Thursday, December 12, 2019

Actor-Network Theory The ATM infrastructure

Question: Critical grasp of actor network theory and some additional concepts from the module. Work includes contemporary debates, issues and discussions. Links are successfully Discussed between the news stories and the computing assemblage. Answer: Introduction This article provides the clear concept of Actor Network Theory. It explains the concept that the actor and a network both are dependent on each other. This article provides the guidance on various terms, different terms, line actors, the black box, and a network, intermediate. It explains the concept that the actor and a network both are dependent on each other. It also explains the reasons for actor network theory for computing purposes. It mentioned the concept of ANT with the help of computing stories. Actor-Network Theory In the era of modern computing, every actant is dependent on each other to achieve a goal. Actor-Network Theory is related to entities, i.e. non-humans, and humans. They are tied together to achieve the assigned goal. The Actor-Network Theory is an integration of three different domains society, nature, and language. Actor-Network Theory is related to a network which is created between the non-humans, and humans to achieve a goal. The non-humans, and humans are active as actors or entities, and they are tied together to achieve the assigned goal. They get bind with each other with the help a network, i.e. the relationship is defined between them. The purpose of using this network is: for doing the analysis of science, a communication a network (computer based). The main focus of the Actor-Network Theory is in the infrastructure of the network, it does not have any concern related to the existence of the network, and there is equality among all the actors (related to the assigned work ). The non-humans and humans are interconnected with each other through a conceptual framework. This is called Actor-Network Theory. According to the Actor-Network Theory the non-humans and humans are tied to each other in the black boxes. The Actor-Network Theory is an integration of three different domains society, nature, and language. The end product of varying a network is different; it can be related to society, it can be related to technology, or it can be related to scientific facts. (Bosco, 1994). The society, and Nature are two main poles of this Theory. Nature is not man-made; it can only be observed, whereas the society is created by humans. A role or character is given to the actor, and he has to perform that character. The black box term means the non-humans, and humans are tied or sealed in a network to achieve goal. The more and more the box is strongly closed, the more reliable the network is. The actors are linked (or dependent on each other) with each other with the help of a network to achieve a common goal. The actors exchange, their messages with the help of intermediate. It acts as a source for providing missing links between the actors (Bosco, 1994). It has been argued that ANT does not provide proper explanations related to social processes. The reasons for using Actor-Network Theory for computing A goal cant be achieved without the help of actors. The Google Company has created a game AlphaGo, and it wins the first prize in the world champion. It has been created by Lee Sedol , and DeepMind. In this scenario, the Lee Sedol, and DeepMind both are actants (Asia Wired UK , 2016). The ANT theory helps in achieving the goal. The goal is assigned to employees and it is given to all the employees (the goal is divided into tasks). The employees work together to achieve the goal. They are connected to each other through a network or relationship. It also helps in managing the organization in better way. The various components related to the Actor-Network Theory Actor These are the entities that perform the different tasks. They can act as technological entities or they can act as social entities , and it depends on the requirement. A role or character is given to the actor , and he has to perform that character. Lets take an example of the money based system. A coin, a piece which is made from a metal , and it is an actant. Because it has some value, it is a source of money exchange, so it acts as an actor. So actor is a source that is used for representation. In this case,, the coin is a source that is used for representation. The Actor-Network Theory relates to a network of various elements like people, process,, and instruments , and it is also related to the use these things to achieve a specified goal it can be the launch of a new product or manufacturing of products, etc. (Wired UK, 2016). The black Box The black box is sealed all the elements in a box. In other terms, the non-humans, and humans are tied or sealed in a network to achieve goal. Take an example of the money based system. A coin, a piece which is made from a metal , and it is an actant. Because it has some value, it is a source of money exchange, so it acts as an actor. So actor is a source that is used for representation. In this scenario, the coin is a black box. The more and more the box is strongly closed, the more reliable the network is. A network The network is a relationship between the non-humans, and the humans, and it cant be determined. The network is consisting of two main elements one is people, and other is things. People, are the entities that are involved in various tasks like manufacturing, development, distribution, etc. Things are those entities that are used for connecting people,. The actors are linked (or dependent on each other) with each other with the help of a network to achieve a common goal. The different tasks are assigned to different actors , and they have worked differently on them. Intermediary It acts as a source for providing missing links between the actors. It can be any text, money, etc. that is helpful for creating proper transactions. The actors exchange, their messages with the help of intermediate. E.g. Apple Company is going to launch new iPhone7 and the employees of different teams IT team, HR team, etc. and hardware, software etc. all are actants. They are connected with each other through a network, and they are sharing different databases. They all are working together to achieve a goal (launch iPhone7). The Apple Company is a black box. Computing News story 1 Topic: Amazon has created screening videos to protect the data from theft. Source: https://www.bbc.com/news/technology,-35763908 Amazon is an IT based company. It consists of employees, softwares, hardwares, etc. (these are entities or actants). The outsiders can hack the data or any important or the confidential information of the company. The data can be made secure with the help of the firewall. A Firewall is made by the combination of hardware , and software , and no one (outsider) can enter inside the system. In this way, firewall helps to make the system secure (Lau, 1998). A Firewall is helpful in securing the organization from outsiders. But many organizations like Amazon the data is stolen by the colleagues of the organization. To secure data from the colleagues the Amazon Company (from March 9, 2016) has started using screening videos to protect the data from theft. They have placed these videos in its warehouses (Ted.com, 2016). Retrieved from: https://www.bbc.com/news/technology-35763908 The whole system, i.e. the employees, softwares, hardware, security system is known as a black box. The actors exchange, their messages with the help of intermediate. The actors are linked (or dependent on each other) with each other with the help of a network to achieve a common goal. The actor and a network both are dependent on each other The actor and a network both are dependent on each other. The terms, are incomplete without each other. A network is created with the help of actors, and an actor cant perform at an individual level, i.e. it can do its task without creating a network. The size of the network and the size of both actors are dependent on each other. The size of a network increases as the number of actors increases , and the size of a network decreases as the number of actors decreases. On the other h, and, the size of the actors also varies as the size of the network varies. Computing News story 2 Topic: Google has created AlphaGo, game Source: https://www.theguardian.com/uk/technology, A goal cant be achieved without the help of actors. The Google Company has created a game AlphaGo, and it wins the first prize in the world champion. It has been created by Lee Sedol , and DeepMind. In this scenario, the Lee Sedol , and DeepMind both are actants (Asia Wired UK , 2016). Retrieved from: https://www.theguardian.com/lifeandstyle/shortcuts/2016/mar/09/go-googles-computer-beat-chinese-games-world-champion-deepmind-alphago-lee-se-dol The google Company consists of employees, softwares, hardwares, etc. (these are entities or actants). The whole company is the black box. The actors exchange, their messages with the help of intermediate. The actors are linked (or dependent on each other) with each other with the help of a network to achieve a common goal. It consists of employees working at a lower level, middle-level, and high level or management level. The lower level employees communicate with the management level employees through the middle-level employees. So in this scenario, the middle-level employees like team lead will act as an intermediate for lower and higher level employees. Advantages, and disadvantages of contemporary computing The Internet is a big source for connecting the actants but on the other h, and it acts as a source for doing cyber-crimes. In Amazon the data is stolen by the colleagues of the company. To secure data from the colleagues the Amazon Company (from March 9, 2016) has started using screening videos to protect the data from theft. They have placed these videos in its warehouses (Ted.com, 2016). The Google Company has created a game AlphaGo, and it wins the first prize in the world champion. It has been created by Lee Sedol , and DeepMind. In this scenario, the Lee Sedol, and DeepMind both are actants. This game gets huge popularity in The East (Asia Wired UK, 2016). The video games are a good source of entertainment. There are various types of video games that act as a source of aggression in the childs behavior (On 9 March, 2016). The students of the 15 year age groups play games which are not relevant to their age. Many regulatory boards in Europe (Pegi-regulatory board), and in US are working on this issue (by creating age certifications). Conclusion The non-humans and humans are interconnected with each other through a conceptual framework. According to the Actor-Network Theory the non-humans and humans are tied to each other in the black boxes. The Actor-Network Theory is an integration of three different domains society, nature, and language. The end product of varying a network is different; it can be related to society, it can be related to technology, or it can be related to scientific facts. The Actor-Network Theory is an integration of three different domains society, nature, and language. The end product of vary a network is different; it can be related to society, it can be related to technology, or it can be related to scientific facts. The actor , and a network both are dependent on each other. The terms, are incomplete without each other. A network is created with the help of actors , and an actor cant perform at the individual level, i.e. it can do its task without creating a network. The actors are linked (or depen dent on each other) to each other with the help of a network to achieve a common goal. The different tasks are assigned to different actors, , and they have worked differently on them. References BBC News. (2016). Technology, - BBC News. [online] Available at: https://www.bbc.co.uk/news/technology, [Accessed 10 Mar. 2016]. Bignon, V. , and Dutu, R. (n.d.). Coin Assaying , and Commodity Money. SSRN Electronic Journal. Bosco, H. (1994). The ATM infrastructure , and beyond. J Netw Syst Manage, 2(2), pp.91-93. Ft.com. (2016). Tech news , and technology, industry analysis - FT.com. [online] Available at: https://www.ft.com/companies/technology, [Accessed 10 Mar. 2016]. Lau, O. (1998). Meta-firewall: A sixth generation firewall Part 1. A network Security, 1998(6), pp.10-16. McClure, B. (1998). The firewall behind the firewall. Computers Security, 17(4), p.325. Nyc.org. (2016). [online] Available at: https://www.nyc.org/shows/notetoself [Accessed 10 Mar. 2016]. Oertel, G., Tornero, M. , and Groot, K. (1964). Thin-layer chromatography of steroid conjugates. Journal of Chromatography A, 14, pp.509-511. Papaioannou, A. , and Zafeiriou, S. (2014). Principal Component Analysis With Complex Kernel: The Widely Linear Model. IEEE Trans. Neural Netw. Learning Syst., 25(9), pp.1719-1726. Ted.com. (2016). Technology, | TED.com. [online] Available at: https://ted.com/topics/technology, [Accessed 10 Mar. 2016]. the Guardian. (2016). Technology, | The Guardian. [online] Available at: https://www.theguardian.com/uk/technology, [Accessed 10 Mar. 2016]. The Independent. (2016). Tech. [online] Available at: https://www.independent.co.uk/life-style/gadgets-, and-tech [Accessed 10 Mar. 2016]. The right biometric?. (2006). Biometric Technology, Today, 14(3), pp.8-9. Wired UK. (2016). Wired.co.uk Future Science, Culture Technology, News , and Reviews (Wired UK). [online] Available at: https://www.wired.co.uk [Accessed 10 Mar. 2016].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.