Uses Of Computers In The Workplace

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

nterviewed 40 students to them and uThe Impact of Computing on Society, Security and Psychology

By Ozgur Mehmet

The issue of the impact of computing on our social life, our leisure life, our finances, our psychology and general day-to-day living is a controversial one. Some individuals feel that the contribution of technology has made a positive impact in modern life and that technology helps improve our overall quality of life. Others see that the contribution of technology has negatively impacted modern life and that technology is a force that has escaped from human control. The aim of my project is to research and document how we have adapted to these advancements, and to investigate how technology has improved our lives, influenced our behavior, affected our perception of society and collectively developed the digital age.

Computing in Society

Society nowadays has become a lot more liberated in many different aspects. As time has progressed, society has striven hard to make living easier and more convenient. With the invention of modern technology, society has embraced these things with open arms almost to the point of not being able to live without these gadgets and exaggerated as it may sound, it is a fact that some people cannot live without one of these electronic tools.

The pace of development and change has accelerated exponentially since the beginning of the 20th century and continue today, affecting many aspects of daily modern life. From large mainframes that crunch numbers and help with scientific research, to your home desktop or laptop, computers are used by most industries and people. Primarily, the reduced initial costs of purchasing a computer or device has made the market accessible to almost everyone regardless of his or her income. Being accessible, people now have up to 5 computers or devices in their homes as standard. (Statistic: conducted by Kelkoo, 2012 – worldwide).

People are more connected to each other than ever before, and a large part of that is related to the popularity of mobile communication devices (mobile phones). Allowing for instant communication, mobile phones have changed the way people do business or even meet up with friends. With third and forth generation mobile phones, these devices allow you to access the Internet, play games and even record and edit movies.

But how do all these advancements affect general computing in society with ecological validity?

The primary purpose of this section of the report is to observe the uses of computers in society. No evaluations are present here.

Uses of computers in the workplace

It is no surprise that computers are utilized in the workplace. The nature of computing enables a smooth, organized and constructive workflow reducing errors, maximizing profits and maintaining and managing expenses. Computers enable organizations to setup sophisticated networks that run the business and categorize all records/sales/invoices/entries (dependent on the nature of the business) in a way that only a computer could process. Because computers work linearly, provided the computer is told to carry out the correct task with valid instructions, there will never be any mistakes and this is valuable for any workplace. Academic establishments have utilized computer technologies in a way that enables them to monitor student progress, perform registrations, mark and assess work using local networks, contact parents via dedicated links and even export mass data about the establishment and the performance of each department. Other establishments such as hospitals have also taken advantages of these advancements. Hospitals are now linked to a private network that enables the exchange of patient records including their history, family records and other associated entries.

This has proven incredibly effective, especially where emergency patients are unconscious and a record of their health is required. Doctors and surgeons can now type the name of the individual and call up all associated records which reduces the risk of misdiagnosis (in some cases), complications linked with allergies and other factors of the nature.

Academic Establishments

It’s no secret that academic establishments have become more and more reliant on computers to perform day-to-day tasks. Teachers now use presentation software to teach a class, use local networks to carry out registers, enter exam data into software packages for auditing and share files online to enable students to complete assignments. I visited 8 colleges (which I cannot name for confidentiality reasons) and reviewed their systems. I interviewed the head’s of faculty on their thoughts on the systems and where they need to improve and asked students how they feel about the infrastructures. I summarized and reviewed two colleges. College one made use of all available technologies, whilst College two only has basic technologies as standard.

College One (East London) – No. of students: 20001

The college has a campus area network, which enables mass file transfers over a network whilst maintaining the processing power required to manage the network. This type of network was relatively old and student were complaining about system halts when using a workstation, corrupt data when they would assess their documents and constant errors preventing them from completing the tasks.

The college also used a network register that allows teachers to take a register in class and update this on the college’s central servers, which in turn would be assigned to each corresponding student record. Students suggested it would be better swipe cards (radio-frequency identifications cards) could be used to automatically register them as some students noticed they were being marked absent went they were late and some even when they were present. The implementation of such system would reduce these errors.

One IT technician pr`and d and pointless'ibed the system as 'lawed and poiw the email services were being used.

nterviewed 40 students to them and uoposed a RFID over PPPOE system explained below:

(Radio Frequency Identification over a Point-to-Point Protocol via Ethernet)

prove incredibly effective with both staff and students as it reduces the deviation tasks during the lesson when completing a register and it gives student peace of mind in the knowledge that incorrect data will not be assigned.

This college also had a virtual learning environment that enabled students to access the college’s private network and access their course materials. Using this application, teachers could assign tasks and students could complete the work in their own time at home. The availability of this technology has drastically improved the overall attitude of working from home. Students are comforted in the knowledge that the work can be found in one place and that the supporting material is relevant to their course.

One male student (who has chosen to remain anonymous) expressed his thoughts2:

"Whilst such systems are proving useful with students and staff, I feel that individual queries/questions are being ignored and this is a limiting factor when it comes to expanding our knowledge on a topic or course. Some teachers have been ‘programmed’ to explain that all relevant materials can be found online and have forgot how to interact with their students.

One male teacher (who has chosen to remain anonymous) commented on this view3:

"This student clearly has issues with his/her teacher. To my knowledge, all teachers in this college are dedicated to improving or enhancing their student’s knowledge either by means of online content or dedicated support. This student must also bare in mind that his/her teacher has limited time to deal with individual queries and whilst he/she may seem like they are ignoring individual queries, they may just be overloaded with work. It’s unfair to blame the introduction of computer technologies and this is most certainly not a factor.

The principal of the college summarized the points4:

I feel it is incredibly important to maintain a high level of education and if students feel their teachers are ignoring them because of these technologies, they should make formal complaints to their student union so this can be discussed. If students do not express their concerns, there’s only so much we can do.

I asked a principal from another college on his views on this topic5:

"I can understand where the student is coming from. Since these technologies have been implemented, we have adapted to them and utilized them as a replacement for primary learning. This has collectively contributed to a more ‘laid-back’ approach to teaching and learning respectively. Students feel they are completing the tasks adequately and are proud that they are finishing their work. Teachers are assigning the work but not reviewing the completed entries. Whilst the idea of virtual learning is a very intuitive concept, there is room for improvement.

Additionally, the college has an email exchange system whereby all students and staff could contact each other, arrange meetings, review schedules and assign tasks. Despite the advanced functionality, only one of the fifteen services was used.

Mostly the staff of the college utilized the email system. Collaborative working was evident and surprisingly students were being discussed and personal information was being exchanged. I distributed questionnaires to 40 students and of them 40 asked 5 for a detailed statement on how the email services were being used.

78% of students described the system as ‘Flawed and pointless’ and additional comments included6:

"Teachers spend more time discussing students than they did actually teaching.

The detailed statements were conducted independently and each student was assigned using a random sampling method to reduce any extraneous variables or demand characteristics.

Despite the independent conduction, the context of each statement was almost identical and it seemed that most students were aware of the poor integration of the system. One statement read7:

"The purpose of an email exchange system is to provide a medium for students and teachers to contact each other outside college hours or during free periods. However, with our college, it seems that posting your message on a social network would get more attention compared with a message emailed to a teacher. You’ll be lucky to receive a reply and if you do, it would almost always refer to using the college’s virtual learning environment to resolve the issue and that’s all providing you can actually find the teacher you want to contact. Teachers were not on the address book and you had to guess what their email would be based on their initials.

Whilst the college did not have an automated register system, the college did utilize RFID technology in order to gain entry to the college. Some students were concerned that in the wrong hands, the data on these cards could be decoded and use to make other forms of identification baring in mind the front of the cards had their full name, photo and date of birth.

The college made use of all available technologies, but it seemed that these were not being utilized to the maximum potential. Additionally, many there are many concerns that these technologies have collectively contributed to the deterioration of basic communication and workflow within the college.

College Two (North London) – No. of students: 12008

The college has a campus area network. The primary purpose of the network is to take registers for each class, provide email services for students and teachers, enable students to work with computers using the available labs and so teachers can upload resources on to the college’s VLE (virtual learning environment). The VLE is externally hosted and managed. The work completed by students on site is saved and stored offsite by an external provider.

Students were happy with the network maintenance and usage of the available technologies and felt that these were enough to fulfill most tasks. Students reported that they had no issues with communication when emailing their teachers and all contacts were on the global address book.

The updated network model was proposed in 2009 and since this upgrade; both students and staff noticed a significant change with regards to the overall attitude of learning and availability of course resources.

The initial network was configured as shown:

Network printer was limited to a 25MB spool. Data exceeding this would be corrupt.

Server

Network Printer

Lab 3

Lab 2

Lab 1

The model proposed and implemented in 2009:

The updated network model intended to improve the overall performance of the network and fix any issues that students and staff reported. A new lab was introduced in building 2 and this was asynchronously merged into the network model. Each lab is independently connected to the server rather than relying on a relay packet system where performance is dependent on previous relay route.

Example: problem with previous network model.

If systems in Lab 1 were experiencing errors or faults, this would ultimately affects Labs 2 and 3. Each lab in the route relies on the previous node in the chain.

Both students and teachers noticed a significant change with the system response times and general workflow when using a computer. Minor updates to the network registration allowed teachers to batch process registers and grouped any missed, upcoming or current registers on their dashboard. The email exchange network was updated so students could setup appointments with teachers and also enabled mobile synchronization so students with smartphones could connect to the server and set tasks and events.

One female student (Jules Cardwell) expressed her views on the system9:

"Since the system updates, the overall workflow of using the system to complete our assignments has dramatically improved and the enhanced functionality of the email exchange network has allowed us to manage our assignments and email our teachers when we have completed them. It’s notable that whilst only minor adjustments have been performed, it has made a good network, perfect.

One male teacher (Harlow Maim) gave his views10:

"The IT department has really hit the nail on the head. I’ve been here for 5 years and I’ve never any issues with the systems. They are well maintained and the functionality available is more than enough to perform tasks adequately. Since these updates, the network has over-performed and this has enabled us to work closer with our students and ultimately contribute to a better learning environment.

The representative for the college summarized the points11:

"Here at (COLLEGE NAME REMOVED FOR CONFIDENTIALITY REASONS) our students opinions are valuable; we listen and honor their suggestions and are always there to improve their community and we appreciate that well implemented resources will help our students excel in their learning. The changes to the network are minimal, but we don’t want to overcomplicate a situation and we are happy to hear positive feedback from both our students and staff commenting on these changes.

I distributed questionnaires to 60 students asking them how they feel about these changes as well as encouraging them to write additional comments12.

95% of the students said ‘the updates to the system have drastically improved our workflow and the college has honored our suggestions. The system updates were performed outside of college hours and were fully functional when used.’

Additional comments included13:

"It’s clear to see that the college cares for us and they review our suggestions and devised strategic plans to deal with our suggestions. Simplicity has been taken into account and new technologies have not been introduced because they are not required.

The college has noted a 46% rise in computer usage and 36% rise in email interaction and communications usage.

Please refer to supporting documents for a summary on these colleges at the end of this section. Document Number: 201310.14

Health Care (Hospitals)

Overview

The importance of computers in medicine is growing and spreading rapidly. Today, computers, along with Internet technology are being introduced into hospitals to enhance the performance of the medical facilities that are dispensed as well as being utilized to research illnesses and analyse DNA and genetics.

Software engineers and system analysts are adapting to the needs of this industry and have helped develop popular medical management systems used as a database containing patient records, employee records and other relevant information. These management information systems have been around for about 15 years but have become increasingly popular due to the engineering of such applications as well as the versatility.

Clinical and administrative medical staff use computers to handle enormous volumes of data regarding patients, ailments, prescriptions, medications, medical billing details, etc. This data is input into a national database containing patient health and medical records and are commonly referred to as Electronic Medical/Health Records (EMR and EHR). These databases are operated by a set of computers and servers, and come in handy during medical alerts and emergencies. The concept of EHR is a bit broader than the EMR, as the database is accessible from different clinics and hospitals. Medical practitioners can retrieve a patient’s medical history from any hospital without contacting their general practitioner.

Health care professionals use computers to analyse tests. These are medical procedures where specified components of the human body are scanned. Tests can range from something as simple as a blood test to something as complex as a CT-scan (using in neuroimaging). This process is often referred to as a medical imagery. In order to increase the precision of such procedures, computers have been adopted and integrated into the testing equipment. Ultrasound and MRI (magnetic resonance imaging) are the best examples where computers have been adopted, in order to make the process faster and precise. Because of these advancements, we are now able to diagnose illnesses or complications quicker than ever before and proceed to treatment before the conditions deteriorate.

Furthermore, professionals use computers to examine and monitor patients. In many cases, nurses, doctors and surgeons use sophisticated computer aided equipment to treat their patients. Such systems and procedures include, bone scan procedure, prenatal ultrasound imaging, blood glucose monitors, advanced endoscopy which is used during surgery and blood pressure monitors. Access to some of these devices at reduced costs has encouraged patients to purchase their own so they can monitor their health without seeing their GP.

There are significant advantages of using computers in hospitals. The importance of computers in hospitals has also increased drastically due to the fact that the procedures have to be speedy to cater to a larger population and the medical services have to be more precise. Tests and medical examinations can now be carried out with precision, medical data can be transferred and shared over a network to reduce waiting times, diagnosing a patient is becoming quicker and easier and medical history records are now logged on an electronic database.

Analysis

A study conducted by a government body observed how Mr. John Martin utilized computers and network technologies in a hospital. This study was lengthily, so I have summarized notable usage into paragraphs:

Mr. John Martin arrives at the hospital to see his patients. "He will examine the records of their vital signs of life and decide if anyone is well enough to leave the Intensive Care Wards and to return to the normal wards." He will then decide upon his operating list for the day, as all neurosurgery operative patients need intensive care post operatively. This is in the day to day running of a busy hospital department.

Mr Martin explains how he "will use all the advantages that ICT can give him in the care of his patients." Mr Martin "will use ICT in numerous different forms as he gathers the information needed to help his patient and to ensure that he cares for them to the best of his ability.

Mr Martin shared some insight into how patient records are recorded. "At present, patient records are transcripted manually and these records are then held in the Medical Records Department. A computer is then used to manage the list of appointments for clinics that go on daily at the busy hospital. Waiting lists are produced for each clinic and the names of the patients on the list are then processed so that their notes are delivered to the correct clinic ready for the day’s work. The notes can include a record of previous visits, previous consultations and diagnoses and include also results from tests.

Mr Martin explained how records are shared between hospitals. "To communicate information between hospitals for example from Bronglais Hospital in Aberystwyth to Morriston oHosptiHospital in Swansea, a closed network is used. This allows x-rays and scans to be sent by a doctor to a specialist for them to share their opinion. This gives the doctor a second opinion by a specialist in that field. The closed nature of the network ensures the confidentiality of the sent material. All hospitals in Wales are linked together and there is also a gateway to English hospital.

Mr Martin explained how "The area of Intensive Care and Treatment is one with the use of ICT at its core." He explains how "Patients can be admitted after trauma (e.g. an accident such as car crash or industrial incident) or post operatively where they may have undergone major surgery." Mr Martin extends his explanations "Some patients are also referred when an illness or condition escalates in seriousness."

Mr Martin explains how an MRI functions. "The Magnetic Resonance Imaging Scanner is a radiology technique that uses magnetism, radio waves and a computer to produce images of the body structure. A huge circular magnet is in the tube that surrounds the patient. When the magnet is switched on, the detection of change in magnet resonance is picked up by radio waves and this change can be modelled using computer to produce an image.

The possibilities of computers uses in the medical field are endless, facilitating medical help to hospitals and clinics all across the globe and as new technologies are invented, the industry will take advantage of these developments to further enhance the functionalities.

Please check my supporting documents for a copy of the full report on Mr. John Martin. (Document Number: 201311)

Retail

Today we are at the point where new functionality is enhancing the way goods are sold to us. 

With the introduction of computer systems, retailers utilize every technology available to improve sales, market brands and contact customers. Computers, which have had an impact on nearly every economic sector, are especially prevalent in retail where their effect is visible at each level of the retail organization.

Online Sales:

One of the most significant impacts of computers in the field of retail sales is the phenomenon of online sales. Most major retailers have a website that allow customers to browse their products online and make the purchase without ever having to leave their homes. Retailers can now rent warehouses, store inventory, setup a product database, migrate the data to a website, open a merchant account and begin trading online and this becoming the norm for most customers. If items are out of stock, the customer can back-order the products and they will be delivered when the item arrives in their warehouse. Retailers also benefit from international sales; customers can order goods from the UK for delivery in their country.

"Statistic (conducted by Kelkoo): In 2012, Americans in the United States spent $180 billion online with over half the collective sales coming from clothing and online department stores.

"Statistic: (conducted by Kelkoo): In 2011, sales in the United Kingdom exceeded £60 billion with approximately 65% of sales coming from clothing and fashion stores.

Marketing:

Notably, retailers have felt the impact of computers when it comes to marketing. In addition to radio, television adverts and print, retailers can use targeted marketing services to promote their goods and services through banner ads hosted on participating websites and email promotions using newsletter systems. This has engaged and sustained the interests of customers. With email communication management systems, retailers can send sales reminders or issue special discounts codes reducing the costs of contacting customers directly through phone or postal mail.

Inventory management:

With retail comes inventory. Inventory management systems (based on management information systems) allow retailers to control their inventories in order to succeed in business. This is especially important where overheads are concerned, too much overhead means the businesses’ money is tied up in unsold products, too little means there might be problems meeting customer demand. Inventory management systems (IMS) can be as simple or complex as required. These solutions are usually bespoke to the businesses’ needs and allow retailers to track inventory levels over time and ensure the right quantity of a product is always in stock. With JIT (just in time) integration components, the IMS can notify the retailer that the stock is low on one product and automatically process another order from the suppliers to reduce waiting times.

Finances, payroll and accounting:

Like other organizations, retailers can feel the impact of computers when they take advantage of the application solutions available that simplify their payroll and accounting tasks. Accounting software packages streamlines the process of keeping accurate record for tax and auditing purposes as well as personal business assessments. Specialist functionality included with most accounting packages can even reduce the amount of money a retailer spends on an outside accountant; provided the information input is valid, an accurate output can be processed and this can be used to automate taxes, summarize charges and carry out other advance financial tasks. Some accounting packages (usually incurring hefty fees) allows managers or directors of a retail store to update records online from anywhere in the world and this has significantly changed the payroll information is processed, information such as the hours worked and salary changes can be updated instantaneously without being on premises. These changes are globalized on the system automatically.

Public Transport

Communication technologies and management systems are crucial tools today in the public transport sector. With over 8,000,000 citizens in London of which approximately 3,000,000 are daily public transport users (statistics by Google Public Data, 2012), without sophisticated data management systems, public transport would be flawed.

Oyster cards (contactless card technology)

Since the introduction of Oyster cards in 2003, over 43 million oyster cards have been issued and more than 80% of all journeys on public transport were made using the card (statistic by: Transport for London as of June 2012). A standard oyster card is based on the MIFARE 1K radio frequency identification card or RFIDC and is the most commonly used RFIDC in public transport and some entry authorization systems. The card is a hard-wired logical smartcard meaning it has limited computing power and is designed for one primary purpose. The card technologies may come across complex, but are pretty self explanatory if broken down into stages:

In 2008, Transport for London revealed the ZIP photo cards used by younger people aged 18 years and under who qualify for free travel. Individuals aged between 0-16 qualify provided they are British citizens whilst 16-18 years olds need to be in full time education. These cards are also based on the same MIFARE 1K RFIDC technology as the standard Oyster cards but do have additional attributes assigned such as expiry dates and boundary limitations.

The ZIP photo cards are ethically questionable. When a person or student applies for this type of travel card, there information is shared with the Police and stored on record for future reference and whilst the information commissioners have made several statements claiming that ‘the data collected is archived but is never accessed’, there have been over 229 cases where data was analyzed and used to track a person who committed a crime (statistic conducted by the Guardian, 2006).

Additionally, there are huge concerns with regards to security and misuse. Whilst the MIFARE RFIDCs are encrypted (a process where data is converted in cipher text), the cryptography and encryption attributes of the cards is dangerously insecure:

Cryptography and Encryption explained (advanced):

The process of encrypting data is one that most people are now familiar with. Data that is ‘sensitive’ or that contains personal/confidential information can be encrypted. If for example you have a word document that contains financial information of your assets and liabilities, it is likely you’ll want to encrypt this document and this would be done by assigning a password.

The process is universally linked but varies based on the complexity of the encryption system and level of encryption needed.

The level of encryption refers to the number of bits of the key varying from 16 to 4096 bits.

The MIFARE RFIDC is based on a 48 bit key architecture stored on a 1024 byte card. To simplify this information, what this means is that each card has a capacity of 1KB (that’s a 1000th of a megabyte) and is secured with a 48 bit key. The higher the key, the more secure the card.

The cause for concern is not unjustifiable. A 48-bit key can be decoded in minutes provided the individual is experienced enough and has prior knowledge of decoding and reverse engineering. Using an RFID reader, laptop computer and a backpack, a hacker can walk around a busy underground station and walk past commuters scanning their oyster cards. This data is stored on a laptop computer hidden in a backpack. Using blank RFID cards that have been modified to enable ‘writing’ privileges, the hacker retrieves the data stolen from the commuters and is able to write a new card with identical data, which can be used, on the London transport network.

There have been successful security exploits of the Oyster card, which have been concealed by Transport for London to reduce the fear factor in commuters. In 2008, the digital security research group of Radboud University in the Netherlands revealed that a successful reverse engineering exploit had been performed on the MIFARE 1K RFIDC (what the Oyster is based on).

The introduction of the Oyster card has helped develop the transport network and has made travel easier but there a many concerns about the ethics and security of these developments that need to be addressed.

Timetables and travel updates

The transport network has a real-time update log that monitors the progress of a journey whether it is a bus, train or tram. These updates are presented to us at bus stops and stations around London and tell us when a bus, train or tram is due and where it is terminating. In 2012, Transport for London launched their Live Buses service for mobile phones so commuters could use their smartphones to determine when their bus, train or tram is due. For those who did not have smartphones, a text-messaging medium was deployed where the commuter could text the bus stop code to 87287. An automated response would then be generated with live updates. TFL continues to improve the service and hopes to introduce mobile payment platforms in 2015 so commuters can use their phones to trace a journey as well pay for it on their mobile phone.

Contactless payments

In 2013, TFL authorized contracts with Barclaycard to introduce contactless payments. Commuters can now pay for their journey using a contactless Barclaycard credit card. This would be charged at the normal Oyster card rate of £1.30 per journey but does not qualify for subscription services (i.e. weekly or monthly travel cards) and has no cap (so can exceed the maximum daily fare). TFL have reported that they will be making changes to the service within the next four weeks to rectify theses issues.

Collectively, the public transport network utilizes computers just as much as any other sector but has different needs and provides different functions. Whilst the technologies may not be perfect, they are stable and utilizable and are fit for purpose.

The Advantages Of Computing - Summary

Be it office, home or school, the computer has become an indispensible device. Computers operated by an individual with no specific needs are more commonly referred to as a Personal Computer or PC and these devices have become ever-increasingly popular with home as well as business users because of the functionalities available.

Documentation and Lingual Qualities:

One can write more effectively by means of a computer. A computer allows the user to create documents, edit, print, and store them so that they can be retrieved later. Using the tools built into the software package, the user can review the document and check for any spelling or grammar errors, change the formatting (look) of the document, check definitions of words that the use maybe unfamiliar with and even research a topic the user maybe writing a report on. It is also notable that typing is much faster than writing, deadlines can be met quicker and information can be shared faster than ever before.

The World Wide Web:

The World Wide Web is one of the most notable aspects of computing. Using a computer, one can remain connected to the world through the Internet. The Internet should not be confused with the WWW. The Internet is a network of inter-linked computers over a large geographical area whereas the WWW is a huge database of online resources accessed via the Internet. Electronic mailing (or email) is a method of communication. It is estimated that there are over 3.2 billion active emails globally (statistics by Kelkoo, 2011) and approximately 144 billion emails are sent and received every day.

Social networking sites have become hugely popular especially with younger audiences as approximately 68% of registered social network users are between the ages of 10 and 25 (statistics by Kelkoo, 2012). Social networking sites such as Facebook and Twitter are examples of communicators via the Internet and are utilised by families, friends, colleagues and so on to share photos, discuss topics and for general communication purposes.

Other resources contributing largely to Internet usage include Online Gaming with an estimated 2.5 billion players online, ranging from arcade games to MMORPGs (massively multiplayer online role-playing games) – (statistics by Google Public Data, 2011).

Moreover, the WWW is the world’s largest database of information, with access to over 910 trillion entries and counting – (statistics by Google Public Data, 2012). This information is available at hand to anyone who’s searching for it, is free and in most cases allows users to contribute to the content without credentials.

Academics & Education:

With the introduction of computer technologies, Educational facilities have benefited in many different aspects not limited to learning development. As demonstrated in part one of this report, colleges have made use of the technologies to help manage student attendance, limit student access, share learning resources online and teach in class. Computer systems can also be used to store documents, present classes using PowerPoint and a projector, interact with students using SMART tools (developed by SMART / SMART board technology).

Online Shopping and eCommerce:

The Internet has opened so many routes to success in commercial markets. With online shopping, buying and selling is a fast, simple and secure procedure and anyone with Internet access and a debit/credit card can take advantage of these technologies. Suppliers have a wider range of products, which you may not find in store and are usually sold at discounted rates. Furthermore, there are no theoretical geographical locations when it comes down to online trading; manufacturers, suppliers and retailers can sell goods centrally and dispatch them internationally if customers are prepared to pay taxes and duties. Online trading is available 24 hours a day, 7 days a week. Orders are received and processed during the business opening hours with most online shops dispatching the items the same day for next day delivery. For the owners and operators of these online technologies, there are no hefty upfront costs to begin trading and maintenance costs are minimal. Other advantages of online shopping include open accessibility for those with limited mobility.

Social Networking and Other Network Communications:

Web applications such as Facebook and Twitter are bringing every kind of social group together in one place. Social networking is still in early development stages and we will see some major enhancements within the next 5 years. The most notable benefit of social networking is the provision of free access to online communication services. Users everywhere can access social networks and contact other users via the Internet virtually free of charge provided an Internet connection is available.

Businesses build credibility using social networking sites by keeping in contact with their customers via social networking sites. Businesses definitely can gain the customers' confidence if they can connect to them on both a personal and professional level.

Despite increased workload, the collective benefits outweigh the drawbacks and it’s always a great idea for businesses to take advantage of these communication applications.

Advanced Software for Enhanced Functionality:

Application packages designed for graphics, video, music, finance and business enable users to complete advanced projects using the functions and features of the software package. Developers utilize advanced software packages to create or edit material with the purpose of publishing or distributing the contents. SDKs or software development kits (usually coded by manufacturers such as Apple and Microsoft) are pre-packaged software development tools used by developers who would like to take full advantage of the available functions of the corresponding operating system.

However, in spite of the many advantages of computers, there are some disadvantages that cannot be ignored. Arguably, these disadvantages outclass the advantages because of the potential long-term effects.

The Disadvantages of Computing – Summary

Computers have made it possible for individuals to work independently on projects or tasks without the need to work collaboratively with others. Because of this, basic communication and interaction skills are deteriorating and computers are beginning to change the way we work, socialize and interact. Additionally, there are many other aspects contributing to the disadvantages of computing.

Ambiguity (Loss of Context):

Computers cannot truly represent information that is presented through the screen. For example, the context of an email maybe interpreted differently by different individuals and the essence of the subject can become ambiguous. This can be a huge problem, especially where an emotion or expression is trying to be expressed. Additionally, basic communication has deteriorated as a result of online communications.

Efforts in Academics:

When computers and other technological tools are used constantly, students develop a dependence upon these tools. It is now common for students to research their topics online and use this information in their work presenting it as their own. As a result, students have become heavily reliant on the information available online and are beginning to lose basic reading and navigation skills. Additionally, the amount of information available on a topic is endless and ever changing, because of this, workload productivity has decreased.

Health Risks:

Prolonged use of computers can affect ones physical and mental health. If a workstation is not ergonomically designed, the user can suffer from injuries such as RSI (repetitive strain injury) and blood clots in the leg, more commonly referred to as DVT (deep vein thrombosis). Other health risks include neck strain, eyestrain, persistent headaches and migraines. There are also mental health risks of computer usage including addictions to computers and the Internet, addictions to cyber pornography and cyber gambling and addictions to online gaming, all of which severely affect the state-of-the-mine of the individual.

Costs:

The initial costs of computer equipment (and other peripherals) are high, and this is an issue for individuals with financial priorities. Computers are decreasing in cost and they are more affordable today than ever before but the issue of financial status and availability still affects the market share and accessibility.

Varying Computer Literacy in Academics:

Computers present an added challenge to educators because teachers must deal with students of varying computer literacy levels. Some students attend classes with prior knowledge of computers and computer packages and are able to complete tasks assigned with ease whereas other students have no prior experience. It is difficult for teachers to deal with this vast difference and ensure that they provide students who need assistance with that assistance while not requiring capable students to slow their academic progress and wait.

Psychological Risks – Cyberpsychology:

The psychological and sociological impacts of computer usage are huge. Individuals are becoming increasingly dependent on computers to help manage their lives, complete their work and to socialise. While time spent using a computer can be hugely productive, compulsive Internet and Computer use can interfere with daily life, work, and relationships. Individuals are becoming addicted to computers and the Internet and this is having a major impact on their state-of-mind and reality.

Cyberpsychology

The developing field of Cyberpsychology encompasses all psychological phenomena that are associated with or affected by computers, the Internet and emerging technology and whilst time spent browsing online or using computers can be hugely p3roductive, compulsive Internet or computer use can interfere with our daily lives, our work and our relationships.

Addictions to Computers and the Internet

The Internet provides a constant, ever-changing source of information and entertainment and it can be accessed from most smartphones, tablets, laptops and computers. Each individuals Internet use differs. Some may need to use the Internet extensively for their work whilst others may rely heavily on social networking to keep in touch with distant family and friends.

Extensive periods of Internet or computer usage only become a problem when it absorbs too much of your time. As a result, some individuals begin to neglect their relationships, their work, their academics and other important things in their lives.

Case studies have observed how individuals have turned to the Internet in order to manage unpleasant feelings such as stress, depression and anxiety. By losing yourself online, you can temporarily nullify these feelings. However, as the individual becomes conditioned, in order to alleviate their feelings, they begin to use the Internet extensively to reduce their negativity.

Internet addictions are unique and differ from other addictions in that they involve interactions with other individuals via a computer system and as a result, individuals who are struggling with Internet addiction may feel as if they are benefitting from being online and from spending extensive periods in chat rooms, reading emails or playing games.

Case Study: Lisa, 41

Lisa, a divorcee in her late 40s with no children of her own began spending more and more time online after her divorce. As a natural introvert, Lisa found the innovation of the Internet particularly suitable to the way she liked to interact with other individuals. Lisa’s social interactions online were quite wide and she had made many online friends despite having no friends in real space. As Lisa began to use the Internet for longer periods, she did not see anything wrong with this until she discovered that someone she considered a friend had deceived her about his or her true identity. As a result, Lisa became severely depressed, but despite her depressive state and the knowledge that continuing to use the Internet would make her feel worse, she could not seem to stop herself form going into the same chat room her ‘deceptive’ friend was in. Lisa eventually decided it was time to talk to a counselor about her Internet addictions and about her inability to discontinue Internet use despite wanting to do so.

Her counselor Ronnie began by asking her how she felt her social life flourished as a result of spending time online. Progressively, her gently questioned her about how much time she spent online and what other activities she engaged in, aside from the Internet. Lisa did not engage in any other activities apart from the Internet. Ronnie pointed out that Lisa seemed to have very little social interactions outside of the Internet and he challenged Lisa to discover other activities she could turn to in order to supplement the time she spent online. To begin this challenge, he asked Lisa to come up with a list of things she would like to do in place of going online.

As Lisa attended her therapy sessions, she soon began to understand that just because she felt the impulse to go online, she didn’t have to act on this impulse. In replacement, she learned about many different types of activities and by her 6th session began taking a gourmet cooking class. She learned that she was a good cook. Lisa also began dating after over 10 years of being alone. As time progressed, Lisa was spending almost no time online and more time out enjoying herself with friends in real space.

This case study observed Lisa and her compulsive behavior when using the Internet. After her divorce, she began using the Internet to manage her depression and stress and as a result became addicted. After recognizing her addiction, she consulted a professional who was able to discuss her addictions with her and gently encourage her to replace these impulses with other activities. Eventually, Lisa recovered and spent almost no time online.

Case Study: Greg, 23

Greg, a young man in his early 20s loved to play online games. He had recently enrolled in university to study History, but as soon as he discovered World of Warcraft, Greg began missing classes and he started failing his semester. Instead of studying, Greg decided to defer from university and get a basic job so he could spend all his spare time online and despite making his parents unhappy and making family get-togethers uncomfortable, he continued to play the game. As Greg played for longer periods, he found that he preferred to play the game rather than see his family or friends. Eventually, he stopped going to family gatherings and ignored most social invitations. Greg was soon playing his game late into the night and was on average surviving on just less than 2 hours of sleep each night.

As Greg reached his 24th birthday, he realized that he had not been on a date in almost three years. Greg was always exhausted from lack of sleep and was already on his second warning at work. He hardly saw his family and rarely spoke to friends. Greg began feeling guilty for neglecting his family and was starting to recognize the negative impact of his gaming addictions. As a result, Greg tried to cut down the number of hours that he spent playing his game but despite his efforts, instead of being able to play his game less, he found himself feeling anxious and depressed until he eventually gave in to the impulse.

Progressively, Greg found himself preoccupied with playing World of Warcraft and he eventually lost his job because he was constantly late and missed entire shifts. With no income, Greg found himself unable to pay his rent or his utilities. Without ever intending to, he found himself cut off from his favorite game and from his online friends. Greg became aggressive and on several occasions, attacked his mother and brother. Greg’s family urged him to seek professional help. He eventually accepted he was an addict and consulted a psychologist.

On Greg’s first visit to his psychologist Steve, he was surprised to discover that Steve was quite willing to listen to him and let him tell his story, instead of moralizing about how selfish his behavior was. After his 3rd session, Steve challenged Greg to make a list of what was great about World of Warcraft and where he could find those qualities in alternative activities.

As Greg progressed through the therapy sessions, he found that Steve was very compassionate and understanding. He was even willing to play the game to understand what Greg found appealing about it. Steve continually challenged Greg’s sense of the word and constantly reminded him that the world was bigger than World of Warcraft. Steve even pointed out that maybe one of the reasons Greg was not dating regularly was because the girls he dated were afraid to compete against a game that was always present. After several sessions and several weeks of thinking over this particular point, Greg had to admit that if the roles were reversed, he wouldn’t put up with the behavior either.

Once Greg made that admission, he began to re-examine the amount of time he invested in the game whilst questioning the reasons to why he plays it. Greg realized that the reason he was so attached to the game was because he didn’t know how to relate to over people very well, he lacked confidence and found it very difficult to sustain a conversation. He discussed this with Steve who offered to help teach him better social skills and how to deal with uncomfortable feelings of anxiety that slowly drew him to playing the game instead of dealing with the social situations he found difficult.

As Greg approached the end of his therapy sessions, he found he was playing the game less and less. He was out finding new friends and learning how to adjust to social situations. Greg made a full recovery 2 months after the end of his therapy sessions. He re-enrolled at university and was working part-time once again.

This case study observed Greg and his gaming addiction. Greg enrolled at university to study History but as soon as he discovered World of Warcraft, he began missing classes and failing his semester. Eventually, Greg decided to defer from university and get a basic job so he could spend his spare time online. He stopped going to family gatherings and ignored most social invitations. As he reached his 24th birthday, he realized he had not been on a date in almost three years. He hardly saw his family and rarely spoke to friends. He began to feel guilty for neglecting others around him and decided to cut down the number of hours he spent playing his game. Despite his efforts, he found himself feeling anxious and depressed until he gave into the impulse. Greg lost his job as a result because he was missing entire shifts and was constantly late. He was unemployed and was disconnected from his favorite game without ever intending to. Greg started to become aggressive and on several occasions, attacked his mother and brother. His family urged him to seek professional help until he finally accepted he was an addict. Greg was referred to psychologist, Steve who would help him conquer his addiction. Steve began by asking Greg about his story and gently challenged Greg to make a list of what was great about World of Warcraft. He would then ask Greg where he could find those qualities in alternative activities. As his sessions progressed, Steve noted that Greg maybe afraid to approach social situations and this gaming addiction was a result of this lack of confidence. Steve offered to help teach him better social skills and how to deal with uncomfortable feelings of anxiety. As Greg approached the end of his therapy sessions, he found he was playing the game less and less. He was out finding new friends and learning how to adjust to social situations. 2 months after the end of his therapy, he re-enrolled at university and was working part-time. He no longer played the game.

Analysis of Case Studies

In both of these case studies, the individuals go through intra-psychic stages:

Alter behaviour due to outlining issues

Experiencing the addiction

Realization of the addiction

Identifying the causes of the addiction

Rectifying the addiction

These intra-psychic stages differ between individuals dependent on their personality type, their gender and their cultural differences. Other variations include aggressiveness, susceptibility to compulsion and individuals with limited cognitive development.

Research has shown that individuals susceptible to depression, stress or anxiety will become addicted to the Internet in order to alleviate these negative feelings. However, individuals who are affected by these negative feelings are unaware that whilst these feelings maybe temporarily alleviated, repeating this behavior can seriously affect their psychological health.

In the first case study, Lisa was single, had no children and her divorce was still affecting he mental state. Lisa outlined this research in her experience; she admitted to using the Internet to help her manage her negative feelings and in one instance, the case study explains how she was deceived online and as a result became severely depressed, but despite her depressive state, she continued to engage with the person who deceived her in the first place. The behavior becomes compulsive and despite Lisa’s awareness of her mental state, she has conditioned herself into believing that by using the Internet, it will alleviate her negative thoughts. Lisa eventually decided it was time to talk to a counselor about her Internet addictions and about her inability to discontinue Internet use despite wanting to do so. As Lisa attended her therapy sessions, she soon began to understand that just because she felt the impulse to go online, she didn’t have to act on this impulse.

Similarly in the second case study, Greg was a young, single man who deferred university to invest his time in playing an online game. He eventually lost his job and had no social life outside of the virtual world. Greg was depressed and at times became very aggressive towards his family because his compulsions were deeply programmed and this may have had long term effects on his learning development and perception of reality. Greg eventually accepted he was an addict and consulted a psychologist. As Greg approached the end of his therapy sessions, he found he was playing the game less and less. He was out finding new friends and learning how to adjust to social situations.

Links to Dissociative Identity Disorder

Dissociative identify disorder is characterized by at least two distinct and relatively enduring identities or dissociated personality states primarily responsible for altering or controlling a person’s behavior. Research shows the disorder is characterized by identity fragmentation rather than a proliferation of separate personalities and because of this has been more recently associated with Internet compulsions and linked to personality types in cyberspace.

When the individual is under the control of one identity, they are usually unable to remember some of the events that occurred while other personalities were in control. The variation in the identities may exhibit differences in speech, mannerisms, attitudes, thoughts and gender orientation. In some severe cases, the variation may even differ in physical properties such as allergies, right-or-left handedness, or the need for prescription glasses.

Case Study: Bradley, 16

Bradley, 16 a secondary school student was diagnosed with dissociative identity disorder in 2011. Bradley was bullied at school and was often assaulted and abused by other students because of his financial status and his living situations. At 10 years old, Bradley’s parents were killed in a car incident and Bradley was taken into care. Up to the age of 10, Bradley’s cognitive development was healthy. He was a high achiever and was preparing for secondary school. When his parents died, Bradley became desensitized. He would not interact with anyone around him and at times refused to eat. He became increasingly aggressive and was eventually admitted to a mental health institute.

The link between the addiction to the Internet, personality types in cyberspace and dissociative identity disorder were very recent and because of the lack of research, psychologists found it difficult to understand why Bradley developed two personalities.

His first personality was aggressive and suicidal. On several attempts, Bradley tried to kill himself and was incredibly aggressive towards anyone that tried to discourage him. Psychologists were forced to use drugs to relax Bradley and put him into induced comas. Consultants were concerned for Bradley’s health and quality of living and advised doctors to encourage Bradley through communication instead of administering Sodium thiopental, a drug used to induce comas. As the psychologists became familiar with Bradley’s behaviour, they noticed he was using social networks on his laptop and one of the psychologists suggested that Bradley maybe being bullied online and as a result has developed this personality as a defense mechanism to cope with the stress and depression. Psychologists decided to block access to the social network Bradley was accessing. Bradley became incredibly violent, he was disconnected from what seemed a compulsion and as a result inflicted his aggression on the staff at the institute. Bradley’s frustration and anger eased moments after he had an outburst. At this stage, he was using search engines to find other chatrooms to interact with individuals online and he eventually stumbled across a private chat network. This chatroom was dedicated to teenagers with issues in their lives. Individuals were incredibly friendly towards each other and enjoyed sharing their feelings via a medium where emotions could not be interpretted. Psychologists noticed that Bradley’s behaviour began to change. He was happy and very friendly. His attitudes and thoughts were positive and his communication excelled. Psychologists were convinced that this was Bradley’s true identity, but nonetheless a variant in the personalities. When psychologists asked Bradley about his outbursts, his suicidal thoughts and his aggressive behaviour, he was completely indenial and had no knowledge of ever acting in this manner.

The consultant psychologist suggested that the reason Bradley’s personalities varied so much was because he found it difficult to separate the virtual world from the real world. In the virtual world, Bradley was not judged for his weaknesses and he was able to express his feelings without becoming frustrated. In the real world, when Bradley would try to express his feelings, people would laugh, ignore and in some cases abuse him. As a result, Bradley’s personality in the virtual world reflects into the real world if he is satisfied with the response he receives.

Bradley is still receiving treatment for his condition but is beginning to make some improvement.

Personality types in Cyberspace

The psychological features of any online environment will shape how the person or group will behave in those realms. The primary dependence of these features will always be determined by how they interact with the characterisitcs of those people or groups in those enviroments. Cyberspace is a psychological extension of the individual's intra psychic world. It is the one medium that can stimulate the processes of projection and transference that can alter the sensory experiences and can even in some cases create a dream-like state of mind. Cyberspace has the power to influence the emotions of the individual, change their perceptions of topics and has in many cases altered their behaviour.

Whilst over 50 known personality types have been identified, only a selection applies to cyberspace.

Personality Type A – Passive-Aggressive Personality

Passive aggressive behaviour takes many forms but is generally described as a non-verbal aggression that manifests in negative behaviour. This type of personality is popular online as there is no exchange of verbal communication. Passive-aggressive personalities tend to write indirect messages on social networks with the intent of the person who it is directed at to read it. Passive aggression is when the behaviour is more persistent and repeats periodically.

Examples of Passive-aggressive personality in Cyberspace:

In the picture below, a tenant has added their letting agency as a friend on a social network. Their tenant has then accepted their request and has posted a message on their wall saying, ‘Thanks for adding us’. The tenant has responded sarcastically and has replied saying, ‘No problem I did it because you’re useless and ignore my texts and emails so I thought I would try this. Fix our shower it’s been broke since we moved in.

This behaviour would be considered passive-aggressive in cyberspace. The tenant is expressing his or her frustration sarcastically on a medium where everyone can see the conversation. The tenant has not been aggressive towards the letting agency but is simply highlighting the evasive problems and issues.

Passive aggressive characteristics can include but are not limited to:

Non-communication: Where there is clearly something problematic to discuss.

Avoiding/Ignoring: When you are angry and you feel you cannot speak calmly.

Evading problems and issues.

Procrastinating: Putting off important tasks for less important ones.

Obstruction: Deliberately stalling an event or process of change.

Fear of Competition: Avoiding a situation where one party will be seen as better at something.

Ambiguity: Being cryptic, unclear and/or not fully engaging in conversations.

Personality Type B – Dissociative Identity Disorder

Dissociative identify disorder is characterized by at least two distinct and relatively enduring identities or dissociated personality states primarily responsible for altering or controlling a person’s behavior.

Refer to page 73.

Personality Type C – ICD10 Type

The ICD10 type personality is most commonly linked with pedophilia and online predators. The ICD10 defines paedophilia as "a sexual preference for children, boys or girls or both, usually of pre-pubertal or early pubertal age". This type of personality develops online as a result of the psychiatric disorder possessed by paedophiles. Because of the Deindividuation properties of the virtual world, online predators are safeguarded and their true identity can always be masked. The personality type is a developmental behaviour and is not encouraged by computers or the Internet.

Case Study: Jennifer, 13

On the 12th of February 1999, Jennifer was raped by an online predator. Jennifer used to go online a lo



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now