How Might the Internet of Things Change Society
Formal scholarly essays are constituted so that they are objectively true. Objectivity is in contrast to other forms of writing, such as a subjective essay written from the author’s idiosyncratic individual biases, or an exercise in rhetoric. Rhetoric is writing meant primarily to persuade rather than to inform, and has a long tradition in Western classical scholarship. A formal scholarly essay, however, must appeal to the intellect rather than the passions. A well-written scholarly work is one where every statement, and every sentence is somehow proven to be true to the reader.
To offer this kind of objective ‘proof’ when you write your essay you really have only a handful of possibilities. These are as follows:
Use logical argument: Logic is the science of the formal principles of reasoning that demonstrates a sequence of thoughts that lead to a valid thought. For example, the statement: “All hippies have long hair”, and the statement that “John is a hippy”, forces, through logic, to state that “John has long hair”. In your own use of logic, you may have to present a somewhat muted version of this type of reasoning, but the “Most hippies ... John is ... John most likely has” logic still has validity.
Use examples: In your essay, particularly if it involves abstract conceptualizations, ‘truth’ can often best be established by offering examples of what insight you are offering the reader. Examples can be weak or strong supporters of your insight, depending upon how generalizable they are. If, for instance, I write “rear-engined cars are considerably more dangerous than front-engined cars” I can offer an analysis of the pendulum-like weight distribution of rear-engined cars versus other configurations, but I can also write that: “Rear-engined Porsche 911s are frequently known to be in single-vehicle accidents” I have sort of offered ‘proof’. Whether or not that ‘proof’ is acceptable to the reader or not, depends on a number of factors, including whether the rear suspension of the Porsche 911 was to blame, the accident statistics are believable, and so on. One thing that examples do accomplish, however, is that they ‘concretize’ the abstract concept so that a reader can envision and understand it. Using examples is often the best way to explain a concept. Using examples is really just about using the principles of deductive and inductive reasoning. Inductive reasoning takes an example and makes a generalization from it. Its credibility relies on how representative the example is of other examples. Deductive reasoning would apply a generalized idea, such as an abstract concept (e.g. rear-engined cars) and apply it to a specific example (e.g. the Porsche 911).
Cite an outside authority: Most interesting scholarly papers attempt to add to the existing body of knowledge, and do so by constructing their knowledge on the foundation of previous knowledge. This is how progress happens in many instances, just as technological innovation tends to build on past technologies. If you are to make a case for an insight, analysis, or point in your essay, you can establish its credibility by citing other credible authors and their writings. This requires, however, that the sources you cite are considered, and are seen to be considered, truthful and reliable. What constitutes a valid source is described in the links listed below: “Evaluation During Reading” and “Annotated Bibliography”. It is sufficient to use a citation format - such as APA required in this course (though other formats are as good, and arguably better) to establish this type of substantiation in your essay.
The one thing you should ask yourself, after writing every single statement and sentence, is: “Did I offer convincing substantiation of this point to the reader?” You really need to do this for your entire essay for it to fulfill the requirements of good scholarship. Keep in mind too, that most readers will tend, out of simple human nature, to disbelieve everything you say if they should stumble across one thing you say that they think is untrue
Abstract
For your Research Paper ensure you write your Abstract following the guidelines and requirements described in "The Report Abstract and Executive Summary" in the Purdue Online Writing Lab.
Introduction
Refer to Part 4: Introduction for details on writing the introduction.
Essay Body Structure
Good structure of an essay follows the same rules as good writing. Generally paragraphs should be used to isolate different ideas from one another, and each paragraph needs to follow upon the previous paragraph with some kind of connecting idea. Connecting ideas are often indicated by connecting words and phrases such as ‘however’, ‘as in the previous argument’, ‘in contrast’, ‘accepting this premise we conclude’, and so on. The connections, that can be stated either at the beginning or ends of paragraphs (or both) are numerous and amenable to creative writing styles.
The structure of your essay sometimes is usefully divided not just by well-defined paragraphs, but also by sections delineated by headings. For additional information on headings, refer to Part 3: List of Headings.
Conclusion
Every scholarly essay requires an introduction and a conclusion, even if these sections are not overtly labelled as such. The conclusion really is a summation of what was said, proven, and/or discovered, in the body of the essay relative to the thesis question. The conclusion needs to restate the thesis question in some manner (that is, it need not and perhaps should not be verbatim), and say, in concentrated form just what the essay said about it. One common mistake is to introduce new ideas in the conclusion. You should avoid this. As a general rule, you as the writer should only include in the conclusion what is found in the essay itself. The only exception to this is that it is sometimes appropriate to indicate further areas of inquiry and study in the conclusion. The common saw about the structure of a good speech is that it “tells the audience what you are going to tell them; tells them; tells the audience what you told them.” The principles of a good essay are quite similar.
Essay Presentation
Your goal in writing your essay is to express ideas, often quite complex ideas, in a manner that is easily understood by an educated reader. Your form of substantiation, your essay structure, and the presentation of your essay should enhance and not impede your readers’ understanding. And again, good writing is a skill that enables good thinking. Your essay may be a most brilliant piece of insightful writing, but unless you present your essay well, its ideas may be overshadowed or ignored. There are a few basics about essay presentation that you should follow:
Title Page: Your essay requires a title page that includes your essay’s title, your name, the name of the course, and the date. These should be centred and neat.
Abstract: This summarizes your paper's key findings in a succinct form.
Number Pages: You will be formatting your essay as a document (usually a Word Document) and so it will have pages. In the digital world, some documents don’t have pages. The title page and the first page should not have page numbers written on them, subsequent pages should (starting, therefore, at “3”.
Fonts: General practice is to use serif fonts for text, and san-serif fonts for titles. One common preference is for 12-point Palatino linotype for text, and 12, 14, and 16-point bolded Arial for titles. Non-capitalized serif fonts are easiest to read because the reader’s eye quickly sees the overall shape of the word. ALL-CAPITALS and sans-serif fonts, do not have that easy shape. Fonts should be in a very dark colour (black, dark teal, etc.) and the background should always be white.
Bibliography: You require a bibliography (not your annotated bibliography) for your essay. It should include primary sources and scholarly sources. You should include as many bibliographic references as you need; however, it is hard to imagine that you would have fewer than 15 or so for a 5,000-word paper.
What and How to Cite: Cite all ideas that are not common knowledge and are not yours. These need not be direct quotations. Cite all direct quotations. Quotations less than four lines should be included within “quotation marks”. Quotations greater than four lines should be indented on both the left and right-hand sides, and single-space.
Citation Format: Your essay is to be formatted, as a standard imposed by RCC, in APA citation style. There are good reasons not to use APA style, but it has, for better or worse, become the standard used by most academic presses.
Photos and Illustrations: Our digitized universe, and the fact that you will be submitting your essay as an electronic document, means that photos and illustrations are technically easy to include. While scholarly essays traditionally do not include photos and illustrations, you should feel free to include any that you deem appropriate in terms of furthering the scholarly expression of your essay. They should, however, be formatted in terms of size, location, and citation.
Word Count: The word count for this assignment is 5000 words (+-500 word, excluding Title and Reference pages)”. The word counts for assignments in HUMN 422 are specified within very stringent limits. As an andragogic principle, the discipline of ‘drawing inside the lines’ is a useful one to learn. A trick that often works well for writing with a really clear, concise, punchy style is to over-write your number of words, and then trim sentence-by-sentence.
Spellingand Grammar: There is no excuse, given computer programs, to misspell. Grammar programs tend to pick up many faults as well. Just do not make mistakes!
Proof Reading: Almost nobody can write perfectly. Most people cannot see their own writing mistakes. Asking someone to proofread your essay assignment before submitting it does not constitute cheating, but rather, is something you should expect to do.
Contractions: Contractions should not be used in formal writing.
Words: Use the most specific words possible and avoid the weak generalized expressions.
Sources for Help
This document is meant to give some specific guidelines for your research essay, but is not comprehensive. There is an excellent online writing lab is maintained by Purdue University that you can refer to, and from which several required content readings in your course syllabus derived:
The Online Writing Lab (OWL) at Purdue University houses writing resources and instructional material, and we provide these as a free service of the Writing Lab at Purdue. Students, members of the community, and users worldwide will find information to assist with many writing projects.
There are numerous other guides to good writing. Recommended is Strunk and White’s The Elements of Style which is succinct at eighty-five pages, an entertaining easy read, and widely available.
RCC’s Student Online Support (SOS) has links to many good writing guidelines.
How Might the Internet of Things Change Society
Student Name
University
Course
Professor Name
Date
Abstract
The Internet of Things (IoT) has become a buzzword in recent decades due to the proliferation of new technologies and devices. Today, billions of people use devices that are connected to others that form a wider network of devices that communicate and share information across the users. Such a system is called the IoT since the primary element connecting the devices is the internet. IoT has revolutionized human life and activities. For example, one can access health records on their mobile phones or share the same with the physicians and hospitals. Similarly, many people use social media or do online shopping, all of which are major examples of how the IoT shapes the world. Overall, it has been established that IoT has simplified human life through such applications as automation and ease of access to information.
How Might the Internet of Things Change Society
The developments in technology have always been associated with both positive and negative implications on society. The term Internet of Things (IoT) was coined in 1999 by Kevin Ashton to imply the proliferation of smart devices interconnected to build a global communication infrastructure. According to Patel et al., (2016), the term IoT refers to the network comprising anything with the internet based on set protocols through information sensors used to exchange information and communication to achieve such goals as positioning, smart recognition, tracing, administration, and monitoring. In recent years, the concept of IoT is often used to imply communication infrastructure, sensors, actuators, and other smart devices that facilitate digitization. Additionally, IoT has revolutionized virtually all industries, including healthcare, agriculture, homes, travel and transport, and safety and security. As such, it can be observed that almost all aspects of human life are influenced by the emergence of IoT. Therefore, there is a need to explore the topic of how IoT changes society.
The focus of this essay will be on addressing the question of how IoT might change society. To achieve this objective, multiple aspects of people’s daily lives will be explored to establish what role IoT plays. Examples include employment, health and fitness, shopping, security, and monitoring and controlling in business applications. As will be illustrated, the IoT offers convenience to people’s lives by making it easier and tasks simpler on one hand. On the other hand, society has to contend with such challenges as privacy, which could endanger their wellbeing. Therefore, both positive and negative implications of the IoT on society are explored.
Employment
Employment can be regarded as one of the most basic and common economic activities since it means deploying labor, one of the factors of production. The IoT has had several impacts on employment, most of which deal with the management of human capital. Some of the effects touch on such areas as workplace safety and digitization of the workplace. Many scholars today agree that IoT adoption has been a key driver of workplace digitization. According to Mahler and Westergren (2018), information technology has been used in workplaces since the 1950s and has been associated with increased productivity of workers and a decline in the costs of information exchange. With the idea of IoT, it can be argued that workplace digitization changes the nature of employment, especially the roles and responsibilities of the employees. For example, automation and the use of robotics in such factories as Tesla and other car manufacturers means that large numbers of people have been replaced by machines. Additionally, those people left in these industries have seen their employment change significantly due to the changes in skillsets required. IoT has changed employment through automation of certain roles and changing the job roles of other positions within the workplace.
The impacts of IoT o employment in terms of digitization can be understood by using the concept of Industry 4.0 in manufacturing. The rationale is that following the definition of IoT provided earlier, it emerges that the main idea of IoT is the interconnection of smart devices. Under the umbrella of Industry 4.0, several smart technologies are encompassed, including IoT, 3D printing, augmented reality, and big data analytics (Freddi, 2018). Manufacturing companies deploying all these novel technologies have changed their outlooks such that the manual skills previously used to perform human tasks have faded. Industry 4.0 means that almost all aspects of employment have become digitized, including decision-support systems where machines can make decisions. Such functions used to be performed by human beings, which means that the nature of employment has changed entirely.
In the example given earlier of Tesla’s manufactory, roots perform most of the tasks leaving few employment positions. Recently, Tesla’s CEO, Elon Musk, announced the development of a humanoid robot that would be used to handle everyday boring tasks. The Tesla bot is already being deployed across multiple engineering positions, including electrical, controls, mechanical, autonomy, software, and embedded firmware (Lambert, 2021). These positions were among the few where people were employed, which means that employment in the face of IoT will continue to suffer. The main question that arises is what happens when all job positions are occupied by smart gadgets developed through IoT. Artificial intelligence (AI) is the major concept in IoT that makes it possible for the infrastructure to perform and behave as it does. Without AI, the devices would not be considered smart and the IoT would simply be a platform for information exchange. However, AI makes the devices smart such that they can perform roles previously performed by humans, including decision-making. Besides the manual jobs, managerial employees are not becoming the next target of IoT and will soon be replaced by smart robots.
As mentioned earlier, some of the implications of IoT on employment focus on the management of human capital. In human resource management (HRM), some of the major functions include recruitment and selection, training and development, and remuneration. In conjunction with other departments, the safety of the workplace may also be the responsibility of the HRM managers. In this regard, the IoT has changed how firms perform tasks related to HRM. According to KravΔík et al. (2017), Industry 4.0 is leveraged across multiple industries for workplace learning and training. In other words, employers are resorting to the deployment of smart technologies to enhance the training and development of their workers. Besides replacing workers, the businesses are also making efforts to continuously improve the competencies and skills of their workers. IoT offers the necessary tools for this purpose, which means that employment further experiences positive outcomes from smart technologies.
Workplace engagement is another aspect of HRM in the workplace where people's employment success depends on how well a company engages the workers. Engagement is made possible through communicating and interacting, which is the primary purpose of the IoT infrastructure. As explained by Nor et al. (2018), the IoT helps organizations retain their top talent through engagement practices that help create corporate citizenship. Generation Y is considered to be drastically volatile and does not owe allegiance to any employer. Their engagement is deemed critical since it is one of the few tools used by employers to keep millennials interested in their jobs. In terms of workplace safety, IoT tools and devices have proven critical in such applications as monitoring health and such incidences as the body falls. Examples offered by Kianoush et al., (2017) include body-worn devices, including cameras and video or acoustic devices. These devices detect and report human behaviors through wireless connections, which help prevent accidents and help keep health conditions in check.
Security
One of the biggest concerns for IoT deployment across various facets of human life is security. Interconnecting devices means exposure and heightened vulnerability to attacks. In other words, each of the devices in an IoT network infrastructure can be a source of cyber threats. Today, studies on the role, evolution, and implications of IoT are accompanied by an examination of the security implication. However, one can observe that all developments in IoT are followed by security improvement measures. For example, the concept of software-defined networking (SDN) emerged as a result of the advances in computer networking and it offers security solutions for a network by controlling its overall behavior (Al Hayajneh et al., 2020). Such security measures acknowledge that the devices can be a source of threat, which means that security efforts aimed at monitoring each device in a network are a logical approach. However, understanding the nature of the security concerns in an IoT infrastructure means going beyond the devices themselves and exploring the nature and targets of an attack.
Attacks on an IoT infrastructure have been well-documented in the literature. Al Hayajneh et al. (2020) establish that the attacks can be categorized into two: attacks on data phases and attacks on architect layers. The main role of the architect layers of a network is to transmit packets from source to destination, often by finding the best routes. Attacks on architect layers focus on disrupting the path between the source and destination. The types of attacks include IP spoofing, hijacking, and smurf attacks. Attacks on data phases focus majorly on data ranson, a total wipe-out of data, or other attacks targeting the data itself. Today, many data leakages have occurred in corporations with massive financial and other implications. The attackers are often after personal and sensitive data that can be used against individuals and corporations. For example, the Capital One data breach that occurred in 2019 exposed 106 million people to data theft, including personal details, addresses, and social security numbers (BBC, 2019). This is considered to be the largest attack in banking history. This example serves to indicate the extent to which IoT infrastructure can be vulnerable to attacks. Additionally, this example shows how attacks on data phases take place where hackers gain unauthorized access to a company's IoT system and take control of the data.
Other major attacks on IoT that have been witnessed over the last decade indicate that it is increasingly impossible to build and completely secure IoT infrastructure. Besides the two classifications of attacks given above, other classifications also exist depending on the nature of the attack. Research by Malhotra, et al. (2021) highlights ten attacks and three anomalies most common in an IoT. Examples of the attacks include active attacks, which target the confidentiality and integrity of the system. Such attacks include denial of service, alteration, man-in-the-middle, interruption, and distributed denial of service. Passive attacks are intended for gathering information without getting discovered, for example, traffic analysis, monitoring, and eavesdropping. Physical layer attacks tamper and exploit devices, which makes them the most vulnerable terminal in an IoT infrastructure. Examples include jamming, replication, and node tampering. All other classifications of attacks offer unique threats depending on what the attackers hope to achieve. For instance, software-based attacks seek to gain access to and destroy a system through such attacks as worms, Trojan horse, and viruses. Overall, it is apparent that attacks in an IoT system can emanate from multiple sources, which makes it increasingly difficult to defend on all fronts.
With the nature of attacks having been described, the next question that needs addressing is how the security of IoT can be enhanced. At this stage, it has been made apparent that IoT exposes individuals and corporations to massive threats. However, it can also be expressed that the massive benefits derived from these systems mean that they are indispensable for most people. The best pathway to resolving this dilemma is addressing the security concerns to make IoT as secure as possible, which is a challenge in itself. Current studies have proposed possible solutions that take into consideration the complexity of the IoT environment. According to Ahanger and Aljumah (2019), some scholars have suggested a cube structure model that converges privacy, security, and trust in an IoT environment. The integrated model addresses key security challenges, including identity management, authentication, and embedded security. The key security concern for an IoT infrastructure is resilience to attacks, which implies that IoT systems should be able to recover. However, such measures as access control, data security, and secure network access as only useful if attackers are completely blocked. However, even the most secure networks have been hacked in the past and hackers will continue to develop new tactics and methods to attack.
Overall, IoT has made millions of people vulnerable to cyber-attacks, even those without direct access to the IoT systems. In the Capital One example provided earlier, the 106 million people exposed in the data breach were not part of the bank’s IoT infrastructure. However, the fact that their data was stored in the company’s systems means that even the customers themselves become targets for these threats. Similarly, all individuals with access to interconnected devices face the same challenge from attacks that target personal and sensitive data. For instance, phones and personal computers can be hacked to access passwords to online banking or credit card data, which could lead theft of victims’ money. Regardless of how useful and indispensable the IoT has become for modern society, the inability to ensure complete security of the IoT environment means individuals will always be vulnerable to attacks.
Health and Fitness
The applications of IoT continue to expand to cover even those areas that are critically sensitive. Health and fitness is an area where new technologies have produced massive positive results and hardly any detriment to the wellbeing of the users. In essence, the use of IoT in healthcare faces the same security challenges as other environments as explained in the section above. However, it can be observed from empirical evidence that IoT has positively revolutionized health and fitness where health challenges are now easier to resolve. In many cases, IoT tools are often used as sources of information, communication tools, and even research and development. A case study of orthopedics presented by Haleem et al. (2020) illustrates how IoT has impacted healthcare. In this case, IoT has been responsible for the advances in treatment, information, surgery, education, and research and development. In orthopedic surgery, IoT facilitates effective communication between patients and physicians, which improves the chances of recovery for the patients. Additionally, the IoT infrastructure is used in the collection of patient data and such functions as creating routine patient alerts following up the recovery after surgery. These benefits were hardly obtained without the application of IoT in this medical field of practice, which also applies to other fields.
Besides orthopedics, IoT has also helped make massive improvements in other fields of healthcare. Some scholars acknowledge that even though the benefits of IoT spread across all fields of life, the benefits in healthcare are more significant due to the cutting-edge transition facilitated by IoT (Nazir et al., 2019). In this case, these authors acknowledge that IoT in healthcare is further facilitated by the application of mobile computing, which means accessing healthcare services through digital devices. Besides patient-doctor communication, mobile health facilitates the connectivity of all health resources and services. Apps and software have been developed to make it possible for patients to reach out to hospitals and individual caregivers as the need arises. Basic health monitoring capabilities are also enhanced, which means that physicians and patients are constantly aware of the health conditions, recovery progress, or even responses to treatment. Patients no longer need to be hospitalized for their health conditions to be monitored. This function is perfectly possible using mobile health applications. Applications of IoT in healthcare can be summarized in the figure below:
Applications of IoT inhealthcareSingle conditionapplicationCluster cond...
π Other Visitors are Viewing These APA Essay Samples:
-
Using Personal Electronic Devices by Hospital Registered Nurses
3 pages/β825 words | 6 Sources | APA | Social Sciences | Research Paper |
-
The Effects of Employment Website on Success in Wage Negotiations
8 pages/β2200 words | 5 Sources | APA | Social Sciences | Research Paper |
-
Climate Change Threat to Coffee Production in Indonesia
7 pages/β1925 words | 2 Sources | APA | Social Sciences | Research Paper |