve the quality of care and enhance patient wellness. There is a need for quality interventions to be conducted to attain the goal of high infection of the central line and reduce the number of days taken in the ICU unit. PICOT Question It is unknown the application of an educational program to ICU nurses about central line management. Will improve central line
  • 41. infection rate compared with the infection rate before the teaching within12 week? The ICU nurses play a vital role in proper maintaining of the central lines hence preventing the development of the CLABSI. The ICU nurses have more access to central lines daily when offering services as blood draws, medication administration as well as delivery of parenteral nutrition to the affected individuals. It is very critical for ICU nurses as the population of interest to be much aware of evidence-based interventions both the current and past to optimize the process of maintaining central lines and prevent infections (Ayala, 2019). ICU nurses should be trained for twelve weeks to improve service delivery that will help reduce the number of infections. Nurses should be equipped well enough to make them determined to offer quality and effective nursing services that will reduce the high cost and the lengths of care taken by the patients in the hospital. ICU nurses are one of the key components in the treatments of central line infections and should be equipped with adequate skills and knowledge through training. Implementing effective- based interventions in the field of nursing care especially in the occurrence of CLABSI will help to decrease the instances of infections among people. ICU nurse is the population of interest that can be improved and reduce the mortality and infections of CLABSI in hospital-based settings through competent nursing interventions. Intervention of Interests Training of ICU nurses is the key intervention used in this project to reduce infection of central lines. Training of ICU nurses within 12 weeks on how to manage and reduce the incidences of the infection was conducted based on nursing evidence-based approaches seeking to equip ICU nurses with sufficient knowledge of reducing the incidence associated with causing central line infections. Preventing the introduction of bacteria and viruses (microorganisms) to the central lines which take place in hospitals is the most key area the training focused on to control CLABSI. The efforts of preventing central line
  • 42. infections lie in the hand of nurses because they are the ones mandated for the routine care and maintenance of the central lines (Kuriakose, 2020). The actions and compliance of the nurses depicting the best evidence-based practices depicted a direct impact on patient outcomes. The intervention required the ICU nurses to strictly adhere to intervention measures of not introducing microorganisms in central lines. Putting more effort into the insertion and post-insertion maintenance should be well monitored and evaluated by nursing professionals through training because they are the major processes that cause risks of infections. The interventions through training purposed to analyze the intrinsic and extrinsic factors to have a better understanding of the disease considering the age, patient’s gender, or other underlying conditions of the patients because they are the main clients served by ICU nurses on matters relating to central lines. The training also intervened and articulated conditions that lead to –prolonged hospitalization before the process of insertion is enacted. The education on the use of Chlorhexidine gluconate (CHG) was emphasized (antiseptic solution) due to its ability to possess wide spectrum activity that reacts against bacteria, viruses, and other microorganisms that are to the central line- associated bloodstream infections (Lacerna, 2020). The use of CHG helps to prevent CLABSI, especially on the skin. Other evidence-based steps that the training as the intervention addressed for CLABSI prevention include the use of the appropriate hand hygiene during and after central line insertion, use of "chlorhexidine” for skin preparation, stopping using the "femoral vein” by the ICU nurses for catheters especially in adult patients, removing catheters that are considered unnecessary and lastly utilizing full barrier precautions or warnings during the insertion process of the central venous catheter (Moore, 2016). Comparison The central line-associated bloodstream infections rate will have analyzed and concluded after the interventions that involve
  • 43. training of ICU nurses and making a comparison with the outcomes or results obtained before starting the training and at the end of the 12 weeks where will evaluated the knowledge of nurses. The outcome of this alternative intervention will better outcomes in preventing central line-associated bloodstream infection. Outcome The training process aims to reduce the baseline incidences of CLABSI, according to Taylor et al. (2017) are 40/1000 days of central line, after the training of ICU nurses, it is expected that there will be a significant reduction. Likewise, it is intended to reduce the incidence of central line-based bloodstream infections, showing the positive impact of training in the effort to prevent or reduce central line infections that occur in the hospital environment. Approximately 98 ICU nurses (sample convenience) will be used in the project. At the end of the 12 weeks of training for ICU nurses, a maximum reduction of 50% in CLABSI is expected after the adoption of prevention measures, compared to starting the training. CLABSI rates tend to vary from healthcare to healthcare based on facilities (Kirk, 2018). Therefore, reduction in the costs of post-training care is also expected. Likewise, it is expected to take into account associated factors such as limited space between beds, shor tage of ICU nursing staff, little knowledge and training of hospital institutions for health personnel, incomplete documentation, among other possible reasons that are also intended. identify before the 12 week training is completed. Time The period taken for the interventions listed above to achieve an outcome is 12 weeks. The training of ICU nurses to achieve the intended purpose of reducing the infection incidences of central lines was completed at the end of the twelve weeks. This stipulated time allowed ICU nurses to be equipped with sufficient knowledge that aimed to influence patients positively. Conclusion
  • 44. The intensive education through training sessions with the response originating from ICU nurses over 12 weeks led to the significant improvement of matters about central line-associated bloodstream infections. The recollection of data in phase three of the training reaffirmed the significance and role of education in reducing infection incidences. During the project, it was found that high adherence to the “CL bundle intervention’’ adopted through training of ICU seemed to correlate positively to the reduction of central line infections in the ICU (Taylor et al. 2017). The study reveals that data from NHSN was more comprehensive as well as an effective benchmarking tool that established comparison to INICC as it tries to represent or depict those countries developing surveillance systems. More studies on projects should be conducted to formulate or design the national policy that can be used to benchmark the surveillance outcome of proposed devices or tools that are associated with infections of central lines in ICU. References Ayala, J. L. (2019). Development and Evaluation of a Nurse Leader-Directed Compliance Coach Program to Improve Central Line Maintenance. Wilmington University (Delaware). Kuriakose, L. (2020). Decreasing Central Line-Associated Bloodstream Infection Through Limiting the Use of Central Venous Catheters for Routine Blood Draws. Journal of Doctoral
  • 45. Nursing Practice. Moore, M. A. (2016). Evaluation of Central Line Insertion Bundle Practices in a Trauma/Surgical Intensive Care Unit. Kirk, M. P. H. (2018). Healthy Work Environment Improves Nurse-Sensitive Patient Outcomes (Doctoral dissertation, Grand Canyon University). Lacerna, C. (2020). Application of Sustainability Framework for Quality Improvement in an Integrated Health System. Taylor, J. E., McDonald, S. J., Earnest, A., Buttery, J., Fusinato, B., Hovenden, S., ... & Tan, K. (2017). A quality improvement initiative to reduce central line infection in neonates using checklists. European journal of pediatrics, 176(5), 639-646.