1
2
Cognitive Behavioral Theory
Patrice Scope
Capella University
SWK5003/ Human Behavior Social Env 1
Aileen McCabe-Maucher
01/29/2022
Cognitive Behavioral Theory
Introduction
Critical comprehension of theoretical basis in understanding human Behavior and actions is vital in decision-making to sleet and apply the appropriate theoretical approach for a client on a case-by-case basis. Notably, embracing an appropriate theoretical framework to manage clients' social Behavior gives a client-centric approach that increases effectiveness and overall outcome in managing clients’ cases. In an attempt to identify Joe as a character in the film, Joe the King, there fundamental asocial Behavior and scenarios witnessed in Joe as the major character’s behavior such as stealing and shoplifting to compensate for life frustrations due to lacking parental guidance, constant humiliation causing anti-social Behavior such as petty theft, tardiness at school, and difficulty in developing a constructive relationship with others underpins a case for consideration. Cognitive Behavioral Therapy is a fundamental theoretical basis that offers effective articulation, concepts, ideas, and framework that provides a fundamental platform for case management. Particularly, Cognitive Behavioral Therapy describes a psychotherapeutic treatment method, enabling an individual to learn to identify and change maladaptive behavior, replacing them with positive ones as a short-term treatment method. Accordingly, providing a detailed presentation on Cognitive Behavioral Therapy as a theoretical basis and how it resonates with human behavior and development, accommodating Joe’s situation in the film is underpinning.
The CBT
Cognitive Behavioral Therapy Overview
Cognitive Behavioral Therapy describes a psychotherapeutic treatment method, enabling an individual to learn to identify and change maladaptive Behavior, replacing them with positive ones as a short-term treatment method, accommodating negative thought patterns and feeling that posit negative influence on behavior and emotions (Ruggiero et al. 2018). In this case, the Cognitive-behavioral Theory (CBT) focuses on identifying and changing automatic negative thoughts and feelings that are destructive and posit negative influence on human behavior and emotions. Noteworthy, the CBT accommodates three fundamental articulations in managing anti-social behavior as a short-term treatment method including identifying, changing, replacing destructive thought and feeling patterns with realistic, objective, and positive feelings and thoughts. According to the authors, CBT emerged in the 1960s from Aron Beck's concept of automated negative thoughts and feelings, developing cognitive therapy (Ruggiero et al. 2018). Admittedly, the CBT theoretical basis accommodates individual thoughts and feelings that are negative and destructive, promoting asocial behavior by replacing such destructive thoughts with realistic and objective ones. Thus, the CBT is a fundamental theory to identify Joe’s negative thoughts and feelings causing stealing and shoplifting behavior with positive ones in the society.
CBT Approaches
As a short-term psychotherapeutic treatment, CBT encompasses a range of techniques and approaches for comprehensive applications in managing clients’ asocial behaviors, thoughts, and emotions. Notably, the CBT involves therapeutic approaches including cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy, all accommodating different approaches to manage underlying thoughts and feeling patterns contribution to psychological conditions (King and Boswell, 2019). A cognitive therapy strategy is an approach that indulges in identifying and changing destructive thoughts, feeling, and behavior emotional responses with positive thought patterns. Consequently, dialectical behavior therapy is an approach that accommodates a platform to address thought and behavior through emotional regulation and mindfulness. Additionally, multimodal therapy is a fundamental approach in the CBT that incorporates seven independent but interconnected modalities including behavior, impact, sensation, imagery, cognition, interpersonal drivers, drugs, and biological considerations in highlighting psychological issues that promote negative and destructive behaviors, feelings, and emotions (King and Boswell, 2019. Finally, Rational Emotive behavior therapy constitutes the identification of irrational behavior, beliefs, and learning to embrace a change in destructive thoughts. Similarly, the CBT approaches including cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy are effective in handling Joe’s situation in the film, Joe the King.
CBT Techniques
In psychotherapeutic treatment, CBT uses various strategies involving clients and therapists in identifying negative thoughts and a fundamental range of techniques to change such negative behavior, feelings, and emotions. Fundamentally, the CBT accommodates final intervention including identifying negative thoughts, practicing new skills, goal setting, problem solving, and self-monitoring (Tsitsas and Paschali, 2014). Identifying negative thoughts involves feelings, situations, and thoughts that contribute to maladaptive behavior (Lincoln et al. 2017). Similarly, in the film, asocial Behavior, and scenarios witnessed in Joe as the major character's behavior such as stealing and shoplifting to compensate for life frustrations due to lacking parental guidance, constant humiliation causing anti-social Behavior such as pretty theft, tardiness at school, and difficulty in developing a constructive relationship with others underpins identification of situations and events causing maladaptive behaviors. Practicing new skills is a fundamental strategy that the CBT accommodates for effective case management, accommodating real-world situations. For example, Joe's case of stealing and shoplifting need the practice of new positive skills such as positive relationship with society rehearsing. Goal setting is another vital facet of the CBT technique that is vital in mental illness recovery and improving the health and life of clients. For instance, a therapist can assist a client in setting goals, acknowledging SMART goals, and short-term and long-term goals for the process and outcome.
Additionally, problem solving is a crucial technique incorporated in the CBT theoretical basis for human behavior assessment, evaluation, and improvement involving the identification of factors causing maladaptive behaviors among clients. In the CBT, problem solving accommodates a significant stepwise phase including problem identification, listing all possible solutions, strengths, and weakens evaluation of the options, selecting a solution for implementation, and implementing the solution (Sburlati et al. 2015). Finally, developing a self-monitoring technique in the CBT when dealing with maladaptive behaviors acknowledge tracking behavior, symptoms, and experiences and sharing such with a therapist to improve treatment method in the CBT. Similarly, the film, Joe the King, particularly on Joe the Characters required fundamental presentation on techniques such as identifying negative thoughts, practices new skills, goal setting, problem-solving, and self-monitoring to provide an effective platform for comprehensive anti-social behavior management for the client.
Strengths of the CBT
The CBT operates under the praxis that individual thoughts and feeling influences behavior, emotions, and actions. According to the authors, embracing and identifying individual negative thoughts and replacing such feelings and thoughts with positive ones offers an effective platform for controlling how interpreting feelings and thoughts give a supportive environment (Ruggiero et al. 2018). According to the research-based findings, the CBT treatment method gives a platform for healthy thinking through identifying negative thoughts and feelings (Stefan et al. 2019). Additionally, CBT is one fundamental and effective short-term treatment method and improvements are seeable in 5 to 20 sessions. Additionally, CBT has accommodated a fundamental range of applications in managing maladaptive behaviors and is comparatively affordable than other therapy types. According to the researchers, CBT is an effective treatment method in virtual and physical applications and replaces psychotropic medications (Kumar et al. 2017). Thus, fundamental research-based evidence offers effective strengths and effectiveness of the CBT and applications in managing maladaptive behavior among clients.
The CBT Weakness
Despite fundamental strengths in the CBT applications in the treatment of maladaptive behaviors, some fundamental weaknesses and challenges require consideration for effective outcomes. Notably, difficulties in changes, structured CBT, lacking the willingness to change among the clients, and gradual process, interfere with the CBT applications effectiveness. Change can be difficult, especially among clients who perceive that identifying irrational and destructive thoughts and feelings have no significance in impacting positive feelings and though for pro-social behavior. Similarly, the CBT is a structured therapeutic approach unlike psychoanalytic psychotherapy that recognizes fundamental articulation on unconsciousness drivers in maladaptive behavior; hence the effectiveness of the CBT depends on the clients’ comfort ability on structured and focused psychotherapy strategy. Additionally, the effectiveness of Cognitive Behavioral Therapy depends on the client’s willingness to change which presents an effective weakness when a client is not willing to change destructive thoughts and feelings to realistic and objective feelings and thoughts for positive human behavior and development. Finally, the CBT treatment method is a gradual process that requires case-by-case analysis in managing maladaptive behavior and failure to accommodate a step may cause negative outcomes. Therefore, a comprehensive application of the CBT for assessment, evaluation, and intervention to locate negative human behavior and development requires effective considerations of the CBT weakness, incorporating strengths for a positive therapeutic outcome among clients with maladaptive behaviors.
The CBT Cultural Competency
The CBT accommodates fundamental cultural competency for effective and multidimensional applications. Notably, increasing multi-cultural societies creates a significant platform for the CBT to establish multicultural groups for effective applications. Similarly, the culturally informed Tran diagnostic model offers an integrative platform to acknowledge cultural articulation on case management. Specifically, the movie, Joe the King, occurs within the 1970s in a multicultural society that managing maladaptive behavior for Joe requires an informed Tran diagnostic model for effective applications. Noteworthy, the CBT manages cultural diversity in the theory applications via grouping and contextual sensitivity, supporting the CBT on cultural completely and applications (Hinton and Patel, 2017). Fundamentally, the CBT accommodates cultural competency through accommodating core cultural values and validating the clients’ experience, considering environmental changes. The CBT accommodates individuals, families, groups, organizations, communities, and societies, reinforcing cultural competency. Similarly, the movie, Joe the King, resonates with the CBT applications in managing maladaptive behavior from the character's behavior, situations, feelings, and thoughts, acknowledging social and person-in-environment for effective cultural competency. Therefore, the CBT acknowledges social environment, person-in-environment, and other multidisciplinary theoretical frameworks in engaging with clients enhancing cultural competencies and awareness.
Assessment intervention, and evaluation for the CBT in the movie case study.
In an attempt to identify Joe as a character in the film, Joe the King, there are fundamental asocial Behavior and scenarios witnessed in Joe as the major character’s behavior such as stealing and shoplifting to compensate for life frustrations due to lacking parental guidance, constant humiliation causing anti-social Behavior such as pretty theft, tardiness at school, and difficulty in developing a constructive relationship with others underpins a case for consideration. Specifically, assessing the case can accommodate the CBT approaches such as cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy, all accommodating different approaches to manage underlying thoughts and feeling patterns contribution to psychological conditions (King and Boswell, 2019). Specifically, the strategies give an effective platform to identify Joe's frustration with life from a dysfunctional family and non-welcoming school environment and how the character acquires such occurrences with maladaptive behaviors such as stealing and shoplifting and negative relationship with others.
Cognitive therapy enables a therapist to identify Joe’s destructive thoughts, feeling, and emotions while dialectical behavior therapy is an approach that accommodates a platform to address thought and behavior through emotional regulation and mindfulness regulating Joe’s maladaptive behavior. Similarly, multimodal therapy incorporates seven independent but interconnected modalities including behavior, impact, sensation, imagery, cognition, interpersonal drivers, drugs, and biological considerations that assist in highlighting multi-dimensional factors, influencing Joe’s feelings, thoughts, emotions, and behavior in the movie for practical maladaptive behavior management by the CBT as the theoretical basis for case-by-case management. Thus, the CBT will provide an effective platform for psychotherapeutic treatment methods, enabling an individual to learn to identify and change maladaptive behavior, replacing them with positive ones as a short-term treatment method for Joe in the movie, Joe the King.
Conclusion
In conclusion, the paper has provided effective articulation on Cognitive Behavioral Therapy as a theoretical basis and how it resonated with human behavior and development, accommodating Joe’s situation in the movie, Joe the King. The CBT acknowledges therapeutic strategies such as cognitive therapy, dialectical behavior therapy, multimodal therapy, and rational emotive behavioral therapy, all accommodating different approaches to managing underlying thoughts and feeling patterns contributing to psychological conditions. Similarly, the CBT has prevented evidence-based effectiveness in assessment, intervention, evaluation, and identification of potential factors fueling maladaptive behavior for Joe, accommodating cultural competency Thus, the CBT is an effective theoretical basis for case-by-case analysis to manage maladaptive behaviors and clients.
References
Hinton, D., and Patel, A. (2017). Cultural Adaptations of Cognitive Behavioral Therapy. The Psychiatric clinics of North America. DOI: 10.1016/j.psc.2017.08.006
King, R., and Boswell, F. (2019). Therapeutic Strategies and Techniques in Early Cognitive-Behavioral Therapy. Psychotherapy, 9, (56)1: 35-40
Kumar V, Sattar Y, Bseiso A, Khan S, Rutkofsky IH. (2017). The effectiveness of internet-based Cognitive Behavior Therapy in the treatment of Psychiatric disorders. Cureus, 9(8):e1626.
Lincoln, T.M., Riehle, M., Pillny, M, et al. (2017). Using Functional Analysis as a framework to guide individualized treatment for negative.Front Psychol. doi:10.3389/fpsyg.2017.02108
Ruggiero, G., Spada, G., Caselli, G., and Sassaroli, S. (2018). A Historical and Theoretical Review of Cognitive-Behavioral Therapies: From Structural SelfKnowledge to Functional Processes. J Rat-Emo Cognitive-Behav Ther (36):378–403 https://doi.org/10.1007/s10942-018-0292-8
Sburlati, E. S., Lyneham, H. J., Schniering, C. A., et al. (2015). Evidence-Base CBT for anxiety and depression in children and adolescents, competencies-based approach. John Wiley & Sons; 2014. doi:10.1002/9781118500576.ch17
Stefan, S., Cristea, I., Tatar, A., David, D. (2019). Cognitive‐behavioral therapy (CBT) for a generalized anxiety disorder: Contrasting various CBT approaches in a randomized clinical trial. Journal of Clinical Psychology, (2019),1–15
Tsitsas GD, Paschali, A. (2014). A cognitive-behavior therapy applied to social anxiety disorder and specific phobia, case study. Health Psychol Res, 2(3):1603. doi:10.4081/hpr.2014.1603
IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 4
Networks, Collaborative Technology, and The Internet of Things
Learning Objectives (1 of 4)
2
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals Defined
A computer network is a set of computers connected together for the purpose of sharing recourses.
3
Copyright ©2018 John Wiley & Sons, Inc.
Common Network Types
Acronym | Type | Characteristics | Example |
LAN | Local Area Network | Short distance connection | Office School Home |
WAN | Wide Area Network | Spans large physical distance | Internet Large company |
WLAN | Wireless LAN | LAN based on Wi-Fi technology | Internet Large company |
4
Copyright ©2018 John Wiley & Sons, Inc.
Intranets, Extranets, and Virtual Private Networks
Intranets are used within a company for data access, sharing, and collaboration.
Extranets are private, company-owned networks that can be logged into remotely via the Internet.
Virtual Private Networks (VPNs) are used where security of transmissions is a concern, because they encrypt the packets before they are transferred over the network.
5
Copyright ©2018 John Wiley & Sons, Inc.
Virtual Private Networks
A virtual tunnel routed through the Internet with software and hardware encryption.
6
Copyright ©2018 John Wiley & Sons, Inc.
6
Network Terminology
Modem: a device that modulates/demodulates signal for transportation
Modulation and Coding: Techniques used by modem to adapt the signal to the media
Signal: Binary information we want to send.
Signal Frequency Spectrum: All the frequency components of a signal
Media Bandwidth: Limit in range of frequency signals
Capacity Bandwidth: Maximum bits per second that can be transmitted
7
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
8
Copyright ©2018 John Wiley & Sons, Inc.
Quality of Service (QoS)
Latent-sensitivity: data such as real-time voice and high-quality video.
Prioritized Traffic: data and apps that are time-delay-sensitive or latency-sensitive apps.
Throttle Traffic: gives latency-sensitive apps priority, other types of traffic need to be held back (throttled).
Traffic Shaping: the ability to prioritize and throttle network traffic.
9
Copyright ©2018 John Wiley & Sons, Inc.
The Net Neutrality Debate
Net neutrality is the principle that Internet Service Providers (ISPs) and their regulators treat all Internet traffic the same way.
Traffic shaping prioritizes the flow of traffic by delaying the flow of less important network traffic.
In 2010, the FCC ruled in favor of “net semi-neutrality”, not explicitly forbidding paid prioritization.
The FCC under the current administration may take further steps to roll back net neutrality rulings, which could favor the cable companies over consumers.
10
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals
Name different types of networks.
What is meant by “bandwidth”?
What is the difference between an intranet and an extranet?
How does a virtual private network (VPN) provide security?
What is the purpose of a modem?
Describe the basic functions of business networks.
How do investments in network infrastructure impact an organization?
Name the two tiers of traffic to which Quality-of-Service is applied.
11
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it.
3. Intranets are used within a company for data access, sharing, and collaboration.
An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end.
5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception.
6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search.
Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds.
Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing.
Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc.
Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently.
7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity, security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network.
• Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled).
11
Learning Objectives (2 of 4)
12
Copyright ©2018 John Wiley & Sons, Inc.
Internet Protocols, APIs, and Network Capabilities
Internet Protocol (IP) is the basic technology that makes global communication possible. Each devise attached to a network has a unique IP address that enables it to send and receive files made up of packets.
13
Copyright ©2018 John Wiley & Sons, Inc.
IP Addresses and Packets
Figure 4.5: IPv4 addresses have four groups of four alphanumeric characters, which allows for 232 or roughly 4.3 billion unique IP address. IPv6 addresses have eight groups of alphanumeric characters, which allows for 2128 , or 340 trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce.
14
Copyright ©2018 John Wiley & Sons, Inc.
14
Broadband Technology: 3G/4G/5G
3G networks support multimedia and broadband services over a wider distance and at faster speeds than prior generation networks. They use large satellite connections to telecommunication towers.
4G networks are digital, or IP, networks that enable even faster data transfer rates. 4G delivers average realistic download rates of 3 Mbps or higher (as opposed to theoretical rates, which are higher).
5G networks, the coming generation of broadband technology. 5G will dramatically increase the speed at which data is transferred across the network.
15
Copyright ©2018 John Wiley & Sons, Inc.
Network Technology Standards
WiMAX
IEEE 802.16
30-mile range
70 Megabits per second (Mbps)
Line-of-site not required
Same principles as Wi-Fi (using radio signals)
Long-Term Evolution (LTE)
GSM deployed by Verizon, AT&T, and T-Mobile
100 Mbps downlink, 50 Mbps uplink
16
Copyright ©2018 John Wiley & Sons, Inc.
Circuit vs. Packet Switching
Circuit switching
Older technology that originated with telephone calls
Inefficient for digital transmission
Packet Switching
Transfers data or voice
Files are broken into packets, numbered sequentially, routed individually to their destinations
When received at the destination, the packets are reassembled into their proper sequences
17
Copyright ©2018 John Wiley & Sons, Inc.
Application Programming Interfaces and Operating Systems
Application Program Interface (API) consists of a set of functions, commands, and protocols used by programmers for OS-interactivity without having to write a program from scratch.
Can be automated for simplified usability
Amazon
18
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.7 API value chain in business.
19
Copyright ©2018 John Wiley & Sons, Inc.
Internet Protocols (IP), APIs, and Network Capabilities
Why has IPv6 become increasingly important?
What is the difference between IPv4 and IPv6?
What is the purpose of an IP address?
What are the benefits of using an API?
What is the difference between 4G and 5G?
What is the most current network standard?
What benefits will the upcoming 5G network standard offer businesses?
What is the difference between circuit switching and packet switching?
20
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
IPv4 can support roughly 4.3 billion unique IP address. IPv6 can support 340 trillion, trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce. In April 2014 ARIN, the group that oversees Internet addresses, reported that IPv4 addresses were running out—making it urgent that enterprises move to the newer IPv6
IP Version 4 (IPv4) has been Internet protocol for over three decades, but has reached the limits of its 32-bit address design. IP Version 6 (IPv6) is the most recent version of the Internet Protocol. IPv6 is replacing IPv4 because of IPv4’s limitations in number of IP addresses it can generate. IPv6 has a 128-bit address and allows 7.9 x 1028 times as many addresses as IPv4, which provides about 4.3 billion addresses.
3. Every device that communicates with a network must have a unique identifying IP address. An IP address is comparable to a telephone number or home address.
4. For programmers: The benefits of APIs are that they simplify the programmer’s job and ensure that all programs using the same API use that resource in the same manner. APIs are the common method for accessing information, websites, and databases.
Business benefits of APIs include:
APIs are channels to new customers and markets: APIs enable partners to use business assets to extend the reach of a company’s products or services to customers and markets they might not reach easily.
APIs promote innovation: Through an API, people who are committed to a challenge or problem can solve it themselves.
APIs are a better way to organize IT: APIs promote innovation by allowing everyone in a company to use each other’s assets without delay.
APIs create a path to lots of Apps: Apps are going to be a crucial channel in the next 10 years. Apps are powered by APIs. Developers use APIs and combinations of APIs to create new user experiences.
5. 4G delivers average download rates of 3Mbps or higher. In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. Even though individual networks, ranging from 2G to 3G, started separately with their own purposes, soon they will be converted to the 4G network. 4G is based purely on the packet-based Internet Protocol (IP) – unlike current 2G and 3G networks that have a circuit-switched subsystem. Users can get 4G wireless connectivity through one of the following standards:
1. WiMAX is based on the IEEE 802.16 standard and the metropolitan area network (MAN) access standard.
2. LTE (Long-Term Evolution) is a GSM-based technology that is deployed by Verizon, AT&T, and T-Mobile. LTE has download data rates of 100 Mbps and upload data rates of 50 Mbps.
5G networks are the coming generation of broadband technology. 5G builds on the foundation created by 4G. 5G will dramatically increase the speed at which data is transferred across the network.
6. Although 5G isn’t expected until 2020 and many organizations are already investing in the infrastructure required to run this new mobile wireless standard.
7. 5G mobile networks will offer huge gains in both speed and capacity over existing 4G networks−along with opportunities at the operations and strategic levels. In the short term, the 5G infrastructure build-out will create new jobs. In the longer term, 5G will create entirely new markets and economic opportunities driven by superior mobile capabilities in industries ranging from health care to automotive.
8. The two types of switching are:
Circuit switching: A circuit is a dedicated connection between a source and a destination. Circuit switching is older technology that was used for telephone calls. The distinguishing characteristic is that the circuit cannot be used by any other call until the session (connection) is ended. It is inefficient for digital transmission.
Packet switching: Packet switching transfers data or voice in packets. Files are broken into packets, numbered sequentially, and routed individually to their destination. When received at the destination, the packets are reassembled into their proper sequence.
The astute student may realize: The path of the signal is digital, and is neither dedicated nor exclusive. That is, the networks are shared. When packets are transmitted over a shared network, such as the Internet, they may follow different paths to the destination, where they are reassembled into the original message once all of them have arrived.
20
Learning Objectives (3 of 4)
21
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.8 Four drivers of global mobile traffic through 2020
22
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Data Traffic Milestone by 2020
23
Copyright ©2018 John Wiley & Sons, Inc.
Wireless Networks and Mobile Infrastructure
Mobile Networks
Bluetooth: short-range wireless communication technology allowing device pairing
Wi-Fi: standard way to wirelessly connect computing devices through routers commonly connected to the Internet
WiMax: transmits voice, data, and video over high-frequency radio signals designed as alternative to cable and DSL
24
Copyright ©2018 John Wiley & Sons, Inc.
Data Networks, IP Addresses, and APIs: A mashup of GPS and Bluetooth
General term referring to the integration of two or more technologies such as Bluetooth and Wi-Fi
Provide intelligence
Inter-Automobile collision avoidance
Sudden braking
Can automatically call emergency services
25
Copyright ©2018 John Wiley & Sons, Inc.
Data Networks, IP Addresses, and APIs: Near-Field Communication (NFC)
Enables two devices within close proximity to establish a communication channel and transfer data using radio waves
More secure than other wireless technologies
Examples:
Apple iWatch
Digital tickets providing access to concerts
Transmit public transport payment through phones
26
Copyright ©2018 John Wiley & Sons, Inc.
Four Important Factors When Choosing a Mobile Network
27
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Networks
What factors are contributing to mobility?
Why is mobile global traffic increasing?
What accounts for the increase in mobile traffic?
Give some examples of VoIP networks.
How is NFC different from RFID?
What are the two components of a wireless network infrastructure?
What is Near Field Communication and how is it used in business?
What factors should be considered when evaluating a mobile network?
28
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1.Answers may vary. Factors contributing to mobility can include the following:
New wireless technologies such as WiMAX-Wireless Broadband and standards such as 8.11n
High-speed wireless networks such as 4G
Multitasking mobile devices
More robust mobile OSs and their applications
Increased competitive pressure as others start adopting mobile technology for strategic applications
2. Organizations are recognizing the strategic value of mobile technology. So, organizations are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities. As technologies that make up the mobile infrastructure evolve, identifying strategic technologies and avoiding wasted investments require more extensive planning and forecasting.
3. In its most recent Visual Networking Index Forecast (VNI), Cisco reported that mobile data traffic has grown 400 million times over the past 15 years. They also predict that by 2020 monthly global mobile data traffic will be 30.6 exabytes; number of mobile-connected devices will exceed 11.6 billion (exceeding the world’s project population of 7.8 billion) and smartphones will account for 81% of total mobile traffic. This includes a major increase in machine-to-machine communications and the number of wearable technology devices.
4. Examples of high-capacity networks are wireless mobile, satellite, wireless sensor, and VoIP (voice over Internet Protocol) such as Skype.
5. NFC enables two devices within close proximity to establish a communication channel and transfer data through radio waves. NFC is location-aware technologies that are more secure than other wireless technologies like Bluetooth and Wi-Fi. Unlike RFID, NFC is a two-way communication tool.
6. The two components of wireless infrastructures are wireless LANs and WiMAX.
7. Answers may vary. Location-aware NFC technology, such as smartphones, can be used to make purchases in restaurants, resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains. They also can provide consumers with content to complement their current activity, such as recipe or idea videos when shopping at a supermarket having proper NFC tag-equipped units.
8. When evaluating mobile network solutions, four factors to consider are:
1. Simple: Easy to deploy, manage and use.
2. Connected: Always makes the best connection possible.
3. Intelligent: Works behind the scenes, easily integrating with other systems.
4. Trusted: Enables secure and reliable communications.
28
Learning Objectives (4 of 4)
29
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Virtual Collaboration--Benefits
Information sharing between retailers and suppliers (Example: Walmart and Proctor & Gamble)
Retailer-supplier collaboration (Example: Asda Corp.)
Lower transportation and inventory costs and reduced stockouts (Example: Unilever’s Transportation Business Center)
Reduction of product development time (Example: Caterpillar, Inc.)
30
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Group Work
Group Work and Dynamics can be quite complex
Group workers can be located in different places or work at different times
Group members may work for the same or different organizations
Data, information, or knowledge may be located in many sources that may be external to the organization
31
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Brainstorming in the Cloud
Companies are now using cloud-based online brainstorming applications
Avoids travel expenses if members are geographically dispersed
No restriction to number of sessions
Examples
Evernote—features function to synchronize user’s notes
iMindmap Online—relies on mind mapping and other structured approaches to help streamline work processes
32
Copyright ©2018 John Wiley & Sons, Inc.
The Internet of Things (IoT)
Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, that enables these objects to collect and exchange data.
Objects we interact with send signals to and from each other, collecting data
IoT collects that data from millions of sensors embedded in everything from cars, to refrigerators, to space capsules
Half of U.S. manufacturers report they are currently using IoT technology to collect machine data (Industry Week study, 2016)
A smaller percentage (44%) are colleting data from sensors embedded in their products
33
Copyright ©2018 John Wiley & Sons, Inc.
Advantages of IoT
Monitoring performance, quality, and reliability of products and services
Gaining insight into potential new products and service
Support sales
Better understand product use
Remote troubleshooting of products
Deliver revenue-generating post-sales services
More efficiently deliver post-sales services
34
Copyright ©2018 John Wiley & Sons, Inc.
34
Disadvantages of IoT
Network security
Data privacy
Data analysis capabilities
Data collection capabilities
Realistic efficiency opportunities
Realistic new revenue opportunities
Cost
35
Copyright ©2018 John Wiley & Sons, Inc.
35
Collaboration Technologies and the Internet of Things (IoT)
Why is group work challenging?
What might limit the use of in-person brainstorming?
How can online brainstorming tools overcome those limits?
List ways in which virtual collaboration can be used in business.
What devices do you have that take advantage of the IoT? Describe how they impact the way that you live and work.
What is driving the rise of IoT?
What is the main concern that organizations have about the IoT?
Do you think the advantages outweigh the disadvantages of the IoT? Explain.
36
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1. Group work involves processes that can be quite complex depending on the following factors:
Group members may be located in different places or work at different times.
Group members may work for the same or for different organizations.
Some of the needed data, information, or knowledge may be located in many sources, several of which are external to the organization.
Despite the long history and benefits of collaborative work, groups are not always successful.
2. Answers may vary. In-person brainstorming can be limited by travel expense if members are geographically dispersed. Other limiting factors, such as schedules, time zones, and available resources, such as an available meeting place, may limit in-person brainstorming.
3. Online brainstorming tools can be accessed virtually from anywhere Internet access is available. Many of these tools allow users to post comments on their own time rather than having to meet at a particular time, however, virtual meetings may be necessary as well.
4. Virtual Collaboration can be used in business to share information between retailers and their suppliers, lower transportation and inventory cists, and reduce product development time.
5. Everyday items such as cellphones, coffee markers, washing machines, lamps and headphones all use the IoT. (Answers may vary on the impact)
6. Several things have created the ‘perfect storm’ for the creation and growth of the IoT. These include more widely available broadband Internet, lower cost of connecting, development of more devices with wi-fi capabilities and embedded sensors, and the overwhelming popularity of the smartphone.
7. Network security and data privacy are manufacturers’ top concerns about IoT technology. With billions of devices connected together there are a multitude of end-points where security breaches can occur and individuals or organizations can be hacked.
8. Answers may vary.
36
Copyright
Copyright © 2018 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.
37
Copyright ©2018 John Wiley & Sons, Inc.
37
Collaborative Technologies and the Internet of Things (IoT) (105 points)The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life.
· Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT.
· Discuss the potential impact that IoT can have on how people live.
· Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited.
· How has the IoT been impacted by the pandemic? Explain specific examples.
Your well-written report should be 4-5 pages in length, not including the title and reference pages. To make it easier to read and therefore grade, make sure you clearly delineate each section of your answer so it can be matched with the relevant question. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references as appropriate. Review the grading rubric to see how you will be graded for this assignment. CT Assignment Rubric CT Assignment Rubric - Alternative Formats
For Your Success
This week, consider the ways in which networks support you at home, at work, and at school. How do you use network technologies to get information, communicate, and collaborate? How do these make it easier?
1. Differentiate between various network types and functions.
2. Examine protocols and network capabilities, and why a business manager should understand these.
3. Articulate the importance and impact of mobile networks on business.
4. Analyze the business uses of collaborative technologies and the Internet of Things.
Readings
Required:
Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the Special Section on Advances in Internet-based Collaborative Technologies . ACM Transactions on Internet Technology (TOIT) - Special Section on Advances in Internet-Based Collaborative Technologies, 19(3), 1–4.https://doi.org/10.1145/3361071
Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things: A developer’s perspective . ACM Computing Surveys, 54(5), 102.
Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative social internet of things in mobile edge networks . IEEE Internet of Things Journal, 7(12), 11473–11491.
Recommended:

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com