Tutor Quora

ITECH1001 Communications And Technology

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

ITECH1001 Communications And Technology

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

ITECH1001 Communications And Technology

0 Download5 Pages / 1,123 Words

Course Code: ITECH1001
University: Federation University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia


1)The group is required to write a literature review on the topic that they have selected and should be structured according to the outline below.   The report should read as if it was written by one person, ie the fonts, formatting and tone of voice of the writing should all be the same.  In order to complete the report the following tasks are required to be undertaken:
a)Each student is to write a literature review on their section of the mind map.  This piece of writing may be based upon the reading undertaken to complete the annotated bibliography and/or on any extra resources that have been sourced.
b)Each group member’s writing should be proof-read for use of reference material, typing, spelling and grammatical errors by another member of the group and the writing generally reviewed in a constructive manner.  The review can take a number of forms including:
i)A marked-up copy of the commentary with suggested changes to be made;  and/or
ii)Two to three paragraphs indicating the suggested changes and improvements.
iii)A review done by each member of the group is to be include in the final report.
c)Each student should revise their writing using the review provided by the group member.  Note: only if the feedback is appropriate.  
d)Each student should include a discussion of their selection, organisation and association or materials based on the S.O.A.R model.
i)Selection: why you selected those particular materials
ii)Organisation: how you organised the information from your resources in your report and why.
iii)Association: how your resources relate to each other and if there were gaps in the information you found
iv)Regulate: reflect on how using this methodology impacted on your research and writing experience.
e)Each student should review the time estimation exercise done for the second assignment as part of assignment 1 and write 1 -2 paragraphs on the impact of the exercise on your research and writing experience.
2)The group should collate their final pieces of writing into a single report.  Each individual literature review should have a heading indicating the topic and author.
The group report contains two parts, these being the writing of a group literature review and a review of group processes.

Group task – The group is required to work collaboratively to produce a collated literature review on the selected topic.  There are a number of tasks to complete and these are outlined below.  
Individual task – Each member of the group is required write a report reviewing the performance of the group.


The information technology overs the years have evolved a lot in terms of the strength and technology. The technologies that are being used for the implementation of the IT infrastructure have matured a lot. However with the advantages, the risk of protecting the information is also getting increased. The hackers or the criminals that are disrupting the secure information infrastructure are becoming powerful because of the available tools and techniques devised for exploiting the information security. Hence there is constant improvement is being done for dealing with the information security issues (Cowdrey & Malekian, 2017). Hence it is not easy to predict the future of the information technology, especially to predict which technologies will be most effective and impactful. However it is being agreed, widely by eminent researchers and information security strategist that a drastic change is likely to be observed in the field of the information security management and control. This is obvious looking at the fact that the several new technologies are being emerged as the tool for creating strong information security policies. The technologies that are being estimated to rule the future of information security is the block chain technology, artificial intelligence, and crowd sourcing. A literature review has been conducted on this topics.
Blockchain technology as the future of information technology:
According to Hossai, Shahjalal and Nuri (2017), one of the emerging technologies that is currently being making a lot of buzz in the information world is the block chain technology.  It is a distributed leger technology that works in the peer to peer or P2P mode. The technology was mainly evolved as the mean to revolutionize the way people make transaction. It was one of the leading technology that is powering the bitcoin or crypto currency. It works with a decentralised database rather than the distributed database. It makes the transaction more secure and efficient, providing an efficient means for improving the security of the transactional data. According to the authors, the feature that makes the block chain technology an ideal solution for the information security is that ever computer that is connected in the distributed network, retains a copy of the ledger or the transaction and hence the single point of failure is not possible as the copies are updated and validated without any delay. It is almost impossible to corrupt the information shared trough block chain as the information before it is shared to the destination computer is recycled and reconciled thousands of time , hence it is not possible to tweak into the network and hack the information.
Papadopoulos et al. (2017) argues that one of the common techniques for hackers to exploit the information is to make use of the weak password set by the users. There were not effective solution for that. One of the best solution to that issues is to eliminate the process of setting the password for access to information. Blockchain technology takes this very approach and integrate the same in the service. Block chain does not require to set password and it is thus an effective way to secure the information where the information exploitation is due to the password hack or stealing. It is also one of the major reason for social engineering attacks which violates the information security and hence blockchain is one of the major preference for information security which is likely to have a strong presence in the field of information security in the near future.
Online outsourcing to define the information security feature:
 According to Parodi et al. (2017), with the improvement in smart technologies and computing devices getting smart and cheap, a lot of people are getting connected to the internet and this contributes to the large amount of data that is being generated on daily basis. All these information is not only difficult to collect and process, it is expensive too and requires a huge human resources. Hence opposed to the traditional approach, the online outsourcing is becoming popular.  The authors mention that not only it is becoming more and effective it has the potential to completely replace the traditional outsourcing. The online outsourcing will the cyber security more affordable while integrating cyber security intelligence. As opposed to the traditional outsourcing, the online outsourcing or the crowdsourcing will provide quick report of any kind of information security incidents and help to take effective action against that. Now as seen in the traditional approach, it take long time before the incident is actually reported and documented. With the help of crowd sourcing as specified by the article not only this process will be quick but effective too as incidents will be easier to report and manage with the online outsourcing.  
Artificial intelligence to dominate the information security domain:
Garcia-Bravo and Newell (2018), however specifies that when discussing about the future of the information security, the discussion is incomplete without a mention of the artificial intelligence. The invention of artificial intelligence is already proving its excellence and intelligence too. It is being integrated in several filed and it is being considered in the information security and application. Toady although automation is prevalent in this field for protecting information and making cyber security stronger, still a lot of task are managed by the human intelligence or workforce. It is still not clear whether artificial intelligence will replace the human intelligence or not, the application will definitely increase considering the current trend as lot of companies have already implemented the artificial intelligence in the service offerings.  Artificial intelligence allows computing system take decision on their own without human assistance. The machines are trained with machine learning language and they are efficient to identify the issues with the network or any incident related to information breach and the machines are efficient to deal with the issues on their own. According to the authors, this very capability of the artificial intelligence will make the technology popular for information security purpose.
Cowdrey, K. W. G., & Malekian, R. (2017).The evaluation of information technology. Multimedia Tools and Applications, 1-30.
Hossai, M. R. T., Shahjalal, M. A., & Nuri, N. F. (2017, February). Artificial intelligence in information security. In Electrical, Computer and Communication Engineering (ECCE), International Conference on (pp. 752-756). IEEE.
Papadopoulos, G. Z., Matsui, T., Thubert, P., Texier, G., Watteyne, T., & Montavont, N. (2017, May). Leapfrog collaboration: Toward determinism and predictability in information Security. In Communications (ICC), 2017 IEEE International Conference on (pp. 1-6). IEEE.
Parodi, A., Maresca, M., Provera, M., & Baglietto, P. (2015, October). An intelligent Approach for the information security. In International Internet of Things Summit (pp. 158-161). Springer, Cham.
Solorio, J. A., Garcia-Bravo, J. M., & Newell, B. A. (2018). How traditional outsourcing is changing with online service. IEEE Internet of Things Journal.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 5 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2020). Communications And Technology. Retrieved from https://myassignmenthelp.com/free-samples/itech1001-communications-and-technology/evaluation-of-information-technology.html.

“Communications And Technology.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itech1001-communications-and-technology/evaluation-of-information-technology.html.

My Assignment Help (2020) Communications And Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/itech1001-communications-and-technology/evaluation-of-information-technology.html[Accessed 18 December 2021].

My Assignment Help. ‘Communications And Technology’ (My Assignment Help, 2020) accessed 18 December 2021.

My Assignment Help. Communications And Technology [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/itech1001-communications-and-technology/evaluation-of-information-technology.html.

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



The thesis statement of your academic task conveys the main idea or argument. As a student, you may not have enough clarity on how to make a thesis statement. That’s why it’s better to ask our writers to guide you. Writing a thesis statement won’t seem too tough when you have the support of our writers. Our website also consists of insightful thesis statement examples or samples written by efficient writers. With the guidance of our writers, you will never have any confusion over what is thesis statement and how to write it.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »