Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Tuesday, October 22, 2013

Digital media as a venue for reasoning has remained a continuous debating issue as to whether it benefits the society to improve their reasoning capacity or it impacts them. Digital media has increasing become widely used in all sectors across the globe. It has become a medium for making communication effective, learning and other varied activities. Digital media takes varied form including the Internet, magazines, television, mobile phones, radios, newspapers and social networking sites. All these are forms of social media that have contributed to varied changes on the way organizations and people communicate or exchange information. Many scholars have come up with their ideas about the effect that media contributes to the society. Other has come up with logical fallacies while others have tried to balance the rhetorical issue of the effect of media to social issues. Some of them argue that digital media in the age of technology have impacted teens; thus making them more stupid than smarter (Carr 341). This is because digital media alters the way many people think, write, read and communicate. Although media provides valuable information and makes communication easier; too much dependent on digital media affects the health of individuals, privacy issues and contributes to cultural biasness.

Digital media are effective because it makes communication easier and cheaper, but too much reliance on digital media has affected social issues. This is because media nowadays have altered the brain of many people; thus they no longer reason the way they used to reason. They way people read, write or communicate nowadays have significantly changed. Carr (340) reveals that technology has made many people stupid, and it has altered the way their brains functions. For instance, students have developed different language of communicating and even writing styles have totally changed. This has impacted social issues because the brain of many teenagers has now adapted to the new ways of reading, writing and communication styles. The shortening styles of texts affect the academic performance of students because most of them become used with such text; thus contributes to poor performance because of grammatical errors.
Digital media has affected the reasoning on significant social issues; thus contributing to increased violence and unethical behaviors. Many teenagers spend most of their time in social media such as televisions or play video games on computers. This has contributed to increased violence because some video games are dangerous to teenagers; thus they contribute to violence behaviors in the society. Other develops unethical behaviors especially bad sexual behaviors due to watching pornography or love movies. Other unethical behaviors may include smoking, and use of drugs because teens want to gain adequate energy to continue surfing or chatting with their friends.
Digital media has contributed to increased health issues such as stress and poor health relationships. Poor health relationship in this case results due to relationship made through social networking sites such as Facebook, MySpace, Twitter and many others, which leads to stress and loneliness. Stress may result in case one partner may break up with their partners, and this can sometimes lead to committing suicide (Winget and William 83). Many teenagers are among the groups that fall in poor relationships that affect them emotionally. Young generations spend most of their times login into social networking sites and creating profiles and publicly articulate their relationships with others.  Other teenagers write extensive comments on their profiles some of which contributes to social conflicts and others are demoralizing.

Moreover, some teenagers spend most of their entire time on social networking sites and cellphones to interact with their friends. This has led to increased social disorders and contributed to health issues such as obesity among others. Obesity is one of the diseases that have become common among teenagers. This is because they spend most of their time on social networking sites than doing core activities or exercises. Others use cellphones to hyper text; hence many of them have developed health complications. Some teenagers have ended up becoming drug addicts because they use drugs such as marijuana and cocaine. This will make them hyper so that they can spend a lot of time to hyper texting with their friends.

It may lead to loss of privacy issues especially some digital such as televisions, radios and even some magazines try to provide information of a certain celebrity. Many teenagers are interested in watching films or music and invite other peers to join the sites for these musicians. Many of them may begin to participate due to social and opportunity to craft personal representation in the popular community of celebrities. Many teenagers love to envisage the social globe through using their profiles. They also adopt certain strategies, and many of them prefer to connect with celebrities who they adore. For instance, Twitter, MySpace and Face book have become among the prominent social networking site for many high school students or teenagers across the globe. Therefore, these sites tend to follow cultural and linguistic aspects that have contributed to varied social issues in the contemporary society.

Some digital media such as televisions ads magazine and movies may contribute to cultural biasness. The issues of cultural resonance have been impacted because of the prejudice created upon watching such social media. Cultural biasness arises when the viewer creates cultural prejudice when watching movies such as Hollywood or African movies. This is because everyone interprets his or her own ideas or they may create a negative picture in mind about a certain culture. These media can also create an implication on identity of a particular society. While the engagement in these social media sites may connect people through social networking sites and promote a global village, it may contribute to loss of culture (Ghorbani and Rosemarie 367). This is because the social media enables people to interact through sharing a common language, which is English; thus contributing to cultural erosion.

Moreover, social media such as add magazines or advertisement posted on social sites or television contribute to gender issues. In most cases, some advertisement contributes to gender issues in that many advertisers may post the picture of female when making an attempt of promoting certain products such as cosmetics. Some of these pictures are sex, and most of them contributes to genders issues especially loss of self esteem to femininity. The advertisers can also use skewed beauty images that are posted on the social media sites with an aim of promoting their business. However, the skewed ad may send a negative image to the viewers and some of them may interpret the image in a negative way. For instance, the skewed beauty pictures of women may send a message of gender issues by viewing women as sex objects.

Social media such as Twitter and Facebook has changed the way people interact in the society. It has led to loss of the traditional method of communicating such as face to face method; thus impacting the way people socializes or interacts with their friends (Ghorbani and Rosemarie 363). For instance, many people can express themselves when they are chatting with their friends, but when they met, the fail to express themselves in front of their friends. Lack of face-to-face interactions may contribute to communications barrier because some people may be able to understand effectively when on use facial expression. Furthermore, one may be able to determine of interpret the feeling of the other partners when they are communicating face to face.  Therefore, these social media sites lead to loss of effective communication because many of people lack effective communication speech.

Although, digital media have contributed to varied social issues, it has contributed to varied social aspects in transforming the society. First, it has made communication easier and cheaper because many people can nowadays communicate with other in far distance through simple texts and sending e-mails. It has also improved learning and enabled students to carry out their research work effectively. This is through the use of e-books and Internet; thus enabling them to find information faster than search in books, in the libraries. Social media such as online magazines, Internet such as news and blogs have contributed to a national disaster relief. For instance, people use their cellphones to send their donations to where disasters have taken place. Lastly, social media such as social networking sites have united many people across the globe; thus contributing to a global village.

In conclusion, even though media provides valuable information and makes communication easier; too much dependent on digital media affects the health of individuals, privacy issues and contributes to cultural biasness. Digital media has led to varied social issues including increased violence, unethical behaviors, health complications, cultural biasness and privacy of celebrities. Many of the teenagers no longer reason the way they used to before the introduction of technology; thus contributing to poor performance in schools. Although, digital media have contributed to varied social issues, it has contributed to varied social aspects in transforming the society. It has made communicate easier, contributed to a national disaster relief, improved learning activities, and it has linked many people across the globe; thus contributing to a global village.
Introduction to the Problem
Technology advancement has nowadays changed the lifestyles of many people in the society. The most people who have been impacted by technology are the teens. The teen of the contemporary generation spends most of their time on computers, phones and other technology devices.  Almost every house in the current society has technology, and this becomes easy for the youths to have easy access to technology. The teenagers have become dependent on technology, and it has become inseparable in the daily lives of many people. Everywhere people carry devices or gadgets such as phones, laptops and other technology devices for communication or other purposes. People use technology for varied activities, but the most common purpose for teens is for communication r interacting with their friends. The research indicates that technology has increased, and many teenagers have become heavily dependent upon them. Although too dependent on technology have contributed to social disorders due to addiction, it has significantly contributed to laziness; thus many teenagers have become stupid.

Why Too Dependent on Technology Is a Problem

Too much dependent on technology has contributed to increased laziness among the tanagers, and many of them have become more stupid than smarter. Technology makes work easier, but many teenagers have become lazy because of the overreliance on technology. Many of them cannot perform assignment or carryout research without using Google to find information. Therefore, many teenagers do not have time to read and explore books into details because they believe that, with the Internet, everything is possible. Carr argues that the Internet and other technologies have changed the way people perform tasks; thus he asserts “am not thinking the way I used to think” (Carr 340). Many teenagers spend most of their time on technology; thus it has changed the way many of them write or speak. This has contributed to another consequence of poor performances in schools.
Technology has led to significant changes in the learning environment because of the new writing and learning styles. Many teenagers spend their time on social networking sites in order to communicate with their friends. This has led to new development of writing and communicating styles. This is because of hyper texting that enables many of them to shorten words in order to write many text messages. This has led to a new way of pronouncing letters; thus contributing to poor performance in schools. The research study indicates that those students who spend most of their time in social networking sites or the Internet have poor performance records than those who do not spend their time on technology (Ghorbani and Rosemarie 364). This is because they do not have time to read, and some of them have developed a style of reading because of “power browsing” across the contents and abstracts for quick wins (Carr 342).
The increased technology has solved communication problems, but it has affected personal interaction. This is because many teenagers rely on the Internet and social networking sites to communicate with their friends, but they cannot express themselves in front of others. Irvin (37) argues that technology has made communication cheaper, but it has replaced face to face communication, and this has profoundly impacted self esteem of many teenagers. This is because they can chat with friends across the globe, but they fail to express their views in front of others.  Technology has impacted communication skills, and it has contributed to the problem of understanding personal interactions. The reliance on technology for communication has significantly contributed to detrimental in formation of health relationships. It has also led to dangerous likelihood of cyber bullying and other associated consequences.
Technology has also impacted the health of teenagers because of addiction. Many teenagers have developed health complication issues such as obesity, social disorders such as increased stress and other related issues. Stuart (2012 pr. 1) argues that technology has contributed to teen obesity, which can lead to a serious health complications in the future health of the teens. Some of them have suffered from stress due to social networking site issues such as bullying or long distance relationships; thus their healthy are at risk. Many crime issues are committed through social networking sites; thus many teenagers have become the victim of crime issues. For instance, many criminals use technology to trick teenagers who may end up revealing to them the personal bank details of their parents. This is common in the contemporary society because criminal tease teenagers because they know that they can offer full details or information about the bank details of their parents.
Increased violence among teens and unethical behaviors have increased because of technology advancement. Many teenagers watch violence movies and play games that contribute to violence in society. For instance, some vicious movies contribute to crime among the teenagers because some of them try to act exactly on the way they saw in the computers or televisions. This has led to cases of crimes and increased number of juvenile in jails. Technology also contributes to unethical behaviors such as bad sexual behaviors and increased use of drugs. For instance, many teenagers engage in unprotected sexual behaviors while other use drugs such as marijuana and cocaine with an aim of getting energy to hyper text or interact with their friends for long hours. This has led to deterioration of health of many teenagers in the contemporary society.

Solution to the Problem
Parents and teachers should take action to the information gap and offer guidance or counseling to the teenagers in order to help them cope up in the technology age. Parents and teachers should work together in order to help youths to cope up in the technology age. They should restrict teenagers from spending too much time on social networking sites and other technology devices. They can also educate them on the impact associated with too much dependent on technology. Parents and teachers should motivate teenagers to work hard and offer guidance to those who spend on technology. For instance, teachers can offer students assignments to help them improve their writing skills and encourage them to use books and write instead of typing. This will motivate teenagers to improve their writing kills and learning skills. Parents should also help their children to understand the effect that technology contributes to their health.

The Way of Implementing the Solution

One of the significant ways of implementing the solution is through organizing debates or using mass media to communicate about the problem. This is essential because it will raise awareness and educate teens on the way technology can impact their communication (Cellular News 2007, pr.2). Debate about the problem can benefit many students; thus teachers can encourage students in school to participate in debate issues. This will enable them to learn about the way technology can benefit them in case they utilize it effectively. Debate issue or organizing for television or radio talks program can enable many teens to understand the need of avoiding high dependent on technology. However, parents and teachers can work together to raise education awareness on the impact technology contributes to teenagers in case they heavily rely on it.
For the last decades, Smartphones operating system safety have been spotted over blog posts and other publications. Over the last 5 years, with the innovation of windows pone 7, Android and iOS, the research have also been published in the academic sphere on individual security mechanism across the platforms. Egners, Marschollek and Meyer (2012, p.3) reveal varied challenges that Smartphone users have encountered for the last decades including threat to security, which arises due to disruption and modification of the user data. The apps have been subjected to malware practices; thus their activities are limited to local information accessibility via address book, short messages and data transmission networks.

Moreover, the threats against security for Smartphones have tremendously increased for the past decades. The attacks are rising every year because of increased hacking against technology. The research survey report carried out in 2008, revealed that about 160, 000 portable devices were subjected to security risks because of low-tech solutions (Egners, Marschollek and Meyer (2012, p. 12). The Smartphone malware practices have become commonly distributed via the application stores, which have poor security. The malware risks mostly occur due to update attack whereby the authenticity applications are later altered to include the malware components. Furthermore, the software acquired directly from web links also distribute a virus known as malvertizing, and this have been the greatest threat to security of Smartphones.

Typically, a common form of malware practices, which have become also the greatest threat to Smartphone, is the additional software instalments that target communication system, information privacy and personal identifying information. For instance, in the year 2010, the first malicious activities on Smartphone were detected. The fake operating system known as the SMS Trojan was discovered, which had already infected varied devices that utilized that operating system. Egners, Marschollek and Meyer (2012, p. 14) argue that the number of Android malware practices increased to 76 percent by the year 2011.  It was noted that the Android malware practices, which acts as a spyware increased from 40% during the year 2009 to 72 % during the year 2010 because of SMS Trojans. The research study conducted on the security issues revealed varied treats to security in the Smartphone enterprises (Winder 2011, pr.5). Although Smartphones have been among the leading mini-computers, they have created potential havoc and exposed many companies to risks. The issue behind maintain security of Smartphones is rhetoric because of the increased security threat, which is rising every day.  The biggest threats to Smartphone security include the information theft, new malware activities, wireless attack virus, Bluetooth and Wi-Fi security threats; thus, organizations should put security policies for accessing corporate information.

Despite the high rate of Smartphones security threats, there is need for future security advancement for Smartphones. This is because the malware practices continue to rise due to increased technology advancement. Therefore, the future importance and effectiveness of Smartphone security exploits can reduce security vulnerabilities. One of the effective ways of security exploits is device-based Smartphone application vulnerability exploitation. Thus, vulnerabilities should be overcome through authentication and session management (Winder 2011, pr.6). For instance, the company can reduce password complexity issues through restricting usability and test the authentication mechanism to avoid future security risks. It is also significant to use biometric security and cognitive fingerprints; and these are among the new exploits that will make Smartphones more secure.
Ethical hacking as a risk management technique is the use of programming skills in determining vulnerabilities in the computer system. There are varied types of ethical hackers including the White Hat, Black Hat and Grey Hat; thus both focus on building a risk management program effective for eliminating vulnerabilities. The rapid advancement of technology has brought many constructive and significant solutions to the life of people. New areas of research have tremendously increased in e-commerce, electronic activities and information sharing areas. However, with the increased technology advancement, there have been a growing number of cybercrimes and criminal hacking activities. Businesses and other Internet users are nowadays scared of computer experts who will offer risk management through penetrating into their web server to offer adequate security. Therefore, there is a need for computer science students to advance their ethical hacking techniques in order to fight against the increasing problems of criminal hacking. 

Project Goals
•    The project attempts to offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations.
•    It identifies the risks resulting from hacking and offer effecting hacking methods that hackers will employ to manage organizational risks. 
•    It analyses the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking. 

LITERATURE REVIEW

This chapter will employ varied literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. Tiller (2005) offer varied methodologies and unwritten convention that ethical hackers should employ in order to offer the maximum value to companies that want to manage organizational risks. The author reveals the technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. Jahankhani (2010) also reveals the way cybercrimes has become one of the biggest problems in many industries across the globe; thus reveals varied aspects including implementation, investigative techniques and criminal intelligence in fighting cybercrimes. The author aimed to educate the academia members, public and private sectors, as well as, students on the way to overcome cybercrimes issues. Logan and Clarkson (2005) reveal the significant need to educate computer science students to hack; thus enabling them to become experts in managing risks or vulnerabilities arising from hacking activities.

HYPOTHESIS
Hacking will likely to pose risks such as exposing sensitive user data and risk user privacy; thus making information vulnerable to illegitimate use and manipulation. Therefore, it triggers theft of critical business information because important information may be lost in the process hacking. This is because hacking can convert computer into zombies; thus contributing to spamming and phishing activities. Therefore, the core hypothesis of the project is to examine the extent of risks arising from hacking: to risks triggers; thus determining effective solutions for risk management.

RESEARCH METHODOLOGY AND DESIGN
The researcher will employ both qualitative and quantitative research design methods of attacking a computer network. The hacking methodologies will describe the process that the ethical hacker will employ in a tacking the computer system, and the risks that may arise from employing varied hacking methodologies.

QUALITATIVE RISK ANALYSIS
The researcher will employ qualitative methodology to examine the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking activities. This method offers a foundation for a focused quantitative analysis or implementation of a response plan.

Risk Ranking
    The researcher will use qualitative risk analysis method in ranking the risks that may arise from ethical hacking. Risks can be categorized in different ways including risks from the project source, area impacted and risks arising in the project phase. Qualitative placing of risks in categories will enable the researcher to find the common cause of the risks surrounding the project. The overall risks ranking that may arise in the project may be determined through summing up the individual risks and the common risks causes surrounding the project such as inadequate project resources or financial risks.

List of Prioritized Risks
The researcher will list prioritized risks that may arise and these will include financial risks for developing the project, the cost of monitoring the project and the impacts that the project will pose. The impact may include loss of sensitive information, false sense of security and being given a snapshot of what is taking place.

List of Risks for Additional Analysis and Management
The additional risk may include project and business risks arising from ethical hacking services. Thus, the management aspects can include employing varied testing methods such as black, white and grey box testing. Black box testing exposes the project to less risk, less cost and it offer real world results. White box testing is more holistic ways of analyzing risks and it is effective, but Grey box testing balances the cost/time of the project. Therefore, customers understand the business challenges; thus developing strategies for mitigating the risks that they present.

QUANTITATIVE RISK ANALYSIS
Sensitivity Analysis

Quantitative risk analysis will help the researcher to make significant decision of developing a new risk management plan within the budget limit. It is crucial to present a well-prepared quantitative risk analysis in order to soothe the needs of the management. Therefore, the chance of success for the project approval will be greatly increased by practicing due diligence of collecting enough corroborating data.

Prioritized List of Quantified Risks
It is vital to prioritize the list of quantified risks that will result in the process of developing a management risk place of ethical hacking. The research will conduct a risk assessment and vulnerability study in order to determine the risk factors that may arise in the process of quantitative risk analysis. The research can conduct a safeguard cost or benefit analysis through determining the risks that may arise from ethical hacking activities such as loss of organization sensitive information and the legal aspects that may be posed towards risk management process.

Probabilistic Analysis of Project
The researcher will carry out survey in order to determine the way Internet users are frequently attacked by hackers. This will en able them to determine the percentage of unauthorized access or misuse of websites; thus employing effective management tool for reducing vulnerabilities.

SUMMARY AND CONCLUSION
Recommendations for New Research

    There is need for future research on the ethical hacking because cybercrimes is still on the increase and many researchers have not provided effective analysis on the way one can minimize risks that rise due to increased cybercrimes issues. Therefore, the future research should further offer adequate analysis on the way ethical hackers will implement effective risk management plan that will enable Internet users to protect their information from hacking issues. 

Conclusion
In conclusion, computer science students should advance their ethical hacking techniques in order to fight against the increasing problems of criminal hacking. The research purpose was offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. The literature materials revealed the need for technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests.  The core hypothesis of the project was to examine the extent of risks arising from hacking: to risks triggers; thus determining effective solutions for risk management. The researcher employed both qualitative and quantitative research design methods of attacking a computer network. Thus, there is a need for future research to offer adequate analysis on the way ethical hackers will implement effective risk management plan, which will enable Internet users or businesses to protect their data from hacking activities.


Companies such as Kodak are awarded patent rights to protect their exclusive use of technology in order to compete with their rivals; thus achieving a competitive advantage. A patent right can secure an exclusive rights of an inventor to an invention for more than twenty years; hence achieving a competitive advantage. This can eventually enable the company to acquire a temporary monopoly for its products; hence allowing it to reap high profits in the competitive market. However, in case the patent expires, other companies are free to duplicate the invention. Although patenting an invention is not a guarantee that the company can achieve success, it can be profitable in case the company succeeds in business activities. Eastman Kodak has made significant efforts of surviving in the competitive global market; thus it relies on patents, as its source of income in the digital economy. Since the year 2004, Eastman Kodak has not been profitable apart from this year; hence the company has tried to find their way into the digital economy. Thus, the company has sued many companies such as Samsung, LG Electronics and it is currently battling with Apple Company for licensing fees as a way of raising cash.

Kodak has to sue companies that infringe on its patents because they want to receive settlement money. Kodak Company has the right to defend their patents rights in order to maximize profits in the global market. However, the violation of the patent right by another company may lead to the violation of the law. For instance, Kodak Company sued Samsung Company because the camera phone technology for Samsung Company violated the two Kodak patents; thus they received $550 million from Samsung. Kodak also sued LG Company for violating their patent right; thus received the settlement money of $ 400 million from LG Company. However, Kodak is currently blocked by Apple Company because each of these companies has a battle for accusing each other of patent infringement. Additionally, the company has made negotiations over the licensing deals for its patents. However, Kodak has significantly increased adequate profits from its patent rights, which can enable them to survive as the company re-structures.

In case, most of Kodak’s patents expires, the company can stretch out its safety net long enough to create profits in other business sectors. This can be through implementing a new business strategy on the way they can increase their profits. For instance, the company can outsource some of its manufacturing parts and invest heavily on digital technologies. The new strategy can enable them to capitalize on their technology innovation in order to boost their business above the profit margins. Kodak has made significant efforts of negotiating for licensing deals in order to maximize profits; hence achieving a competitive advantage. However, the company can still outsource some its manufacturing components because outsourcing is also significant. This is because it enables the company to enjoy the economies of scale and lower production cost; thereby enabling the company to gain competitive advantage in the global market.

Saturday, October 19, 2013

Digital storytelling is defined as digital media that encompasses narratives, music, art, and photography that allow participants to communicate stories, achievements, experiences, struggles, and histories (Lundby, 2009). The research topic is significant because the findings on the experience of digital storytelling on cultural identity can lead to further research and integration of digital storytelling in education and youth programs. Although Rio de Janeiro hosts some of the biggest favela community there are gaps in research on Afro-Brazilians cultural identity that reside Rio de Janeiro (Rao, 2008). Therefore, understanding cultural identity among the Afro-Brazilian youth living in the favelas is a significant aspect. The Brazilian government noted cultural identity should be acknowledged in order to use public resources (Sansone, 2003). In addition, it contributes to the international body of literature on cultural identity on non-Western cultures as there is wealth of Western literature on cultural identity compared to non- Western populations. Through a phenomenology approach this study seeks to obtain a descriptive understanding of how digital storytelling can aid in Afro-Brazilian youth cultural identity.
Much of digital storytelling literature addresses the outcomes of using this intervention tool; however, there are gaps in the research that undercover the experience of digital storytelling. Crafter and Maunder (2012) stated cultural identity is influenced by the external social environment and has the power to shift as our understanding and knowledge of oneself develop. Storytelling can be used as a tool for social change to tackle such problems as cultural identity, inequality, and address psychological and socioeconomic conditions (Williams, Labonte and O’Brien, 2003). Media storytelling allows individuals and communities’ stories and experiences to be shared that can be delivered in all forms of mass media (Williams, Labonte and O’Brien, 2003). Using literature from Vygotsky (1978), one can clearly understand the social culture influence on the quest of cultural identity.  One can also understand the Vyogtsky and Piaget theories of child development especially cognitive and language development. The Vygotksy theory emphasizes the fundamental roles of social interaction in cognition development; thus child development cannot be separated from social context (Kuhn, 1996; Mooney, 2000). According to Erikson (1975), Erikson theory attempts to address the stages of child development especially the mental abilities and progress of the child through his/her education. Varied literatures have attempted to focus on the issues related to self-identity and child development (James, 1890; Valsiner, 1997; Pickren, Dewsbury and Wertheimer, 2012). Therefore, these studies will gather data on how digital storytelling influence adolescents aging ten to fourteen. Socio-cultural theory emphasizes the interaction between people and the culture in a particular society (Crafter & Maunder, 2012).
 Brazilian society holds rich diversity culturally and racially that encompasses Indigenous, Europeans, and African cultures (Davis, 1999). To date, the country holds the second largest population of individuals of African descent with the first being Nigeria (Gardín, 2007). African culture has virtually influenced all aspects of Brazilian culture (Cook & Johnson, 1999). This cultural and racial influence is seen in the Brazilian people, as there is wide range phenotype and modern Brazilian society shows influence from its multicultural ancestry (Bailey, 2004). In regards to African ancestry, African culture has influenced the language, dance, music, art, cuisine and other intangible aspects within Brazilian society (Cook and Johnson, 1999). For instance, Brazil has become known worldwide for Samba, a dance that arrived to Brazil by African slaves and has evolved as a staple Brazilian cultural dance (Bailey, 2004). Brazil encompasses such African cultures as Sudanese (Ewe, Yoruba, Fon, Fanti-Ashanit), Islamicized (Hausa, Nupe, Mandingo), and Bantu (Abunda, Cabinda, Benguela) ethnicities (Cook & Johnson, 1999). African cultural practices and Afro-Brazilian identities have survived, resisted, and evolved despite facing social and political repression (Cook & Johnson, 1999).
The national census of Brazil uses five ethnic/racial categories—branca (white), preta (black), parda (brown), amarela (yellow/East Asian), and indigena (indigenous) (Sansone, 2003).  In fact, how individuals define race is rather complex as Brazil has over one hundred unofficial racial categories used to define racial identities (Newman, 2011).  For one reason, defining one’s race affects ones’ economic and social privilege; thus, hair texture, skin complexion, and closeness to European phenotype are used in selecting ones identity (Newman, 2011). Although many Brazilians have African ancestry given the history of Brazil, African phenotype and culture have been stigmatized within society and large cultural inequalities are seen. Sansone (2003) argued that cultural identity research is needed as identity goes hand in hand with the politics of multiculturalism and often starting point of understanding conflict, inequalities, and disparities in poverty.
Brazilians heritage is of Indigenous, Portuguese, African, Italian, and Spanish, as well as small immigration from Germans, Armenians, Japanese, Syrian-Lebanese, and Chileans; thus defining ethnicity can be a challenge due to the complexity of ethnic diversity (Gardín, 2007). The literature denotes the idea of race citing that color is seen rather than race because of the diversity within Brazil (Guimarães, 2006). Brazilian social scholars point to the differences in how the United States and Brazil sees race, as Brazil never legalized racial segregation, applied the one-drop role (one drop of African blood made an individual black), or framed their issues as racial. In fact, research notes that when asking a Brazilian of any color what his/her race is, this question is not understood (Guimarães, 2006). When ethnicity is explored often it is between branca (white) and preta (black) groups and the use of negative stereotyping through mass media, photographs, etc. are immutable (Sansone, 2003). Sansone (2003) indicated that the modern world presents culture and ethnicity virtually equivalent and social researchers have blurred and interchangeably used culture, ethnicity, and race. Sablonnière, Pinard Saint-Pierre, Taylor, and Annahatak (2011) emphasized on the significance of understanding cultural identity as history is impacted based on a group’s past and this past can be different based on geographically location and socioeconomic status. The society need to label points to the degree of consensus of a group’s past, present, and possibly its future. Thus, understanding cultural identity through digital storytelling can allow a group to explore its past, present, and future.

Problem Statement
The problem that prompted this study is the fact that being an Afro-Brazilian carries a stigmatizing connotation; thus  individuals of African descent in Brazil represents a culture that is viewed lowest of low, oppressed, poor, unattractive, victimized, and lack of opportunity for better (De Almeida, 2003).  Although Brazil never institutionalized racism, the effects of slavery and deep-rooted racism within society have been ignored (Andrews, 1996).  The system of slavery has left a societal structure that has promoted subordinate populations (Bailey, 2004). Destructive effects of colonization have presented challenges of identity and self-hatred for Afro-Brazilians (De Almeida, 2003). De Almeida (2003) argued that individuals of African descendant in Brazil are encouraged to define themselves as anything besides being preta (black). Furthermore, Afolabi (2012) asserted that the modern Afro-Brazilian smiles and laughs off humorless, prejudices and insults while having repressed anger and a silenced voice. Afolabi (2012) pointed to several Afro-Brazilian literary works on cultural identity especially themes such as social inequalities, dehumanization, pain, protest, and finding meaning of one’s identity.
The rationale for choosing the problem is to reveal the way the African culture has a strong influence within modern Brazil due to the country having the largest amount of slaves imported and the great length of time native Africans were present within the country that lead to a blending of Portuguese, Indigenous, and African cultures (Prada, 2005). Afro-Brazilians have held to many African traditions, language, religions, and culture; nonetheless, individuals of African descent are viewed the lowest of low, poor, unattractive, and lack equal opportunity (De Almeida, 2003). Although the African culture has significantly shaped Brazil and contributed to modern Brazilian society, Brazilians often downplay the “African-ness” of Brazil (Davis, 1999). During the seventeenth-century Jesuit priest and missionary stated that Brazil has the body of America, but the soul of Africa (De Almeida, 2003). However, as time progressed, the modern Brazil emerged the African culture has been diluted and concealed (Davis, 1999). De Almeida (2003) asserted that Brazil has an African influence that is not being appreciated, recognized, and embraced. The embracement of African culture is needed to truly promote diversity, cultural identity, and well-being of all people. Without this, a group of people will continue to struggle with their cultural identity and economic inclusion.

To explicate further, Norman (2011) revealed that recognition of Afro-descendant history and identity are virtually non-existent in education and within society. Martín-Baró (1994/1996) stated that the Latin American countries burden down the untruths that denies, ignores, and disguises of realities; thus, this false reality is imposed on the people by the mass media of a reality that does not exist for the majority of the population. Sansone (2003) argued that instead of a racial democracy for individuals of African descent, democracy has become a racial hell. Afolabi (2012) stated that marred with racist ideology as Brazil claims racial democracy, which is the idea that all races live in harmonious paradise and race is not seen just the color. However, there is widespread disadvantage for openly declaring African ancestry and for individuals that are visibly black often experience life different from the claim of racial democracy (Afolabi, 2012). Lastly, this study has identified how African phenotype and culture have been stigmatized within society (De Almeida, 2003).

Purpose of the Study
The purpose of this phenomenological study is to understand how Afro-Brazilian youth’s experience of digital storytelling influences their cultural identity.  The sample survey that included male and female youth ages ten to fourteen living in Rio de Janeiro, Brazil favelas was employed. The research study seeks to understand the influence of digital storytelling on cultural identity among youth residing in Rio de Janeiro, Brazil favelas. Brazilian favelas or slums are squatter settlements, which consist of many unauthorized communities often lacking proper sanitation of water, sewage, and infrastructure (Davis, 1999).  Favelas are communities established around urban areas such as Sao Paulo, Rio de Janeiro, and Salvador de Bahia (Rao, 2008). The majority of the favela population consists of pretas (blacks) and pardas (browns), which make up the Afro-Brazilian population (Rao, 2008).

Research Questions
Research Question 1: How does digital storytelling influence the perception of cultural identity among Afro-Brazilian youth?
Sub Research Question 1: What are the common narratives shared by participants that build reconnection and pride in Afro-Brazilian identities?
Sub Research Question 2: How does digital storytelling influence participants’ ability address the stigma and stereotypes associated with the Afro-Brazilian identity?

Theoretical/Conceptual Framework
Understanding digital storytelling influence on cultural identity is the phenomenon this study seeks to explore. This study will look into common narratives that provide a reconnection and pride in Afro-Brazilian identities, and the influence of digital storytelling ability to address the stigma and stereotypes associated with the Afro-Brazilian identity. The conceptual framework underpinning for this study is socio-cultural theory and Erikson (1975) stages of development, and Vygotsky (1978) childhood to adulthood and understanding identity. Vygotsky theory attempts to reveal developmental stage; thus learning through digital storytelling can be a significant process of developing culturally organized specifically human psychology function (Harris and Butterworth, 2002).  Moreover, Erickson in his theory of psychosocial development believes believed that personality develops in a series of stages (Stiles, 2008). Parke (1994) finds narrative psychology a significant conceptual framework in the child development process. For instance, children with mental disorders such as Asperger syndrome learn or improve their skills effectively through storytelling or narrative psychology (Salkind, 2004; Hutchison, 2013).
Sociocultural theory is the foundation for understanding social identity in the intervention process; thus, understanding of one’s social identity is vital to uncovering cultural identity as it considers the broader historical context of a particular group (Pavel, 2008). Cultural identity, which encompasses the beliefs, values, and practices are the core of a group’s social identity (Pavel, 2008). Digital storytelling using music, photography, narratives, and art engages youth and provides a tool for addressing the constraints that could hinder their future (Bajaj and Kelly, 2006; Chaiklin, et-al, 1999). Pavel (2008) stated when a child’s cultural identity is not addressed in school, the child may doubt his or her ability and this will hinder the child’s ability to perform effectively in school; therefore, integration of cultural values and practices within educational systems has been associated with  increase sense of social identity, well-being, and improved academics.
    Crafter and Maunder (2012) noted the significance of addressing mediation transitions when studying cultural identity intervention process. Crafter and Maunder (2012) stated that mediation transitions is a process where self-identity is changed due to uncovering cultural identity through educational activities that simulate participation in a new experience. Thus, this study seeks to understand the mediation transition that digital storytelling has on cultural identity. As digital storytelling is classified as an educational activity that is embedded in a cultural context; therefore, digital storytelling should cause a transition for a cultural identity of a child, which will in turn affect his or her self- identity and increase ones’ well-being, self-esteem, and self-concept.
    Participants in this study will be adolescents ages ten to fourteen and Erikson (1975) placed this age group in two categories, school age in the industry vs. inferiority stage (ten-eleven years old) and adolescence in the identity vs. task confusion stages (twelve- fourteen aged). Within these stages, adolescents cope with new social and academic demands, as well as, development of sense of self (Erikson, 1975). Thus, during the stage of identity clarity from child to adult identity it is important to address the cultural identity. Munn (2011) stated Vygotsky theory on development takes into account the cultural influences that are rooted in all facets of children’s development. Varied studies show the link between play and other cognitive activities such as language abilities, learning and better social skills (Kuhn, 1996; Mooney, 2000).
    In short, using such conceptual framework underpinning for this study is sociocultural theory; Erikson stages of development, Vygotsky theory and understanding personal identity provide support for understanding the importance of cultural identity on a child’s development (Erikson (1975; Vygotsky, 1978)  Moreover, literature will be provided on the importance of digital storytelling and its relation to cultural identity. For instance, Williams, Labonte, and O’Brien (2003) asserted that storytelling within social groups and communities allow people to revel and strengthen new narratives that challenge the dominant narrative in order to reconstruct ones’ understanding of identity and culture. Conceptual framework will be provided supporting digital storytelling in order to uncover how this form of intervention can influence cultural identity.
 
Scope and Delimitations

The scope of this study seeks to understand cultural identity using tools such as digital storytelling within Afro-Brazilian youth ages ten to fourteen living within Rio de Janeiro favelas. This scope was selected as this study finds cultural identity a core issue on improving the quality of life within Afro-Brazilian youth. Although digital storytelling is not the sole intervention tool to addressing cultural identity, it is closely examined within this study in order to further advance research on digital storytelling. Qualitative research was selected, as it is the interest of the researcher in order to obtain narrative data on the influence of digital storytelling on cultural identity. Using a phenomenological examination was the chosen approach for obtaining information to capture the understanding of digital storytelling. Approaching digital storytelling influence on cultural identity through a phenomenological lens will allow this study to capture the life experience and allow participants to share a description of their experience viewing digital media on cultural identity. Furthermore, it was the interest of the researcher to explore African descendants within Brazil a country that plays a large role within the African diaspora.  Lastly, the selection of use of sociocultural and identity theories were selected as the study seeks to understand how digital storytelling can provide meditational transitions, which through knowledge construction allows adolescents to develop positive cultural identities (Crafter and Maunder, 2012).

Definition of Key Terms
Cultural Identity. Defined as an important factor to ones wellbeing, the sum of a group’s experiences, values, patterns of behavior and assumptions about life that influences behavior and interactions with others cultures. Cultural identity has been connected to positive results of physical condition and learning (Canteñs, 2009).   
Digital Storytelling. Digital storytelling is defined as narratives, music, art, and photographs that communicate stories, experiences, struggles, achievements, and histories expressed through forms of digital media (Li, 2008; Lundby, 2009).
Mediation Transition. This is a method of self-identity change that is rooted in socioeconomic and cultural perspective. It occurs within educational activities that simulate participation in a newly experienced activity (Crafter and Maunder, 2012; Beach, 1999). 

Significance of the Study
The understanding of cultural identity through digital storytelling is a significant issue in international scholarship and advancement of Afro-Brazilian and Afro-Latin research. The United Nations (2012) argued that the subject of Afro-descendants cultural identity plays a major role in the ethnic restoration course presently in Latin America. Within Latin America, individuals of African descendants face stigmatizing connotation identifying as black and due to the stigma of being identity as black, many African descendants use other racial labels besides black (Norman, 2011; De Almeida, 2003). Throughout Latin America, specifically in Colombia, Bolivia, and Nicaragua, has developed rights and advancement policies especially for African descendant and indigenous populations (Sansone, 2003).
Moreover, with the 2014 World Cup and 2016 Olympics in Brazil will take core phase in the international arena, thus, these events provide an opportunity for cities and country to improve the quality of life of the people and excellent opportunity to generate revenue and investments strengthening the Brazilian economy (Ernst and Young Terco, 2011). Although Afro-Brazilian holds the majority populations, there are vast disparities between black and white Brazilians quality of living. Digital storytelling allows disenfranchised communities a bottom-up approach to economic growth and development (Nutt & Schwartz, 2008). Digital storytelling has been able to teach communities valuable media production techniques and skills that have shown success in providing economic mobility and social visibility (Nutt and Schwartz, 2008). Sutherland (2001) stated that media-based intervention is vital in order to reduce social stigmas that Afro-Brazilians have for too long battled with. Moreover, cultural identity has been related to positive self-esteem, well-being, and self-concept clarity (Usborne and Taylor, 2010). Thus, it is vital to address cultural identity within the Afro-Brazilian population in order to improve the well-being and quality of life as Brazil is moving into a key player internationally.

Summary
The purpose of this phenomenology study is to understand the experience of digital storytelling on cultural identity of Afro-Brazilian youth that reside in the favelas in order to understand the influence digital storytelling has on cultural identity. Sutherland (2001) asserted that media-based intervention is vital in order to redress cultural identity issues and reduce social stigmas that Afro-Brazilians have for too long battled with. Recent research explores how the media can provide cultural identity and unification (Norman, 2011). This study defines digital storytelling as digital media that uses narratives, music, art, and photographs that communicate stories, experiences, struggles, achievements, and histories (Li, 2008).The significance of cultural identity is the relation it has on self-esteem, well-being, and self-concept clarity of individuals (Usborne and Taylor, 2010).
The literature will be provided in chapter two that will discuss in length sociocultural and identity theories and theorists such as Erikson (1975) stages of development, Vygotsky (1978) childhood to adulthood and understanding identity, Beach (1999) mediation transition in self-identity, and international literature on adolescent identity development. Chapter three will include the methodology for this study, which will be addressed on the data collection and analysis. Chapter four will provide results presenting findings and themes of description of participants. Chapter five will provide a discussion on the themes found within the data and uncovering the experience of digital storytelling on cultural identity.


Samsung Group is a southern Korean international industry and it has grown tremendously since its inception in 1938 by Lee Byung-Chull who started a small family business. The company deals with electronics and varied other businesses including securities, insurances and many other major subsidiaries. The industry entered into electronic division in 1960s and telecommunication hardware in 1980s; thus it has diversified their services globally. It manufactures varied electronic products and one of the major consumer products, which have made the company successful, is the tablets. The company is now taking the world in creative new directions because of their reliable and innovative products and services.

Key Industry Opportunity
    The growth of tablets market has become one of the key opportunities for achieving a competitive advantage in the competitive global business world. The tablet market is anticipated to increase immensely in twofold digits for the next decades. The industry has a strong position in tablet market and it could also extend it by launching innovative and improved quality tablet products.  Moreover, their key to achieving competitive advantage is the large portfolio of patents being obtained through acquisitions. The company has also achieved a growing demand for smartphones and tablets, which are consumed at a higher rate; thus benefiting from a lucrative market.

Risk Factors
    Despite the phenomenal growth experience of tablets, the company is under great threat and this might put the business under risk. One of the risk factors that might impact effective business performance is rapid technological change.  Samsung and other tech industries are facing serious threat due to ever changing technology. The company is under pressure to release innovative products faster; thus the company may fail in case they cannot keep up the pace with technology change (Ryan and Jones, 2009). Secondly, breached patent by competitors are ever increasing and this makes it hard for the industry to benefit from their innovative consumer products.  Lastly, there are increased price wars and this is because the industry has allowed gross margin for most of their consumer products. The company is selling most of their consumer products at a significant price cuts and these may enable other competitors to follow price cutting strategy too; thus inducing price wars, which could also erode the profit margin of the company.

Major Trends Affecting the Industry in the States and Possibly Internationally

The industry is going through a massive transition because of fierce competition and global crisis; thus impacting the performance of the industry. One of the major trends affecting the industry is the threat to security and this is because cases of identity theft have been reported. Secondly, there is also decline in general satisfaction, with the gap between consumer expectations and real service experience, which is widening.  Thirdly, there are always a potential for the newcomer who joins the crowd and threatens the providers by offering current technologies at lower prices; thus threatening the industry.  Lastly, although cell phone markets are relative mature in the states and possibly internationally, the numbers of subscribers nonetheless tend to be those on lower cost plans.

Strategic Implications of Both Opportunity and Risk Factors
    Strategic decision making at each of the business management level can affect business activities.  However, effective strategic business management such as employing SWOT analysis can enable the company to achieve its intended objectives effectively (Hooley, Piercy and Nicoulaud, 2011). For instance, assessing both opportunities and risk factors can enable the company to develop strategic plan vital for controlling external environmental factors that might impact the business performance.


Rapid technology advancement aided by globalization has spawned much information sharing networks across the globe. Social networks have tremendously become an increasing research area for information system scholars; thus many of them have attempted to analyze relationships generated by information technology artifacts among people, organisation, and businesses. The recent new class of information network system known as online social network sites such as Facebook, LinkedIn, My Space, Twitter, YouTube and many others has exploded in popularity across the globe. Information technologies have irrevocably altered the way people communicate in the contemporary society. The young generations have switched their communication platform to online social networking sites; thus many of them spend most of their time on social networking sites. The research statistics indicates that the exposure to social network is remarkably high with MySpace being the leading social network with more than 246 million active users followed by Facebook with more than 124 million active users (Johnson 3). Although social networking sites can maintain social ties through communication across the globe, it has implications such as increased cyber bullying and loss of privacy; thus impacting organisation or business performance.

Use of Social Networking Sites
    The use of social networking sites have increased substantially for the last decades; thus, it serves a number of purposes, but the three main roles stand out as common across all sites. One of the functions or purposes of social networking is to maintain and strengthen existing social ties or creating new social connections. The major purpose of using social networking sites is to communicate and strengthen relationships with friends, families or relatives across the globe. Johnson argues that social networking sites have morphed into mainstream techniques for teens, adults and companies to exchange information about themselves through sharing pictures, videos, sharing interests and private messages (Johnson 4). These sites allow users to articulate or navigate and make their social networks visible; thereby, communication or connecting with people who are also already in the social network connections. The social network has made communication much easier because it enables one to communicate effectively across the globe within the shortest time possible.
Another primary role of social networking sites is enabling users or members to upload their own content. It is imperative to note that the content shared through social networking sites usually differs from one site to another. Social networking sites have not only enabled friends, families and relatives to connect in time and space but also enabled business entities to communicate easily about their products and services they offer to customers in the market. Companies post their products on social networking sites and others have their profiles, thus they upload their content, which are in turn shared across the social network connections. This is vital because it has boosted the business growth of many companies because they are able to advertise their products and services effectively; thereby, reaching many customers across the globe efficiently.
The last primary purpose of using social networks is to find new, interesting content through filtering, recommending and organizing the content uploaded by users. Many social network sites permit users to mark content as public or confidential, while others permit them to tag content. Others social tools such as YouTube allow users to upload unlimited amount of content and users are always allowed to upload interesting contents, which are generally publicly accessible from the profile page of the users. Social sites such as LinkedIn are among of the significant sites for recommending and organizing the content uploaded by users. This site has become commonly used for job seekers and recruiters to meet their intended goals effectively. LinkedIn has currently become the leading networking sites for managing professional identity, building professional profile and connecting with the professional networks. Although this site is primarily a professional network site, some people use it for job seeking jobs and employee recruitment because it helps one to keep in touch with potential clients, as well as, expands the professional network through recommendations.
According to Johnson (6), the purpose of the social networking sites has not digressed from the initial intentions of their creation; however, these sites have expanded to serve a larger audience. Social networking sites are not only meant for social interaction or communication with friends or relatives but also for business promotion. Most of the business minded people have nowadays found it easier to carry out their business online and even utilize social networking sites for responding to consumer queries. Social media offer a pool of information and business also gather adequate information about their client, which they also use in improving their business activities. Many entrepreneurs have expanded their business because of employing social networking sites as their marketing strategy for increasing sales; thus increasing revenues, as well as, sustaining their business in the ever competitive business world.  Johnson argues that online social network has become a significant strategic component for gaining competitive advantage (Johnson 3). The users of social networking sites have become the major contributors to many business organisations because of sharing the content and information of the company; thus enhancing cost advantage for business organisations.
Implications and Impacts on Organisations and Business
While the usage of social networking sites has grown tremendously for the past decades, the way people are using social networking sites have also changed; thereby contributing to varied implication and impacts on many business and organisations. Social networking sites such as MySpace, Twitter, and Facebook and among other innovations, which are among the leading interactivity and user-generated content have enabled user to interact or collaborate effectively, but many problems have been encountered in the process. One of the implications of using social networking sites is that there has been much increasing cyber pulling and loss of privacy. Cyber pulling is one of the main problems that have become highly experienced among the users of social networking sites. Moreover, there is increased loss of privacy and this has exposed many companies critical organisation data loss. Although companies have made significant efforts of securing and maintaining organization privacy, the rate of data loss is high because most social networking sites require one to share information publicly.
Too much use of social sites can also contribute to social disorders and this can severely contribute to serious detrimental outcomes. For instance, too much use of social networking sites can contribute to physical or mental illness, which can deteriorate the health of the user. The research study reveals that many teenagers have become highly addictive to social networking sites and this has contributed to poor performance in varied learning organizations (Johnson 4). Others have also developed social disorders because of too much use of social networking sites. For example, some teenagers engage in drug addiction such as marijuana, cocaine and many others to enable them continue surfing or socializing with their friends for many hours. This is dangerous because it has contributed to deterioration of health and even putting many teenagers to death risks.
There are increased risks of malicious software practices because social networking sites allow users to exchange information and files, and these files may contain viruses. The research conducted revealed that more than 100 Twitter and 60 Facebook posts contain malicious code (Johnson 5). These viruses can be spread through chat windows or content sharing from unknown websites; thus exposing organisation to identity theft or loss of critical information or confidential organisation data. Social networking in the business or organisation can contribute to potential breach of confidentiality and the tainting of the corporate image by workforces. This means that workforces can unintentionally post confidential business data on blogs, Facebook or Twitter networking sites. Negative comments and posts intentionally posted by displeased workforces can also ruin the image of the company since information is spread faster through sharing among users.
Organisations and business have been structured based on the needs of customers, legal, economic, political and technological changes impacting the business environment. When the social networking software was first introduced, many organisations taught that this will be an effective means of connecting with their clients; thus marketing their products easily; however, organisations did not anticipate the remarkable impact that could have resulted on their internal business structure.  The use of social networking and information systems have contributed to varied impacts on the organisation structure in the contemporary business environment than the impacts organisation had in the past. This has forced most business managers in varied organisations have attempted to employ effective strategies and organisations theories with an aim of minimising these impacts caused by social media.
While many studies have attempted to reveal that successful business companies are in constant state of flux due to environment and technological impacts, many organizations are still looking at social networking sites as the effective way for marketing products; thereby, achieving a competitive advantage.  For instance, the wrong online brand tactic employed by the business can put the business at a viral social weakness; thus damaging the reputation of the corporation. Therefore, business organisations need to understand  the way social networks work, when and how to utilize them, as well as, which social networking sites or channels to use in order to met their goals effectively. Social networking sites can also negatively impact worker productivity and this is when employees waste their valuable time online by chatting with friends about their social life and other things through Facebook and Twitter networking sites.
Social networking can impact on knowledge management of an organisation; thereby, posing critical challenges in an organisation performance. According to Johnson (6), people in the society are living in the age where Internet has changed the way people stay connected with each other and the way they share ideas or information across the networks. Therefore, with the rise of information technologies, a number of new web applications and tools have come into use for the past decades. These tools and applications have created tremendous changes in the lives of many people and also it has transformed the way business across the globe operates. 
Social networking sites have considerably lessened the cost of content creation and product distribution because organisations are able to create an online presence more economically. Some social networking tools such as LinkedIn, Twitter, Facebook and many others have become the popular social tools for spreading information about the products available in the market. Many companies have realized that social networking is a powerful tool for changing the way world communicates; however, many business entities have been shocked by the impact of online social networking communities on the internal corporate structure. In most cases, the information environment outside the corporate changes faster than information in the internal organization structure. Customers, employees and other stakeholders can find access; hence share information in a manner that organisation infrastructure, culture and policies inhibit.
Ethical Issues, Issues Related To End User Use of Such Technologies within the Work Place
    Researchers have examined the ethicality of social networking sites usage by employees and responses from employers. The subject is considerable for varied reasons because in case a dismissal is seen as unreasonable, it has the potential to produce dissatisfaction within the workplace. Some ethical issues have been raised regarding ethicality of employees using social networking sites. Scholars find that sacking a blogging worker is more likely to be considered ethically wrong in case the subject of the blog is work related rather than non-work related. The key aspects that should be taken into considerations in both kinds of blogging are the moral intensity of the content. The moral intensity concept covers a wide range of factors including the potential or likely consequences of the content or comments made by users that may create harm to the business company.
    In addition, the ethical intensity of employees using online social networks by making offensive comments about their employers may be seen unethical. Many bloggers clarify the rationale for their blogs as not to nastily attacking their employers but rather offering them enough space to vent when they become frustrated with their job. This kind of social networks uses may be of low damage but taking rough disciplinary measures in these circumstances may be perceived as unethical response. Some organisations have set strict rules regarding the use of social networking tools during working hours especially when the information is not work related. For instance, watching pornography on YouTube during working hours is one ways of violating ethical or moral standards set by the company. Managers may be more prone to construe work related social network usage as a potential annoyance and a breach of responsibility in the place of work.
Johnson (6) argues that where corporate ethical values are apparent and brawny; sacking blogging employees is more probable to be seen as ethical. It is therefore potentially significant for business entities and many other organisations to employ social media policies as an effective tool for reconciling the competing positions. From an employee perspective, Johnson argue that it is unfair for employers to take tough actions against employees using social networking sites in case what constitutes unacceptable social media usage is not clear in the context of employment relationship (Johnson 7). However, social media policies may not fully resolve ethical issues related to use of social networking in case workers do not consider those policies as ethical. Johnson suggests that an effective social media policy should be the product of negotiations between employers and employees to find a set of guidelines that are acceptable to both parties (Johnson 8).
    To most users of information system, information technologies are simply the tools for getting their work done.  Most information system users utilize computer software to complete their tasks faster. Some software such as self-deploying characteristic and social network  software usage can coordinate tasks, expand social contacts and allow users to exchange work related  ideas or information effectively. Literature suggests that end users would be more likely to adhere to ethical values regarding the usage of social networking software (Johnson 9). Although there are instances where the end users need to navigate through different information sources to find information they need, the computer software with evolving ability enable end users to use computer software to expand their information sources and to adapt to their evolving ethical issues.

Conclusion 
Although social networking sites can maintain social ties through communication across the globe, it has implications such as increased cyber bullying and loss of privacy; thus impacting organisation or business performance. The use of social networking sites have increased substantially for the last decades; thus, it serves a number of purposes, which includes, strengthening existing social ties or creating new social connections, enabling users or members to upload their own content and  finding new, interesting content through filtering, recommending, as well as, organizing the content uploaded by user. Many entrepreneurs have expanded their business because of employing social networking sites as their marketing strategy for achieving a competitive advantage. the research revealed that while the usage of social networking sites has grown tremendously, the way people are using social networking sites have also changed; thereby contributing to varied implication and impacts on many business and organisations. These include loss of privacy or confidentiality, increased cyber bullying, increased risks of malicious software practices and many others. Therefore, organisations should employ social media ethical policies as an effective tool for reconciling the competing positions.


Friday, October 11, 2013

 Engler, Ronen & Miller, Christa. 6 Persistent Challenges with Smartphone Forensics, (2013):1-5 is an article that reveals six major challenges associated with Smartphone forensics. Smartphone, which is the most popular mobile technology for making effective communications, is one of the most challenging devices for extracting evidentiary information. Many business forensic devices have made significant progress toward evidentiary data support such as Blackberry, iOS, Android and many others, but the challenges remain high (Engler and Miller 1). Engler and Miller reveal varied challenges that have been on the increase with Smartphone forensics. The authors argue that a Smartphones is not only just a Smartphone but rather varies significantly because of varied operating systems and vendors (Engler and Miller 1). 
Moreover, data storage differs significantly from one device to another or from one operating system to another. This creates challenges to data protection because it becomes easier to extract information from this device in case it does not have a password.  Another challenge is that Smartphones prepaid burner becomes a problem and file system extraction can be time consuming even where there is effective forensic device (Engler and Miller 3).  There is also apps challenge which varies across mobile carriers and the mobile apps for support of forensic began recently, and only covers the commonly popular apps. Therefore, to decode apps data, the mobile forensic devices should be able to execute file system reconstruction (Engler and Miller 4). 
Even though Smartphones support forensic soundness and offer accurate data, the boot loader use in not supported in some devices such as Android. Therefore, it may be effective to temporarily root the device to enable it perform physical extraction but temporary rooting is not sound effective in forensic. This is because it only loads the operating system of the device, which may be logged within the system (Engler and Miller 5). The last challenge is that some smartphones extractions are not supported by forensic dev ices. Therefore, chip-off, JTAG or flasher box extraction technique becomes necessary in this stage to enable physical extraction of data. Engler and Miller (5) argue that a logical analysis cannot be performed on an unsupported locked tool unless this capability can be limited. Indeed, smartphones forensics may result after varied years of research activities; thus the evolvement of Smartphone continues to pose persistent forensic challenges.

Opinions
Mobile devices have significantly become vital components in the daily lives of many people in the current society. These devices keep people in connection and play significant roles because they are portable, as well as, highly secure. The increased evolvement of Smartphones with varied storage capacities has supported forensic activities. However, my view is that the frequent hardware alterations and data volatility have hindered the effective performance of Smartphones in forensic activities. Moreover, even though Smartphones have been for a long time viewed as an effective device for forensic activities, the increased technology and higher rate of mobile insecurity have contributed to varied challenges. Many hackers have nowadays advanced hacking skills; thus they have become a threat to many large corporate industries, as well as hindered effective forensic research activities. Thus, it is effective for Smartphones Company to advance skills vital for reducing challenges that many Smartphones users are facing in the contemporary society.
Introduction
Cellphones have created rapid revolution in the communication field. The rapid technology advancement in the 21st century has changed lifestyles of many people because it has made everything possible. Communication has become cheaper in the current generation and people are now able to reach their friends, relatives or families in distance places faster. The introduction of Cellphones has enabled many companies or entrepreneurs to increase sale of products because they are able to reach customers easily. Technology advancement has fueled the increased use of Cellphones across the globe. This is because the devices allow people to send instant text messaging offer voice calling and web access. However, the pervasiveness and conveniences has not only come with benefits but also with numerous challenges. 

Thesis: Although Cellphones has made communication easier, they have contributed to health issues and they are costly.

Discussions
    Use of Cellphones has contributed to increased health complications such as damage of ears; thus loss of memory. The research study conducted by the scientists revealed that use of Cellphones pose dangerous risk to health of human beings. This is because the Cellphones emit radiation that is linked to the brain tumors; thus contributing to loss of memory (Powell pr.5).  The Cellphones makers claim that the level of radiation from these devices falls within the acceptable limits and they cannot cause any harm to human beings. However, it has scientifically proven that the long-term use of Cellphones has offered the truth about the impacts of using Cellphones for long hours in a day making communications. Furthermore, research studies have shown that the likely cause of brain tumors, which occurs in most cases when multitasking (Ghorbani and Rosemarie 263). For instance, drivers who talk and text while driving are likely to get distracted than concentrating on the road; thus causing accidents, which may lead to loss of lives or health complications resulting from accidents.

    Cellphones are costly and this begins from purchasing the phones themselves and monthly services or subscriptions are costly. The pricing models for Cellphones are not different from landlines, but Cellphones services are typically more expensive than landlines. According to (Locsin pr.1), use of Cellphones are expensive and these ranges from text messaging, roaming and downloading materials. The service providers usually limit minutes for taking and making international calls is more expensive than local calls. Making calls in long distances per minute is costly and the monthly service rates are usually higher.

     However, despite the disadvantages that Cellphones have caused in the society, it has made communication easier because of their availability. The increase technology advancement has not only created social challenges in the contemporary society but also enabled many people to socialize with other effectively. Winget (34) argues that use of technology devices has made communication easier and inexpensive in the interactive world. It has enabled many people to create friends, reach their families or relatives across the globe easily, interact with customers; thus creating a global village. Powell (pr.1) argues that Cellphones allow people to keep in touch constantly with their friends and families because of their portability. People are now able to reach anyone at any given time and enable people to receive emergence calls or significant information through phone calls.

Conclusion
    In conclusion, although Cellphones have made communication easier, they have contributed to health issues and they are costly. First, use of Cellphones has contributed to increased health complications such as damage of ears; thus loss of memory. Secondly, Cellphones are costly especially when making international calls and monthly subscriptions are higher. However, despite the disadvantages that Cellphones have caused in the society, it has made communication easier because of their availability.

The education system in the current globe functions in a turbulent way, which is characterized by ambiguities and uncertainties. The first generation and second generation online course have diverse similarities. One of them is that both first and second generation online courses have similar subject matter and same content. Anderson (2008, p. 270) argues that Subject Matter Experts (SMEs) need to ensure that the content of the online course alternates with the content, which is normally provided in a traditional course. The SMEs should also write varied exercise and activities or examinations that should reinforce the new learning and foster development. This can be only achieved through working as an integral team in course development process; thus ensuring the online course content meets the demanding needs of students.  Moreover, both first and second generation online courses aim to equip student with the necessary skills and knowledge vital for meeting their intended needs. Thus, they both acknowledge quality courseware production, which are high organized and credible in order to meet the demanding needs of students successfully.

However, there are differences between the first and second online course development. In the first generation, the focus of the subject curriculum design is based on the content and delivery of the subject knowledge in the key specialized field. The content structure of the curriculum is designed based the subject knowledge and the needs of the required standard content or standard arrangements. In contrast, the second generation online course is more developed than the first one. Therefore, this paradigm focuses on the design of the subject curriculum with an aim of developing students with proper knowledge and ability for lifelong learning. Thus, the design is based on the SMEs and the curriculum is interactive, integrative with web support networking and virtual reality to meet the needs of students effectively. The second generation requires significant plan and design of the course before it is revealed to the students. Thus, it is vital for the online teachers to achieve effective training programs, plan efficiently and manage time in order to achieve success. This accounts for the need of the faculty to develop familiarity with their institutional web development unit, IT unity, technical and other supportive units through building strong working relationship team.

Summary of a New Teaching Paradigm and Pedagogical Proficiencies

The major theme in the new teaching paradigm is developing inherent web-based instructions from the instructionally innovative manner in order to meet the challenges of online education system in the new century. Thus, there is need to introduce varied numerous education reform initiatives in order to improve the quality of web-based instructions. Anderson (2008, p. 52) argues that it is crucial to consider the web-based not as just a medium of delivering distance education, but rather a way of partnership, and a way of making fundamental changes in the teaching or learning activities. Therefore, teachers should develop effective teamwork and strive to create an effective learning environment. This is through exploiting the inherent web features and promoting active learning, which can lead to development of critical thinking skills of students.

The major theme also in the pedagogical proficiencies is about teacher professional development skills vital for delivering effective learning needs. It will also enable teachers to train students successfully when using technology in teaching distance learners. Anderson (2008, p. 53) argues that teachers who take online teaching classes should have good training skills for online teaching. They should view online teaching as a different profession from face-face teaching since these skills vary from online teaching. One way of becoming familiar with the required skills and resources for online teaching is through becoming an online learner (Anderson (2008, p. 53).  Therefore, developing good principles and implementing effecting online teaching strategies will enable the faculty to achieve success. This is through developing new administrative and technical skills, but most important understanding the online environment as totally a different way of interacting with students than face-face classroom teaching.

Reflections
    From my personal experience on the new teaching paradigm and pedagogical proficiencies, I can conclude that online teachers need to develop professional skills vital for meeting the denuding needs of students. For instance, one time I made application for online training course, which I qualified successfully. However, I realized that students can achieve success in case online teachers have adequate IT skills, manage their time well and advance further their training program. This is because I never achieved my intended goals because of poor curriculum delivery. In other words, the delivery model, course materials and technology was not appropriate to the content and my desired needs; thus it created a barrier in my study.  Therefore, I realized that for one to achieve success there is need for the faculty to practice principles of good practice when providing online courses for distance learners. I also realized that, there was a need for me to be familiar with the online courses, interact with the faculty and other students in order to achieve my demanding needs.  This is because online course content is designed in a way that encourages critical thinking of students and also solves problems; thus enabling students to meet their demanding goals successfully.
    
Reference
Anderson, T. (2008). Theory and practice of online learning. Edmonton: AU Press.

Saturday, October 5, 2013

Executive summary
Information technology industry is an important industry in economic environment. IT organizations have participated in various planning, and implementation strategies to realize substantial growth in the industry as well as elating the economic environment. This research focuses on analyzing Dell computer corporation Inc as one of the most developed areas on the IT industry. The analysis will focus on the background information of the Dell Corporation through understanding the market trends, and its main competitors using different methods of analysis such as SWOT analysis. The paper will also attempt to evaluate the strategic situations within the Dell Corporation, and how to deal with the opportunities, and threats that are found within the organization. The business environment of Dell Corporation will also be analyzed in terms of the organizations’ strategies towards its functional business corporations at internal levels that give them competitive advantage over other companies with similar products in the market.  At the end, the paper will address challenges that face Dell business strategy, and the possible implementation strategies aimed at revitalizing the business environment.

Background Information
Dell is an information technology corporation based in Texas. Dell is rated as one of the largest computer manufacturers in the world. The corporation that was founded by Michael Dell in 1984, today, serves the world with a wide range of computer products, and it continues to grow significantly in the world market. Since its inception, Dell has continued to be the most successful company in the IT industry. One of its successful business strategies in the market entry point is the use of direct sale of its products to the customers (Maney, 2003). The IT services provided by the Dell Inc are incorporated worldwide into technology solutions. Dell Corporation is involved in designing, and developing Smartphone’s, Laptops, Notebooks, and PCs as well as networking services in the market. Dell also provides security software products, and other computer accessories such as printers, notebooks, keyboards, mouse, and networking systems. Last but not least, Dell Corporation products also constitute financial services such as collection, and customer receivables related services (Holzner Pg.20).

Strategies
Dell has played part in both local and international market in order to sell its products. A number of strategies have been employed to counter the stiff competition in the market. These strategies in the marketing sector have involved use of both print and electronic media devices. Another strategy they have employed is lowering the prices of their products, provision of bonus, and shipping of their products. Dell gaming campaigns have also featured in the internet. The marketing strategy has also switched to using various advertising agencies in marketing, for example, promotion of products such as XPS lines have been promoted by the working mother media agency (Hoskisson and Hitt pg. 62).

In the competition front, Dell continues to face competition in the market sector from the companies that produce similar products such as IBM (Jay, pg. 144). Dell has been successful in the computer industry as well as information technology industry through offering products that are valued by its customers. The core values of the Dell Corporation is to sell their products directly to the customers in order to get insights into the customers’ needs, and then provide them with the IT solution that is effective. The consumer chain of the Dell business is portioned into large enterprise, public operations, medium and small business links, and consumers. Dell Corporation is simply committed to maintaining, and managing its business around the globe. (Holzner pg. 65)

SWOT analysis of Dell Corporation
This section of the report analyses Dell Corporation using SWOT analysis as a strategic management tool. The precinct of the SWOT analysis idea of Dell Corporation is to come up with the valuable understanding of the Dell Corporation, and the relevant implementations to be made in order to add value to the corporation. Dell Inc is analyzed by understanding various issues that are found within the organization entailing the price war in the international markets that is staged by different computer manufacturers, decrease in number of sales, structure of leadership system within the corporation, manufacturer contracting, and market share value. (Cushman and King Pg. 102).

Dell strength in the market, for example, is encouraged by the production of a strong model that is sold directly to the consumers without involving the chain of cartels. The direct model that is used by the consumers to customize laptops gives the corporation a competitive advantage over other similar products available in the market. The production of direct model into the computing market is derived through the specific needs of the consumers. The release of products such as laptops illustrates increase in market options initiated by the consumers based on performance and portability of the product. Dell Corporation has also regained its strength through cutting out the retail sellers that were initially used as distributors. This has facilitated direct ordering of the products by the consumers direct from industry. The Dell Model has also gained strength in terms of schedules for the delivery of their products to the consumers. The consumers are able to place their order with the company, and confirm the receipt of the ordered products within a short period of time. Dell business products meet the demand/needs of the consumers (Holzner Pg. 112).

Dell major weakness is experienced in terms of how it targets a specific market with some of its products. Educational institutions have been targeted with the products such as laptops. This contributes to insignificant percentage of its sale due to the weak relationship that exists between the corporation and the educational institutions. Home users of Dell products on the other hand are not able to visualize the importance of Dell products. Customization of its products is also a major weakness in Dell’s product chain.

Dell, however, has great opportunities in the external environment. The purchase of personal computers has significantly increased in the computer market. The increased awareness of quality products is also surging in the computing industry. There is also significant improvement in the level of communication and technological development. This has been seen in terms of internet as a purchasing tool as well as where the information can be assessed. The trend seen in the computing industry gives Dell Inc opportunity to grow its business in all segments.

The changing business environment poses a great threat to various businesses as well as Dell Corporation. Increased market competition compels Dell Corporation to produce high quality products with low prices. The expediency of the production of these products is also at a stake. Price difference between the products has a smaller margin.

Implementation strategies

To contain the competition and changing economic environment through maintaining competitive advantage, Dell Computer Inc must adopt various implementation strategies in their policies to keep a breast with its main competitors. The future management of Dell Corporation should focus entirely on sustaining its corporate clients. They should also concentrate on improving storage and server businesses for large companies rather than dealing with small and medium size companies.

Conclusion
Information technology industry is rapidly changing. Computer industry for example has changed in terms of consumer specific needs. Dell is therefore, compelled to adapt to the dynamics in the economic environment. In order for Dell Company to contain the shift in demand it must be able to take advantage of its strengths, and analyze the weakness points. It must also be able to analyze the opportunities and the threats that exist in the economic environment in order to position itself in a competitive market.

 Bibliography
Holzner, Steven. How Dell Does It. New York: McGraw-Hill, 2006. Print.

Dell, Michael, and Catherine Fredman. Direct from Dell: Strategies That Revolutionized an Industry. New York: HarperBusiness, 1999. Print.

Ireland, R D, Robert E. Hoskisson, and Michael A. Hitt.Understanding Business Strategy: Concepts and Cases. Mason, OH: Thomson Higher Education, 2006. Print.

Galbraith, Jay R. Designing Matrix Organizations That Actually Work: How Ibm, Procter & Gamble, and Others Design for Success. San Francisco, CA: Jossey-Bass, 2009. Print.

Friedman, Lauri S. Business Leaders: Michael Dell. Greensboro, N.C: M. Reynolds Pub, 2007. Print.

Jager, Rama D, and Rafael Ortiz. In the Company of Giants: Candid Conversations with the Visionaries of the Digital World. New York: McGraw-Hill, 1997. Print.

Lyles, William H. Putting Dell on the Map: A History of the Dell Paperbacks. Westport, Conn: Greenwood Press, 1983. Print.

Cushman, Donald P, and Sarah S. King. Communication Best Practices at Dell, General Electric, Microsoft, and Monsanto. Albany: State University of New York Press, 2003. Print.

Boyson, Sandor, Lisa H. Harrington, and Thomas M. Corsi. In Real Time: Managing the New Supply Chain. Westport, Conn: Praeger Publishers, 2004. Print.

Koehn, Nancy F. Brand New: How Entrepreneurs Earned Consumers' Trust from Wedgwood to Dell. Boston: Harvard Business School Press, 2001. Print.