Write a paper that discusses the need and necessity of research and technologica
ID: 421288 • Letter: W
Question
Write a paper that discusses the need and necessity of research and technological tools.
Identify a minimum of three (3) technological tools that you have used throughout your academic career and your current profession.
Include the following in your research and technology paper:
-Benefits and leveraging capabilities of the technological tools identified
-Legal and ethical issues that need to be acknowledged when using these technological tools, such as but not restricted to:
-Intellectual property
-Data mining
-Security risks
-Future use of the technological tools identified and how to best protect yourself and your place of employment from misuse
Explanation / Answer
Research is very important as a tool for building knowledge and learning. If you come across any issues you are confused about, you may research using various technological tools available and get the idea about such issue. These days every business does have research team within the organization. What are myths and what are facts can be solve and understand through research. You may have the idea of your business market, target customers and diversified range of future prospectus.
Identify a minimum of three (3) technological tools that you have used throughout your academic career and your current profession.
Benefits and leveraging capabilities of the technological tools identified
The benefits that these tools offer to the business is the way they connect with the people at large and easy to spread the information and make them available to the person you would like to have impact on. They help in gaining the competitive advantage.
Legal and ethical issues that need to be acknowledged when using these technological tools, such as but not restricted to –
Intellectual property – All these three tools are in public domain and therefore business must be take care of any sensitive information lying there. Usually there is no such information on such public domain sides except Google drive wherein you can store your personal data and have a secured password in it.
-Data mining – It is done based on research that we do either by reading other similar blogs of the people or googling or via you tube. The information drive using such sites is usually for your use.
-Security risks – Using all these tools, you may ask your IT engineer to lock it for not downloading or copying by their unwanted party.
-Future use of the technological tools identified and how to best protect yourself and your place of employment from misuse – To protect the business from misuse install adequate safety measures with the help of your IT manager from leaking out or from virus or their party attack. There are several software’s available these days for the protections against such scams.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.