Roles Of Line Management And Social Network And Information Technology Sections

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

 

 

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

Arthur M. Langer

 

 

CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-7575-5 (Paperback) International Standard Book Number-13: 978-1-138-23858-9 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com

and the CRC Press Web site at http://www.crcpress.com

 

 

v

Contents

Foreword xi Acknowledgments xiii Author xv IntroductIon xvii

chApter 1 the “rAvell” corporAtIon 1 Introduction 1 A New Approach 3

The Blueprint for Integration 5 Enlisting Support 6 Assessing Progress 7

Resistance in the Ranks 8 Line Management to the Rescue 8 IT Begins to Reflect 9 Defining an Identity for Information Technology 10 Implementing the Integration: A Move toward Trust and Reflection 12 Key Lessons 14

Defining Reflection and Learning for an Organization 14 Working toward a Clear Goal 15 Commitment to Quality 15 Teaching Staff “Not to Know” 16 Transformation of Culture 16

Alignment with Administrative Departments 17 Conclusion 19

 

 

vi Contents

chApter 2 the It dIlemmA 21 Introduction 21 Recent Background 23 IT in the Organizational Context 24 IT and Organizational Structure 24 The Role of IT in Business Strategy 25 Ways of Evaluating IT 27 Executive Knowledge and Management of IT 28 IT: A View from the Top 29

Section 1: Chief Executive Perception of the Role of IT 32 Section 2: Management and Strategic Issues 34 Section 3: Measuring IT Performance and Activities 35 General Results 36

Defining the IT Dilemma 36 Recent Developments in Operational Excellence 38

chApter 3 technology As A vArIAble And responsIve orgAnIzAtIonAl dynAmIsm 41 Introduction 41 Technological Dynamism 41 Responsive Organizational Dynamism 42

Strategic Integration 43 Summary 48

Cultural Assimilation 48 IT Organization Communications with “ Others” 49 Movement of Traditional IT Staff 49 Summary 51

Technology Business Cycle 52 Feasibility 53 Measurement 53 Planning 54 Implementation 55 Evolution 57 Drivers and Supporters 58

Santander versus Citibank 60 Information Technology Roles and Responsibilities 60 Replacement or Outsource 61

chApter 4 orgAnIzAtIonAl leArnIng theorIes And technology 63 Introduction 63 Learning Organizations 72 Communities of Practice 75 Learning Preferences and Experiential Learning 83 Social Discourse and the Use of Language 89

Identity 91 Skills 92

 

 

viiContents

Emotion 92 Linear Development in Learning Approaches 96

chApter 5 mAnAgIng orgAnIzAtIonAl leArnIng And technology 109 The Role of Line Management 109

Line Managers 111 First-Line Managers 111 Supervisor 111

Management Vectors 112 Knowledge Management 116 Ch ange Management 120 Change Management for IT Organizations 123 Social Networks and Information Technology 134

chApter 6 orgAnIzAtIonAl trAnsFormAtIon And the bAlAnced scorecArd 139 Introduction 139 Methods of Ongoing Evaluation 146 Balanced Scorecards and Discourse 156 Knowledge Creation, Culture, and Strategy 158

chApter 7 vIrtuAl teAms And outsourcIng 163 Introduction 163 Status of Virtual Teams 165 Management Considerations 166 Dealing with Multiple Locations 166

Externalization 169 Internalization 171 Combination 171 Socialization 172 Externalization Dynamism 172 Internalization Dynamism 173 Combination Dynamism 173 Socialization Dynamism 173

Dealing with Multiple Locations and Outsourcing 177 Revisiting Social Discourse 178 Identity 179 Skills 180 Emotion 181

chApter 8 synergIstIc unIon oF It And orgAnIzAtIonAl leArnIng 187 Introduction 187 Siemens AG 187

Aftermath 202 ICAP 203

 

 

viii Contents

Five Years Later 224 HTC 225

IT History at HTC 226 Interactions of the CEO 227 The Process 228 Transformation from the Transition 229 Five Years Later 231

Summary 233

chApter 9 FormIng A cyber securIty culture 239 Introduction 239 History 239 Talking to the Board 241 Establishing a Security Culture 241 Understanding What It Means to be Compromised 242 Cyber Security Dynamism and Responsive Organizational Dynamism 242 Cyber Strategic Integration 243 Cyber Cultural Assimilation 245 Summary 246 Organizational Learning and Application Development 246 Cyber Security Risk 247 Risk Responsibility 248 Driver /Supporter Implications 250

chApter 10 dIgItAl trAnsFormAtIon And chAnges In consumer behAvIor 251 Introduction 251 Requirements without Users and without Input 254 Concepts of the S-Curve and Digital Transformation Analysis and Design 258 Organizational Learning and the S-Curve 260 Communities of Practice 261 The IT Leader in the Digital Transformation Era 262 How Technology Disrupts Firms and Industries 264

Dynamism and Digital Disruption 264 Critical Components of “ Digital” Organization 265 Assimilating Digital Technology Operationally and Culturally 267 Conclusion 268

chApter 11 IntegrAtIng generAtIon y employees to AccelerAte competItIve AdvAntAge 269 Introduction 269 The Employment Challenge in the Digital Era 270 Gen Y Population Attributes 272 Advantages of Employing Millennials to Support Digital Transformation 272 Integration of Gen Y with Baby Boomers and Gen X 273

 

 

ixContents

Designing the Digital Enterprise 274 Assimilating Gen Y Talent from Underserved and Socially Excluded Populations 276 Langer Workforce Maturity Arc 277

Theoretical Constructs of the LWMA 278 The LWMA and Action Research 281

Implications for New Pathways for Digital Talent 282 Demographic Shifts in Talent Resources 282 Economic Sustainability 283 Integration and Trust 283

Global Implications for Sources of Talent 284 Conclusion 284

chApter 12 towArd best prActIces 287 Introduction 287 Chief IT Executive 288 Definitions of Maturity Stages and Dimension Variables in the Chief IT Executive Best Practices Arc 297

Maturity Stages 297 Performance Dimensions 298

Chief Executive Officer 299 CIO Direct Reporting to the CEO 305 Outsourcing 306 Centralization versus Decentralization of IT 306 CIO Needs Advanced Degrees 307 Need for Standards 307 Risk Management 307

The CEO Best Practices Technology Arc 313 Definitions of Maturity Stages and Dimension Variables in the CEO Technology Best Practices Arc 314

Maturity Stages 314 Performance Dimensions 315

Middle Management 316 The Middle Management Best Practices Technology Arc 323

Definitions of Maturity Stages and Dimension Variables in the Middle Manager Best Practices Arc 325

Maturity Stages 325 Performance Dimensions 326

Summary 327 Ethics and Maturity 333

chApter 13 conclusIons 339 Introduction 339

glossAry 357 reFerences 363 Index 373

 

 

xi

Foreword

Digital technologies are transforming the global economy. Increasingly, firms and other organizations are assessing their opportunities, develop- ing and delivering products and services, and interacting with custom- ers and other stakeholders digitally. Established companies recognize that digital technologies can help them operate their businesses with greater speed and lower costs and, in many cases, offer their custom- ers opportunities to co-design and co-produce products and services. Many start-up companies use digital technologies to develop new prod- ucts and business models that disrupt the present way of doing busi- ness, taking customers away from firms that cannot change and adapt. In recent years, digital technology and new business models have dis- rupted one industry after another, and these developments are rapidly transforming how people communicate, learn, and work.

Against this backdrop, the third edition of Arthur Langer’ s Information Technology and Organizational Learning is most welcome. For decades, Langer has been studying how firms adapt to new or changing conditions by increasing their ability to incorporate and use advanced information technologies. Most organizations do not adopt new technology easily or readily. Organizational inertia and embed- ded legacy systems are powerful forces working against the adoption of new technology, even when the advantages of improved technology are recognized. Investing in new technology is costly, and it requires

 

 

xii Foreword

aligning technology with business strategies and transforming cor- porate cultures so that organization members use the technology to become more productive.

Information Technology and Organizational Learning addresses these important issues— and much more. There are four features of the new edition that I would like to draw attention to that, I believe, make this a valuable book. First, Langer adopts a behavioral perspective rather than a technical perspective. Instead of simply offering norma- tive advice about technology adoption, he shows how sound learn- ing theory and principles can be used to incorporate technology into the organization. His discussion ranges across the dynamic learning organization, knowledge management, change management, com- munities of practice, and virtual teams. Second, he shows how an organization can move beyond technology alignment to true technol- ogy integration. Part of this process involves redefining the traditional support role of the IT department to a leadership role in which IT helps to drive business strategy through a technology-based learn- ing organization. Third, the book contains case studies that make the material come alive. The book begins with a comprehensive real-life case that sets the stage for the issues to be resolved, and smaller case illustrations are sprinkled throughout the chapters, to make concepts and techniques easily understandable. Lastly, Langer has a wealth of experience that he brings to his book. He spent more than 25 years as an IT consultant and is the founder of the Center for Technology Management at Columbia University, where he directs certificate and executive programs on various aspects of technology innovation and management. He has organized a vast professional network of tech- nology executives whose companies serve as learning laboratories for his students and research. When you read the book, the knowledge and insight gained from these experiences is readily apparent.

If you are an IT professional, Information Technology and Organi­ zational Learning should be required reading. However, anyone who is part of a firm or agency that wants to capitalize on the opportunities provided by digital technology will benefit from reading the book.

Charles C. Snow Professor Emeritus, Penn State University

Co­Editor, Journal of Organization Design

 

 

xiii

Acknowledgments

Many colleagues and clients have provided significant support during the development of the third edition of Information Technology and Organizational Learning.

I owe much to my colleagues at Teachers College, namely, Professor Victoria Marsick and Lyle Yorks, who guided me on many of the the- ories on organizational learning, and Professor Lee Knefelkamp, for her ongoing mentorship on adult learning and developmental theo- ries. Professor David Thomas from the Harvard Business School also provided valuable direction on the complex issues surrounding diver- sity, and its importance in workforce development.

I appreciate the corporate executives who agreed to participate in the studies that allowed me to apply learning theories to actual organizational practices. Stephen McDermott from ICAP provided invaluable input on how chief executive officers (CEOs) can success- fully learn to manage emerging technologies. Dana Deasy, now global chief information officer (CIO) of JP Morgan Chase, contributed enormous information on how corporate CIOs can integrate tech- nology into business strategy. Lynn O’ Connor Vos, CEO of Grey Healthcare, also showed me how technology can produce direct mon- etary returns, especially when the CEO is actively involved.

And, of course, thank you to my wonderful students at Columbia University. They continue to be at the core of my inspiration and love for writing, teaching, and scholarly research.

 

 

xv

Author

Arthur M. Langer, EdD, is professor of professional practice of management and the director of the Center for Technology Management at Columbia University. He is the academic direc- tor of the Executive Masters of Science program in Technology Management, vice chair of faculty and executive advisor to the dean at the School of Professional Studies and is on the faculty of the Department of Organization and Leadership at the Graduate School of Education (Teachers College). He has also served as a member of the Columbia University Faculty Senate. Dr. Langer is the author of Guide to Software Development: Designing & Managing the Life Cycle. 2nd Edition (2016), Strategic IT: Best Practices for Managers and Executives (2013 with Lyle Yorks), Information Technology and Organizational Learning (2011), Analysis and Design of Information Systems (2007), Applied Ecommerce (2002), and The Art of Analysis (1997), and has numerous published articles and papers, relating to digital transformation, service learning for underserved popula- tions, IT organizational integration, mentoring, and staff develop- ment. Dr. Langer consults with corporations and universities on information technology, cyber security, staff development, man- agement transformation, and curriculum development around the Globe. Dr. Langer is also the chairman and founder of Workforce Opportunity Services (www.wforce.org), a non-profit social venture

 

 

xvi Author

that provides scholarships and careers to underserved populations around the world.

Dr. Langer earned a BA in computer science, an MBA in accounting/finance, and a Doctorate of Education from Columbia University.

 

 

xvii

Introduction

Background

Information technology (IT) has become a more significant part of workplace operations, and as a result, information systems person- nel are key to the success of corporate enterprises, especially with the recent effects of the digital revolution on every aspect of business and social life (Bradley & Nolan, 1998; Langer, 1997, 2011; Lipman- Blumen, 1996). This digital revolution is defined as a form of “ dis- ruption.” Indeed, the big question facing many enterprises today is, How can executives anticipate the unexpected threats brought on by technological advances that could devastate their business? This book focuses on the vital role that information and digital technology orga- nizations need to play in the course of organizational development and learning, and on the growing need to integrate technology fully into the processes of workplace organizational learning. Technology personnel have long been criticized for their inability to function as part of the business, and they are often seen as a group outside the corporate norm (Schein, 1992). This is a problem of cultural assimila- tion, and it represents one of the two major fronts that organizations now face in their efforts to gain a grip on the new, growing power of technology, and to be competitive in a global world. The other major

 

 

xviii IntroduCtIon

front concerns the strategic integration of new digital technologies into business line management.

Because technology continues to change at such a rapid pace, the ability of organizations to operate within a new paradigm of dynamic change emphasizes the need to employ action learning as a way to build competitive learning organizations in the twenty-first century. Information Technology and Organizational Learning integrates some of the fundamental issues bearing on IT today with concepts from organizational learning theory, providing comprehensive guidance, based on real-life business experiences and concrete research.

This book also focuses on another aspect of what IT can mean to an organization. IT represents a broadening dimension of business life that affects everything we do inside an organization. This new reality is shaped by the increasing and irreversible dissemination of technology. To maximize the usefulness of its encroaching presence in everyday business affairs, organizations will require an optimal understanding of how to integrate technology into everything they do. To this end, this book seeks to break new ground on how to approach and concep- tualize this salient issue— that is, that the optimization of information and digital technologies is best pursued with a synchronous imple- mentation of organizational learning concepts. Furthermore, these concepts cannot be implemented without utilizing theories of strategic learning. Therefore, this book takes the position that technology liter- acy requires individual and group strategic learning if it is to transform a business into a technology-based learning organization. Technology­ based organizations are defined as those that have implemented a means of successfully integrating technology into their process of organiza- tional learning. Such organizations recognize and experience the real- ity of technology as part of their everyday business function. It is what many organizations are calling “ being digital.”

This book will also examine some of the many existing organi- zational learning theories, and the historical problems that have occurred with companies that have used them, or that have failed to use them. Thus, the introduction of technology into organizations actually provides an opportunity to reassess and reapply many of the past concepts, theories, and practices that have been used to support the importance of organizational learning. It is important, however, not to confuse this message with a reason for promoting organizational

 

 

xixIntroduCtIon

learning, but rather, to understand the seamless nature of the relation- ship between IT and organizational learning. Each needs the other to succeed. Indeed, technology has only served to expose problems that have existed in organizations for decades, e.g., the inability to drive down responsibilities to the operational levels of the organization, and to be more agile with their consumers.

This book is designed to help businesses and individual manag- ers understand and cope with the many issues involved in developing organizational learning programs, and in integrating an important component: their IT and digital organizations. It aims to provide a combination of research case studies, together with existing theories on organizational learning in the workplace. The goal is also to pro- vide researchers and corporate practitioners with a book that allows them to incorporate a growing IT infrastructure with their exist- ing workforce culture. Professional organizations need to integrate IT into their organizational processes to compete effectively in the technology-driven business climate of today. This book responds to the complex and various dilemmas faced by many human resource managers and corporate executives regarding how to actually deal with many marginalized technology personnel who somehow always operate outside the normal flow of the core business.

While the history of IT, as a marginalized organization, is rela- tively short, in comparison to that of other professions, the problems of IT have been consistent since its insertion into business organiza- tions in the early 1960s. Indeed, while technology has changed, the position and valuation of IT have continued to challenge how execu- tives manage it, account for it, and, most important, ultimately value its contributions to the organization. Technology personnel continue to be criticized for their inability to function as part of the business, and they are often seen as outside the business norm. IT employees are frequently stereotyped as “ techies,” and are segregated in such a way that they become isolated from the organization. This book pro- vides a method for integrating IT, and redefining its role in organiza- tions, especially as a partner in formulating and implementing key business strategies that are crucial for the survival of many companies in the new digital age. Rather than provide a long and extensive list of common issues, I have decided it best to uncover the challenges of IT integration and performance through the case study approach.

 

 

xx IntroduCtIon

IT continues to be one of the most important yet least understood departments in an organization. It has also become one of the most significant components for competing in the global markets of today. IT is now an integral part of the way companies become successful, and is now being referred to as the digital arm of the business. This is true across all industries. The role of IT has grown enormously in companies throughout the world, and it has a mission to provide stra- tegic solutions that can make companies more competitive. Indeed, the success of IT, and its ability to operate as part of the learning organization, can mean the difference between the success and failure of entire companies. However, IT must be careful that it is not seen as just a factory of support personnel, and does not lose its justification as driving competitive advantage. We see in many organizations that other digital-based departments are being created, due to frustration with the traditional IT culture, or because they simply do not see IT as meeting the current needs for operating in a digital economy.

This book provides answers to other important questions that have challenged many organizations for decades. First, how can manag- ers master emerging digital technologies, sustain a relationship with organizational learning, and link it to strategy and performance? Second, what is the process by which to determine the value of using technology, and how does it relate to traditional ways of calculating return on investment, and establishing risk models? Third, what are the cyber security implications of technology-based products and services? Fourth, what are the roles and responsibilities of the IT executive, and the department in general? To answer these questions, managers need to focus on the following objectives:

• Address the operational weaknesses in organizations, in terms of how to deal with new technologies, and how to bet- ter realize business benefits.

• Provide a mechanism that both enables organizations to deal with accelerated change caused by technological innovations, and integrates them into a new cycle of processing, and han- dling of change.

• Provide a strategic learning framework, by which every new technology variable adds to organizational knowledge and can develop a risk and security culture.

 

 

xxiIntroduCtIon

• Establish an integrated approach that ties technology account- ability to other measurable outcomes, using organizational learning techniques and theories.

To realize these objectives, organizations must be able to

• create dynamic internal processes that can deal, on a daily basis, with understanding the potential fit of new technologies and their overall value within the structure of the business;

• provide the discourse to bridge the gaps between IT- and non- IT-related investments, and uses, into one integrated system;

• monitor investments and determine modifications to the life cycle;

• implement various organizational learning practices, includ- ing learning organization, knowledge management, change management, and communities of practice, all of which help foster strategic thinking, and learning, and can be linked to performance (Gephardt & Marsick, 2003).

The strengths of this book are that it integrates theory and practice and provides answers to the four common questions mentioned. Many of the answers provided in these pages are founded on theory and research and are supported by practical experience. Thus, evidence of the performance of the theories is presented via case studies, which are designed to assist the readers in determining how such theories and proven practices can be applied to their specific organization.

A common theme in this book involves three important terms: dynamic , unpredictable , and acceleration . Dynamic is a term that rep- resents spontaneous and vibrant things— a motive force. Technology behaves with such a force and requires organizations to deal with its capabilities. Glasmeier (1997) postulates that technology evolution, innovation, and change are dynamic processes. The force then is tech- nology, and it carries many motives, as we shall see throughout this book. Unpredictable suggests that we cannot plan what will happen or will be needed. Many organizational individuals, including execu- tives, have attempted to predict when, how, or why technology will affect their organization. Throughout our recent history, especially during the “ digital disruption” era, we have found that it is difficult, if not impossible, to predict how technology will ultimately benefit or

 

 

xxii IntroduCtIon

hurt organizational growth and competitive advantage. I believe that technology is volatile and erratic at times. Indeed, harnessing tech- nology is not at all an exact science; certainly not in the ways in which it can and should be used in today’ s modern organization. Finally, I use the term acceleration to convey the way technology is speeding up our lives. Not only have emerging technologies created this unpre- dictable environment of change, but they also continue to change it rapidly— even from the demise of the dot-com era decades ago. Thus, what becomes important is the need to respond quickly to technology. The inability to be responsive to change brought about by technologi- cal innovations can result in significant competitive disadvantages for organizations.

This new edition shows why this is a fact especially when examining the shrinking S-Curve. So, we look at these three words— dynamic, unpredictable, and acceleration— as a way to define how technology affects organizations; that is, technology is an accelerating motive force that occurs irregularly. These words name the challenges that organizations need to address if they are to manage technological innovations and integrate them with business strategy and competi- tive advantage. It only makes sense that the challenge of integrating technology into business requires us first to understand its potential impact, determine how it occurs, and see what is likely to follow. There are no quick remedies to dealing with emerging technologies, just common practices and sustained processes that must be adopted for organizations to survive in the future.

I had four goals in mind in writing this book. First, I am inter- ested in writing about the challenges of using digital technologies strategically. What particularly concerns me is the lack of literature that truly addresses this issue. What is also troublesome is the lack of reliable techniques for the evaluation of IT, especially since IT is used in almost every aspect of business life. So, as we increase our use and dependency on technology, we seem to understand less about how to measure and validate its outcomes. I also want to convey my thoughts about the importance of embracing nonmon- etary methods for evaluating technology, particularly as they relate to determining return on investment. Indeed, indirect and non- monetary benefits need to be part of the process of assessing and approving IT projects.

 

 

xxiiiIntroduCtIon

Second, I want to apply organizational learning theory to the field of IT and use proven learning models to help transform IT staff into becoming better members of their organizations. Everyone seems to know about the inability of IT people to integrate with other depart- ments, yet no one has really created a solution to the problem. I find that organizational learning techniques are an effective way of coach- ing IT staff to operate more consistently with the goals of the busi- nesses that they support.

Third, I want to present cogent theories about IT and organiza- tional learning; theories that establish new ways for organizations to adapt new technologies. I want to share my experiences and those of other professionals who have found approaches that can provide posi- tive outcomes from technology investments.

Fourth, I have decided to express my concerns about the valid- ity and reliability of organizational learning theories and practices as they apply to the field of IT. I find that most of these models need to be enhanced to better fit the unique aspects of the digital age. These modified models enable the original learning techniques to address IT-specific issues. In this way, the organization can develop a more holistic approach toward a common goal for using technology.

Certainly, the balance of how technology ties in with strategy is essential. However, there has been much debate over whether tech- nology should drive business strategy or vice versa. We will find that the answer to this is “ yes.” Yes, in the sense that technology can affect the way organizations determine their missions and business strate- gies; but “ no” in that technology should not be the only component for determining mission and strategy. Many managers have realized that business is still business, meaning that technology is not a “ sil- ver bullet.” The challenge, then, is to determine how best to fit tech- nology into the process of creating and supporting business strategy. Few would doubt today that technology is, indeed, the most signifi- cant variable affecting business strategy. However, the most viable approach is to incorporate technology into the process of determin- ing business strategy. I have found that many businesses still formu- late their strategies first, and then look at technology, as a means to efficiently implement objectives and goals. Executives need to better understand the unique and important role that technology provides us; it can drive business strategy, and support it, at the same time.

 

 

xxiv IntroduCtIon

Managers should not solely focus their attention on generating breakthrough innovations that will create spectacular results. Most good uses of technology are much subtler, and longer-lasting. For this reason, this book discusses and defines new technology life cycles that blend business strategy and strategic learning. Building on this theme, I introduce the idea of responsive organizational dynamism as the core theory of this book. Responsive organizational dynamism defines an environment that can respond to the three important terms (dynamic, unpredictable, and acceleration). Indeed, technology requires organizations that can sustain a system, in which individu- als can deal with dynamic, unpredictable, and accelerated change, as part of their regular process of production. The basis of this concept is that organizations must create and sustain such an environment to be competitive in a global technologically-driven economy. I further analyze responsive organizational dynamism in its two subcompo- nents: strategic integration and cultural assimilation, which address how technology needs to be measured as it relates to business strategy, and what related social– structural changes are needed, respectively.

Change is an important principle of this book. I talk about the importance of how to change, how to manage such change, and why emerging technologies are a significant agent of change. I support the need for change, as an opportunity to use many of the learning theories that have been historically difficult to implement. That is, implementing change brought on by technological innovation is an opportunity to make the organization more “ change ready” or, as we define it today, more “ agile.” However, we also know that little is known about how organizations should actually go about modifying existing processes to adapt to new technologies and become digital entities— and to be accustomed to doing this regularly. Managing through such periods of change requires that we develop a model that can deal with dynamic, unpredictable, and accelerated change. This is what responsive organizational dynamism is designed to do.

We know that over 20% of IT projects still fail to be completed. Another 54% fail to meet their projected completion date. We now sit at the forefront of another technological spurt of innovations that will necessitate major renovations to existing legacy systems, requiring that they be linked to sophisticated e-business systems. These e-business systems will continue to utilize the Internet, and emerging mobile

 

 

xxvIntroduCtIon

technologies. While we tend to focus primarily on what technology generically does, organizations need urgently to prepare themselves for the next generation of advances, by forming structures that can deal with continued, accelerated change, as the norm of daily opera- tions. For this edition, I have added new sections and chapters that address the digital transformation, ways of dealing with changing consumer behavior, the need to form evolving cyber security cultures, and the importance of integrating Gen Y employees to accelerate competitive advantage.

This book provides answers to a number of dilemmas but ultimately offers an imbricate cure for the problem of latency in performance and quality afflicting many technologically-based projects. Traditionally, management has attempted to improve IT performance by increasing technical skills and project manager expertise through new processes. While there has been an effort to educate IT managers to become more interested and participative in business issues, their involvement continues to be based more on service than on strategy. Yet, at the heart of the issue is the entirety of the organization. It is my belief that many of the programmatic efforts conducted in traditional ways and attempting to mature and integrate IT with the rest of the organiza- tion will continue to deliver disappointing results.

My personal experience goes well beyond research; it draws from living and breathing the IT experience for the past 35 years, and from an understanding of the dynamics of what occurs inside and outside the IT department in most organizations. With such experi- ence, I can offer a path that engages the participation of the entire management team and operations staff of the organization. While my vision for this kind of digital transformation is different from other approaches, it is consistent with organizational learning theo- ries that promote the integration of individuals, communities, and senior management to participate in more democratic and vision- ary forms of thinking, reflection, and learning. It is my belief that many of the dilemmas presented by IT have existed in other parts of organizations for years, and that the Internet revolution only served to expose them. If we believe this to be true, then we must begin the process of integrating technology into strategic thinking and stop depending on IT to provide magical answers, and inappropriate expectations of performance.

 

 

xxvi IntroduCtIon

Technology is not the responsibility of any one person or depart- ment; rather, it is part of the responsibility of every employee. Thus, the challenge is to allow organizations to understand how to modify their processes, and the roles and responsibilities of their employees, to incorporate digital technologies as part of normal workplace activi- ties. Technology then becomes more a subject and a component of discourse. IT staff members need to emerge as specialists who par- ticipate in decision making, development, and sustained support of business evolution. There are also technology-based topics that do not require the typical expertise that IT personnel provide. This is a literacy issue that requires different ways of thinking and learning during the everyday part of operations. For example, using desktop tools, communicating via e-mail, and saving files and data, are inte- gral to everyday operations. These activities affect projects, yet they are not really part of the responsibilities of IT departments. Given the knowledge that technology is everywhere, we must change the approach that we take to be successful. Another way of looking at this phenomenon is to define technology more as a commodity, readily available to all individuals. This means that the notion of technology as organizationally segregated into separate cubes of expertise is prob- lematic, particularly on a global front.

Thus, the overall aim of this book is to promote organizational learning that disseminates the uses of technology throughout a busi- ness, so that IT departments are a partner in its use, as opposed to being its sole owner. The cure to IT project failure, then, is to engage the business in technology decisions in such a way that individuals and business units are fundamentally involved in the process. Such processes need to be designed to dynamically respond to technology opportunities and thus should not be overly bureaucratic. There is a balance between establishing organizations that can readily deal with technology versus those that become too complex and inefficient.

This balance can only be attained using organizational learning techniques as the method to grow and reach technology maturation.

Overview of the Chapters

Chapter 1 provides an important case study of the Ravell Corporation (a pseudonym), where I was retained for over five years. During this

 

 

xxviiIntroduCtIon

period, I applied numerous organizational learning methods toward the integration of the IT department with the rest of the organiza- tion. The chapter allows readers to understand how the theories of organizational learning can be applied in actual practice, and how those theories are particularly beneficial to the IT community. The chapter also shows the practical side of how learning techniques can be linked to measurable outcomes, and ultimately related to business strategy. This concept will become the basis of integrating learning with strategy (i.e., “ strategic learning” ). The Ravell case study also sets the tone of what I call the IT dilemma, which represents the core problem faced by organizations today. Furthermore, the Ravell case study becomes the cornerstone example throughout the book and is used to relate many of the theories of learning and their practical applicability in organizations. The Ravell case has also been updated in this second edition to include recent results that support the impor- tance of alignment with the human resources department.

Chapter 2 presents the details of the IT dilemma. This chapter addresses issues such as isolation of IT staff, which results in their marginalization from the rest of the organization. I explain that while executives want technology to be an important part of business strat- egy, few understand how to accomplish it. In general, I show that individuals have a lack of knowledge about how technology and busi- ness strategy can, and should, be linked, to form common business objectives. The chapter provides the results of a three-year study of how chief executives link the role of technology with business strat- egy. The study captures information relating to how chief executives perceive the role of IT, how they manage it, and use it strategically, and the way they measure IT performance and activities.

Chapter 3 focuses on defining how organizations need to respond to the challenges posed by technology. I analyze technological dyna- mism in its core components so that readers understand the different facets that comprise its many applications. I begin by presenting tech- nology as a dynamic variable that is capable of affecting organizations in a unique way. I specifically emphasize the unpredictability of tech- nology, and its capacity to accelerate change— ultimately concluding that technology, as an independent variable, has a dynamic effect on organizational development. This chapter also introduces my theory of responsive organizational dynamism, defined as a disposition in

 

 

xxviii IntroduCtIon

organizational behavior that can respond to the demands of tech- nology as a dynamic variable. I establish two core components of responsive organizational dynamism: strategic integration and cultural assimilation . Each of these components is designed to tackle a specific problem introduced by technology. Strategic integration addresses the way in which organizations determine how to use technology as part of business strategy. Cultural assimilation, on the other hand, seeks to answer how the organization, both structurally and culturally, will accommodate the actual human resources of an IT staff and depart- ment within the process of implementing new technologies. Thus, strategic integration will require organizational changes in terms of cultural assimilation. The chapter also provides a perspective of the technology life cycle so that readers can see how responsive organi- zational dynamism is applied, on an IT project basis. Finally, I define the driver and supporter functions of IT and how these contribute to managing technology life cycles.

Chapter 4 introduces theories on organizational learning, and applies them specifically to responsive organizational dynamism. I emphasize that organizational learning must result in individual, and organizational transformation, that leads to measurable performance outcomes. The chapter defines a number of organizational learning theories, such as reflective practices, learning organization, communi- ties of practice, learning preferences and experiential learning, social discourse, and the use of language. These techniques and approaches to promoting organizational learning are then configured into various models that can be used to assess individual and organizational devel- opment. Two important models are designed to be used in responsive organizational dynamism: the applied individual learning wheel and the technology maturity arc. These models lay the foundation for my position that learning maturation involves a steady linear progression from an individual focus toward a system or organizational perspec- tive. The chapter also addresses implementation issues— political challenges that can get in the way of successful application of the learning theories.

Chapter 5 explores the role of management in creating and sustain- ing responsive organizational dynamism. I define the tiers of middle management in relation to various theories of management partici- pation in organizational learning. The complex issues of whether

 

 

xxixIntroduCtIon

organizational learning needs to be managed from the top down, bottom up, or middle-top-down are discussed and applied to a model that operates in responsive organizational dynamism. This chapter takes into account the common three-tier structure in which most organizations operate: executive, middle, and operations. The execu- tive level includes the chief executive officer (CEO), president, and senior vice presidents. The middle is the most complex, ranging from vice president/director to supervisory roles. Operations covers what is commonly known as “ staff,” including clerical functions. The knowl- edge that I convey suggests that all of these tiers need to participate in management, including operations personnel, via a self-development model. The chapter also presents the notion that knowledge manage- ment is necessary to optimize competitive advantage, particularly as it involves transforming tacit knowledge into explicit knowledge. I view the existing theories on knowledge management, create a hybrid model that embraces technology issues, and map them to responsive organizational dynamism. Discussions on change management are included as a method of addressing the unique ways that technol- ogy affects product development. Essentially, I tie together respon- sive organizational dynamism with organizational change theory, by offering modifications to generally accepted theories. There is also a specific model created for IT organizations, that maps onto organi- zational-level concepts. Although I have used technology as the basis for the need for responsive organizational dynamism, I show that the needs for its existence can be attributed to any variable that requires dynamic change. As such, I suggest that readers begin to think about the next “ technology” or variable that can cause the same needs to occur inside organizations. The chapter has been extended to address the impact of social networking and the leadership opportunities it provides to technology executives.

Chapter 6 examines how organizational transformation occurs. The primary focus of the chapter is to integrate transformation theory with responsive organizational dynamism. The position taken is that organizational learning techniques must inevitably result in orga- nizational transformation. Discussions on transformation are often addressed at organizational level, as opposed to focusing on individual development. As in other sections of the book, I extend a number of theories so that they can operate under the auspices of responsive

 

 

xxx IntroduCtIon

organizational dynamism, specifically, the works of Yorks and Marsick (2000) and Aldrich (2001). I expand organizational transformation to include ongoing assessment within technology deliverables. This is accomplished through the use of a modified Balanced Scorecard originally developed by Kaplan and Norton (2001). The Balanced Scorecard becomes the vehicle for establishing a strategy-focused and technology-based organization.

Chapter 7 deals with the many business transformation projects that require outsource arrangements and virtual team management. This chapter provides an understanding of when and how to consider outsourcing and the intricacies of considerations once operating with virtual teams. I cover such issues as management considerations and the challenges of dealing in multiple locations. The chapter extends the models discussed in previous chapters so that they can be aligned with operating in a virtual team environment. Specifically, this includes communities of practice, social discourse, self-development, knowl- edge management, and, of course, responsive organizational dyna- mism and its corresponding maturity arcs. Furthermore, I expand the conversation to include IT and non-IT personnel, and the arguments for the further support needed to integrate all functions across the organization.

Chapter 8 presents updated case studies that demonstrate how my organizational learning techniques are actually applied in practice. Three case studies are presented: Siemens AG, ICAP, and HTC. Siemens AG is a diverse international company with 20 discrete businesses in over 190 countries. The case study offers a perspec- tive of how a corporate chief information officer (CIO) introduced e- business strategy. ICAP is a leading international money and secu- rity broker. This case study follows the activities of the electronic trad- ing community (ETC) entity, and how the CEO transformed the organization and used organizational learning methods to improve competitive advantage. HTC (a pseudonym) provides an example of why the chief IT executive should report to the CEO, and how a CEO can champion specific projects to help transform organizational norms and behaviors. This case study also maps the transformation of the company to actual examples of strategic advantage.

Chapter 9 focuses on the challenges of forming a “ cyber security” culture. The growing challenges of protecting companies from outside

 

 

xxxiIntroduCtIon

attacks have established the need to create a cyber security culture. This chapter addresses the ways in which information technology organizations must further integrate with business operations, so that their firms are better equipped to protect against outside threats. Since the general consensus is that no system can be 100% protected, and that most system compromises occur as a result of internal expo- sures, information technology leaders must educate employees on best practices to limit cyberattacks. Furthermore, while prevention is the objective, organizations must be internally prepared to deal with attacks and thus have processes in place should a system become pen- etrated by third-party agents.

Chapter 10 explores the effects of the digital global economy on the ways in which organizations need to respond to the consumeriza- tion of products and services. From this perspective, digital transfor- mation involves a type of social reengineering that affects the ways in which organizations communicate internally, and how they consider restructuring departments. Digital transformation also affects the risks that organizations must take in what has become an accelerated changing consumer market.

Chapter 11 provides conclusions and focuses on Gen Y employ- ees who are known as “ digital natives” and represent the new supply chain of talent. Gen Y employees possess the attributes to assist com- panies to transform their workforce to meet the accelerated change in the competitive landscape. Most executives across industries recog- nize that digital technologies are the most powerful variable to main- taining and expanding company markets. Gen Y employees provide a natural fit for dealing with emerging digital technologies. However, success with integrating Gen Y employees is contingent upon Baby Boomer and Gen X management adopting new leadership philoso- phies and procedures suited to meet the expectations and needs of these new workers. Ignoring the unique needs of Gen Y employees will likely result in an incongruent organization that suffers high turnover of young employees who will ultimately seek a more entre- preneurial environment.

Chapter 12 seeks to define best practices to implement and sus- tain responsive organizational dynamism. The chapter sets forth a model that creates separate, yet linked, best practices and maturity arcs that can be used to assess stages of the learning development

 

 

xxxii IntroduCtIon

of the chief IT executive, the CEO, and the middle management. I discuss the concept of common threads , by which each best practices arc links through common objectives and outcomes to the responsive organizational dynamism maturity arc presented in Chapter 4. Thus, these arcs represent an integrated and hierarchical view of how each component of the organization contributes to overall best practices. A new section has been added that links ethics to technology leadership and maturity.

Chapter 13 summarizes the many aspects of how IT and organi- zational learning operate together to support the responsive organi- zational dynamism environment. The chapter emphasizes the specific key themes developed in the book, such as evolution versus revolu- tion; control and empowerment; driver and supporter operations; and responsive organizational dynamism and self-generating organiza- tions. Finally, I provide an overarching framework for “ organizing” reflection and integrate it with the best practices arcs.

As a final note, I need to clarify my use of the words information technology, digital technology, and technology. In many parts of the book, they are used interchangeably, although there is a defined difference. Of course, not all technology is related to information or digital; some is based on machinery or the like. For the purposes of this book, the reader should assume that IT and digital technology are the primary variables that I am addressing. However, the theories and processes that I offer can be scaled to all types of technological innovation.

 

 

1

1 The “Ravell” CoRpoRaTion

Introduction

Launching into an explanation of information technology (IT), organizational learning, and the practical relationship into which I propose to bring them is a challenging topic to undertake. I choose, therefore, to begin this discussion by presenting an actual case study that exemplifies many key issues pertaining to organizational learn- ing, and how it can be used to improve the performance of an IT department. Specifically, this chapter summarizes a case study of the IT department at the Ravell Corporation (a pseudonym) in New York City. I was retained as a consultant at the company to improve the performance of the department and to solve a mounting politi- cal problem involving IT and its relation to other departments. The case offers an example of how the growth of a company as a “learn- ing organization”—one in which employees are constantly learning during the normal workday (Argyris, 1993; Watkins & Marsick, 1993)— utilized reflective practices to help it achieve the practical stra- tegic goals it sought. Individuals in learning organizations integrate processes of learning into their work. Therefore, a learning organiza- tion must advocate a system that allows its employees to interact, ask questions, and provide insight to the business. The learning organiza- tion will ultimately promote systematic thinking, and the building of organizational memory (Watkins & Marsick, 1993). A learning organization (discussed more fully in Chapter 4) is a component of the larger topic of organizational learning.

The Ravell Corporation is a firm with over 500 employees who, over the years, had become dependent on the use of technology to run its business. Its IT department, like that of many other compa- nies, was isolated from the rest of the business and was regarded as a peripheral entity whose purpose was simply to provide technical support. This was accompanied by actual physical isolation—IT was

 

 

2 INFORMATION TECHNOLOGY

placed in a contained and secure location away from mainstream operations. As a result, IT staff rarely engaged in active discourse with other staff members unless specific meetings were called relat- ing to a particular project. The Ravell IT department, therefore, was not part of the community of organizational learning—it did not have the opportunity to learn along with the rest of the organiza- tion, and it was never asked to provide guidance in matters of gen- eral relevance to the business as a whole. This marginalized status resulted in an us-versus-them attitude on the part of IT and non-IT personnel alike.

Much has been written about the negative impact of marginal- ization on individuals who are part of communities. Schlossberg (1989) researched adults in various settings and how marginal- ization affected their work and self-efficacy. Her theory on mar- ginalization and mattering is applied to this case study because of its relevance and similarity to her prior research. For example, IT represents similar characteristics to a separate group on a college campus or in a workplace environment. Its physical isolation can also be related to how marginalized groups move away from the majority population and function without contact. The IT direc- tor, in particular, had cultivated an adversarial relationship with his peers. The director had shaped a department that fueled his view of separation. This had the effect of further marginalizing the posi- tion of IT within the organization. Hand in hand with this form of separatism came a sense of actual dislike on the part of IT personnel for other employees. IT staff members were quick to point fingers at others and were often noncommunicative with members of other departments within the organization. As a result of this kind of behavior, many departments lost confidence in the ability of IT to provide support; indeed, the quality of support that IT furnished had begun to deteriorate. Many departments at Ravell began to hire their own IT support personnel and were determined to create their own information systems subdepartments. This situation eventually became unacceptable to management, and the IT director was ter- minated. An initiative was begun to refocus the department and its position within the organization. I was retained to bring about this change and to act as the IT director until a structural transforma- tion of the department was complete.

 

 

3the “rAvell” CorporAtIon

A New Approach

My mandate at Ravell was initially unclear—I was to “fix” the problem; the specific solution was left up to me to design and imple- ment. My goal became one of finding a way to integrate IT fully into the organizational culture at Ravell. Without such integration, IT would remain isolated, and no amount of “fixing” around this issue would address the persistence of what was, as well, a cultural prob- lem. Unless IT became a true part of the organization as a whole, the entire IT staff could be replaced without any real change having occurred from the organization’s perspective. That is, just replacing the entire IT staff was an acceptable solution to senior management. The fact that this was acceptable suggested to me that the knowledge and value contained in the IT department did not exist or was mis- understood by the senior management of the firm. In my opinion, just eliminating a marginalized group was not a solution because I expected that such knowledge and value did exist, and that it needed to be investigated properly. Thus, I rejected management’s option and began to formulate a plan to better understand the contributions that could be made by the IT department. The challenge was threefold: to improve the work quality of the IT department (a matter of perfor- mance), to help the department begin to feel itself a part of the orga- nization as a whole and vice versa (a matter of cultural assimilation), and to persuade the rest of the organization to accept the IT staff as equals who could contribute to the overall direction and growth of the organization (a fundamental matter of strategic integration).

My first step was to gather information. On my assignment to the position of IT director, I quickly arranged a meeting with the IT department to determine the status and attitudes of its personnel. The IT staff meeting included the chief financial officer (CFO), to whom IT reported. At this meeting, I explained the reasons behind the changes occurring in IT management. Few questions were asked; as a result, I immediately began scheduling individual meetings with each of the IT employees. These employees varied in terms of their position within the corporate hierarchy, in terms of salary, and in terms of technical expertise. The purpose of the private meetings was to allow IT staff members to speak openly, and to enable me to hear their concerns. I drew on the principles of action science, pioneered

 

 

4 INFORMATION TECHNOLOGY

by Argyris and Schö n (1996), designed to promote individual self- reflection regarding behavior patterns, and to encourage a produc- tive exchange among individuals. Action science encompasses a range of methods to help individuals learn how to be reflective about their actions. By reflecting, individuals can better understand the outcomes of their actions and, especially, how they are seen by others. This was an important approach because I felt learning had to start at the indi- vidual level as opposed to attempting group learning activities. It was my hope that the discussions I orchestrated would lead the IT staff to a better understanding than they had previously shown, not only of the learning process itself, but also of the significance of that process. I pursued these objectives by guiding them to detect problem areas in their work and to undertake a joint effort to correct them (Argyris, 1993; Arnett, 1992).

Important components of reflective learning are single-loop and double-loop learning. Single-loop learning requires individuals to reflect on a prior action or habit that needs to be changed in the future but does not require individuals to change their operational proce- dures with regard to values and norms. Double-loop learning, on the other hand, does require both change in behavior and change in oper- ational procedures. For example, people who engage in double-loop learning may need to adjust how they perform their job, as opposed to just the way they communicate with others, or, as Argyris and Schö n (1996, p. 22) state, “the correction of error requires inquiry through which organizational values and norms themselves are modified.”

Despite my efforts and intentions, not all of the exchanges were destined to be successful. Many of the IT staff members felt that the IT director had been forced out, and that there was consequently no support for the IT function in the organization. There was also clear evidence of internal political division within the IT department; members openly criticized each other. Still other interviews resulted in little communication. This initial response from IT staff was disap- pointing, and I must admit I began to doubt whether these learning methods would be an antidote for the department. Replacing people began to seem more attractive, and I now understood why many man- agers prefer to replace staff, as opposed to investing in their transfor- mation. However, I also knew that learning is a gradual process and that it would take time and trust to see results.

 

 

5the “rAvell” CorporAtIon

I realized that the task ahead called for nothing short of a total cul- tural transformation of the IT organization at Ravell. Members of the IT staff had to become flexible and open if they were to become more trusting of one another and more reflective as a group (Garvin, 2000; Schein, 1992). Furthermore, they had to have an awareness of their history, and they had to be willing to institute a vision of partnering with the user community. An important part of the process for me was to accept the fact that the IT staff were not habitually inclined to be reflective. My goal then was to create an environment that would foster reflective learning, which would in turn enable a change in individual and organizational values and norms (Senge, 1990).

The Blueprint for Integration

Based on information drawn from the interviews, I developed a pre- liminary plan to begin to integrate IT into the day-to-day operations at Ravell, and to bring IT personnel into regular contact with other staff members. According to Senge (1990), the most productive learn- ing occurs when skills are combined in the activities of advocacy and inquiry. My hope was to encourage both among the staff at Ravell. The plan for integration and assimilation involved assigning IT resources to each department; that is, following the logic of the self-dissemina- tion of technology, each department would have its own dedicated IT person to support it. However, just assigning a person was not enough, so I added the commitment to actually relocate an IT person into each physical area. This way, rather than clustering together in an area of their own, IT people would be embedded throughout the organiza- tion, getting first-hand exposure to what other departments did, and learning how to make an immediate contribution to the productiv- ity of these departments. The on-site IT person in each department would have the opportunity to observe problems when they arose— and hence, to seek ways to prevent them—and, significantly, to share in the sense of accomplishment when things went well. To reinforce their commitment to their respective areas, I specified that IT person- nel were to report not only to me but also to the line manager in their respective departments. In addition, these line managers were to have input on the evaluation of IT staff. I saw that making IT staff offi- cially accountable to the departments they worked with was a tangible

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MIS 2016 – Case Study 01 – Management: Meet The New Mobile Workers

Case Study Questions

 

1.What kinds of applications are described here? What business functions do they support? How do they improve operational efficiency and decision making?

2.Identify the problems that businesses in this case study solved by using mobile digital devices.

3.What kinds of businesses are most likely to benefit from equipping their employees with mobile digital devices such as iPhones and iPads?

4.One company deploying iPhones has said, “The iPhone is not a game changer, it’s an industry changer. It changes the way that you can interact with your customers and with your suppliers.” Discuss the implications of this statement.

Section 1.2, “What is an information system? How does it work? What are its management, organization, and technology components and why are complementary assets essential for ensuring that information systems provide genuine value for organizations?”

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python API – Weather Py

In this example, you’ll be creating a Python script to visualize the weather of 500+ cities across the world of varying distance from the equator. To accomplish this, you’ll be utilizing a simple Python library, the OpenWeatherMap API, and a little common sense to create a representative model of weather across world cities.

Your first requirement is to create a series of scatter plots to showcase the following relationships:

  • Temperature (F) vs. Latitude
  • Humidity (%) vs. Latitude
  • Cloudiness (%) vs. Latitude
  • Wind Speed (mph) vs. Latitude

After each plot add a sentence or too explaining what the code is and analyzing.

Your second requirement is to run linear regression on each relationship, only this time separating them into Northern Hemisphere (greater than or equal to 0 degrees latitude) and Southern Hemisphere (less than 0 degrees latitude):

  • Northern Hemisphere – Temperature (F) vs. Latitude
  • Southern Hemisphere – Temperature (F) vs. Latitude
  • Northern Hemisphere – Humidity (%) vs. Latitude
  • Southern Hemisphere – Humidity (%) vs. Latitude
  • Northern Hemisphere – Cloudiness (%) vs. Latitude
  • Southern Hemisphere – Cloudiness (%) vs. Latitude
  • Northern Hemisphere – Wind Speed (mph) vs. Latitude
  • Southern Hemisphere – Wind Speed (mph) vs. Latitude

After each pair of plots explain what the linear regression is modeling such as any relationships you notice and any other analysis you may have.

Optional You will be creating multiple linear regression plots. To optimize your code, write a function that creates the linear regression plots.

Your final notebook must:

  • Randomly select at least 500 unique (non-repeat) cities based on latitude and longitude.
  • Perform a weather check on each of the cities using a series of successive API calls.
  • Include a print log of each city as it’s being processed with the city number and city name.
  • Save a CSV of all retrieved data and a PNG image for each scatter plot.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Java HW 3.2

[IFT 102]

Introduction to Java Technologies

Lab 3: Objects & Classes

Score: 50 pts

I. Prelab Exercises

1. Constructors are special methods included in class definitions.

a. What is a constructor used for?

b. How do constructors differ from other methods in a class?

2. Both methods and variables in a class are declared as either private or public. Describe the difference between private and public and indicate how a programmer decides which parts of a class should be private and which public.

3. Consider a class that represents a bank account.

a. Such a class might store information about the account balance, the name of the account holder, and an account number. What instance variables would you declare to hold this information? Give a type and name for each.

b. There are a number of operations that would make sense for a bank account—withdraw money, deposit money, check the balance, and so on. Write a method header with return type, name, and parameter list, for each such operation described below. Don’t write the whole method—just the header. They will all be public methods. The first one is done for you as an example.

i. Withdraw a given amount from the account. This changes the account balance, but does not return a value.

public void withdraw(double amount)

ii. Deposit a given amount into the account. This changes the account balance, but does not return a value.

iii. Get the balance from the account. This does not change anything in the account; it simply returns the balance.

iv. Return a string containing the account information (name, account number, balance). This does not change anything in the account.

v. Charge a $ 10 fee. This changes the account balance but does not return a value.

vi. Create a new account given an initial balance, the name of the owner, and the account number. Note that this will be a constructor, and that a constructor does not have a return type.

II. A Bank Account Class

1. File Account.java contains a partial definition for a class representing a bank account. Save it to your directory and study it to see what methods it contains. Then complete the Account class as described below. Note that you won’t be able to test your methods until you write ManageAccounts in question #2.

a. Fill in the code for method toString, which should return a string containing the name, account number, and balance for the account.

b. Fill in the code for method chargeFee, which should deduct a service fee from the account.

c. Modify chargeFee so that instead of returning void, it returns the new balance. Note that you will have to make changes in two places.

d. Fill in the code for method changeName which takes a string as a parameter and changes the name on the account to be that string.

2. File ManageAccounts.java contains a shell program that uses the Account class above. Save it to your directory, and complete it as indicated by the comments.

3. Modify ManageAccounts so that it prints the balance after the calls to chargeFees. Instead of using the getBalance method like you did after the deposit and withdrawal, use the balance that is returned from the chargeFees method. You can either store it in a variable and then print the value of the variable, or embed the method call in a println statement.

// *******************************************************

// Account.java

//

// A bank account class with methods to deposit to, withdraw from,

// change the name on, charge a fee to, and print a summary of the account.

// *******************************************************

public class Account

{

private double balance;

private String name;

private long acctNum;

// ———————————————

//Constructor — initializes balance, owner, and account number

// ——————————————–

public Account(double initBal, String owner, long number)

{

balance = initBal;

name = owner;

acctNum = number;

}

// ——————————————–

// Checks to see if balance is sufficient for withdrawal.

// If so, decrements balance by amount; if not, prints message.

// ——————————————–

public void withdraw(double amount)

{

if (balance >= amount)

balance -= amount;

else

System.out.println(“Insufficient funds”);

}

// ——————————————–

// Adds deposit amount to balance.

// ——————————————–

public void deposit(double amount)

{

balance += amount;

}

// ——————————————–

// Returns balance.

// ——————————————–

public double getBalance()

{

return balance;

}

// ——————————————–

// Returns a string containing the name, account number, and balance.

// ——————————————–

public String toString()

{

}

// ——————————————–

// Deducts $10 service fee //

// ——————————————–

public void chargeFee()

{

}

// ——————————————–

// Changes the name on the account

// ——————————————–

public void changeName(String newName)

{

}

}

// ************************************************************

// ManageAccounts.java

//

// Use Account class to create and manage Sally and Joe’s

// bank accounts

// ************************************************************

public class ManageAccounts

{

public static void main(String[] args)

{

Account acct1, acct2;

//create account1 for Sally with $1000

acct1 = new Account(1000, “Sally”, 1111);

//create account2 for Joe with $500

//deposit $100 to Joe’s account

//print Joe’s new balance (use getBalance())

//withdraw $50 from Sally’s account

//print Sally’s new balance (use getBalance())

//charge fees to both accounts

//change the name on Joe’s account to Joseph

//print summary for both accounts

}

}

III. Tracking Grades

A teacher wants a program to keep track of grades for students and decides to create a student class for his program as follows:

· Each student will be described by three pieces of data: his/her name, his/her score on test #1, and his/her score on test#2.

· There will be one constructor, which will have one argument—the name of the student.

· There will be three methods: getName, which will return the student’s name; inputGrades, which will prompt for and read in the student’s test grades; and getAverage, which will compute and return the student’s average.

1. File Student.java contains an incomplete definition for the Student class. Save it to your directory and complete the class definition as follows:

a. Declare the instance data (name, score for test1, and score for test2).

b. Create a Scanner object for reading in the scores.

c. Add the missing method headers.

d. Add the missing method bodies.

2. File Grades.java contains a shell program that declares two Student objects. Save it to your directory and use the inputGrades method to read in each student’s test scores, then use the getAverage method to find their average. Print the average with the student’s name, e.g., “The average for Joe is 87.” You can use the getName method to print the student’s name.

3. Add statements to your Grades program that print the values of your Student variables directly, e.g.:

System.out.println(“Student 1: ” + student1);

This should compile, but notice what it does when you run it—nothing very useful! When an object is printed, Java looks for a toString method for that object. This method must have no parameters and must return a String. If such a method has been defined for this object, it is called and the string it returns is printed. Otherwise the default toString method, which is inherited from the Object class, is called; it simply returns a unique hexadecimal identifier for the object such as the ones you saw above.

Add a toString method to your Student class that returns a string containing the student’s name and test scores, e.g.:

Name: Joe Test1: 85 Test2: 91

Note that the toString method does not call System.out.println—it just returns a string.

Recompile your Student class and the Grades program (you shouldn’t have to change the Grades program—you don’t have to call toString explicitly). Now see what happens when you print a student object—much nicer!

// ************************************************************

// Student.java

//

// Define a student class that stores name, score on test 1, and

// score on test 2. Methods prompt for and read in grades,

// compute the average, and return a string containing student’s info.

// ************************************************************

import java.util.Scanner;

public class Student

{

//declare instance data

// ———————————————

//constructor

// ———————————————

public Student(String studentName)

{

//add body of constructor

}

// ———————————————

//inputGrades: prompt for and read in student’s grades for test1 & test2.

//Use name in prompts, e.g., “Enter’s Joe’s score for test1”.

// ———————————————

public void inputGrades()

{

//add body of inputGrades

}

// ———————————————

//getAverage: compute and return the student’s test average

// ———————————————

//add header for getAverage

{

//add body of getAverage

}

// ———————————————

//getName: print the student’s name

// ———————————————

//add header for printName

{

//add body of printName

}

}

// ************************************************************

// Grades.java

//

// Use Student class to get test grades for two students

// and compute averages

//

// ************************************************************

public class Grades

{

public static void main(String[] args)

{

Student student1 = new Student(“Mary”);

//create student2, “Mike”

//input grades for Mary

//print average for Mary

System.out.println();

//input grades for Mike

//print average for Mike

}

}

IV. Band Booster Class

In this exercise, you will write a class that models a band booster and use your class to update sales of band candy.

1. Write the BandBooster class assuming a band booster object is described by two pieces of instance data: name (a String) and boxesSold (an integer that represents the number of boxes of band candy the booster has sold in the band fundraiser).

The class should have the following methods:

· A constructor that has one parameter—a String containing the name of the band booster. The constructor should set boxesSold to 0.

· A method getName that returns the name of the band booster (it has no parameters).

· A method updateSales that takes a single integer parameter representing the number of additional boxes of candy sold. The method should add this number to boxesSold.

· A toString method that returns a string containing the name of the band booster and the number of boxes of candy sold in a format similar to the following:

Joe: 16 boxes

2. Write a program that uses BandBooster objects to track the sales of 2 band boosters over 3 weeks. Your program should do the following:

· Read in the names of the two band boosters and construct an object for each.

· Prompt for and read in the number of boxes sold by each booster for each of the three weeks. Your prompts should include the booster’s name as stored in the BandBooster object. For example,

Enter the number of boxes sold by Joe this week:

For each member, after reading in the weekly sales, invoke the updateSales method to update the total sales by that member.

· After reading the data, print the name and total sales for each member (you will implicitly use the toString method here).

V. Representing Names

1. Write a class Name that stores a person’s first, middle, and last names and provides the following methods:

· public Name(String first, String middle, String last)—constructor. The name should be stored in the case given; don’t convert to all upper or lower case.

· public String getFirst()—returns the first name

· public String getMiddle()—returns the middle name

· public String getLast()—returns the last name

· public String firstMiddleLast()—returns a string containing the person’s full name in order, e.g., “Mary Jane Smith”.

· public String lastFirstMiddle()—returns a string containing the person’s full name with the last name first followed by a comma, e.g., “Smith, Mary Jane”.

· public boolean equals(Name otherName)—returns true if this name is the same as otherName. Comparisons should not be case sensitive. (Hint: There is a String method equalsIgnoreCase that is just like the String method equals except it does not consider case in doing its comparison.)

· public String initials()—returns the person’s initials (a 3-character string). The initials should be all in upper case, regardless of what case the name was entered in. (Hint: Instead of using charAt, use the substring method of String to get a string containing only the first letter—then you can upcase this one-letter string. See Figure 3.1 in the text for a description of the substring method.)

· public int length()—returns the total number of characters in the full name, not including spaces.

2. Now write a program TestNames.java that prompts for and reads in two names from the user (you’ll need first, middle, and last for each), creates a Name object for each, and uses the methods of the Name class to do the following:

a. For each name, print

· first-middle-last version

· last-first-middle version

· initials

· length

b. Tell whether or not the names are the same.

Deliverables

1. Complete all the activities in sections II thru V in this lab; then zip all your Java SOURCE CODE FILES for submission.

2. Write a lab report in Word or PDF document. The report should be named lab3.docx or lab3.pdf and must contain the following:

a. The first page should be a cover page that includes the Class Number, Lab Activity Number, Date, and Instructor’s name.

b. Answer of all the questions in section I: Prelab Exercises. No code file is required here. All the code involved, if any, must be copied and pasted in this report.

c. Provide a 1-paragraph conclusion about your experience; how long you spent completing the lab, the challenges you faced, and what you learned.

3. Upload your lab report and the zip file of your source code to Blackboard. DO NOT SUBMIT separate source files. If you do, they will be ignored.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Database Management Systems 1

Chapter 5

 

5.1 Describe the circumstances in which you would choose to use embedded SQL rather than SQL alone or only a general-purpose programming language.

Answer:

5.2 Write a Java function using JDBC metadata features that takes aResultSet as an input parameter, and prints out the result in tabular form, with appropriate names as column headings.

Answer:

 

5.3 Write a Java function using JDBC metadata features that prints a list of all relations in the database, displaying for each relation the names and types of its attributes. (Database Management Systems 1)

Answer:

5.4 Show how to enforce the constraint “an instructor cannot teach in two different classrooms in a semester in the same time slot.” using a trigger (remember that the constraint can be violated by changes to the teachesrelation as well as to the section relation).

Answer:

5.5 Write triggers to enforce the referential integrity constraint from sectiontotimeslot, on updates to section, and time
in Figure 5.8 do not cover the update operation.slot. Note that the ones we wrote 5.6 To maintain the tot cred attribute of the studentrelation, carry out the fol-lowing:
a. Modify the trigger on updates of takes, to handle all updates that canaffect the value of tot
b. Write a trigger to handle inserts to the takes relation.cred.
c. Under what assumptions is it reasonable not to create triggers on thecourse relation?

Answer:

5.7 Consider the bank database of Figure 5.25. Let us define a view branch custas follows:

     create view branch cust as
select 
branch name, customer name
     from depositor, account
     where depositor.account number account.account number

Answer:

5.8 Consider the bank database of Figure 5.25. Write an SQL trigger to carry out the following action: On delete of an account, for each owner of the account, check if the owner has any remaining accounts, and if she does not, delete her from the depositor relation. (Database Management Systems 1)

Answer:

 

5.9 Show how to express group by cube(abcd) using rollup; your answer should have only one group by clause.

Answer:

 

5.10 Given a relation S(studentsubjectmarks), write a query to find the top students by total marks, by using ranking.

Answer:

 

5.11 Consider the sales relation from Section 5.6.Write an SQL query to compute the cube operation on the relation, giving the relation in Figure 5.21. Do not use the cube construct.

Answer:

 

5.12 Consider the following relations for a company database:

• emp (enamednamesalary)

• mgr (enamemname) and the Java code in Figure 5.26, which uses the JDBC API. Assume that the userid, password, machine name, etc. are all okay. Describe in concise

English what the Java program does. (That is, produce an English sentence like “It finds the manager of the toy department,” not a line-by-line description of what each Java statement does.)

Answer:

 

5.13 Suppose you were asked to define a class MetaDisplay in Java, containing a method static void printTable(String r); the method takes a relation name as input, executes the query “select from r”, and prints the result out in nice tabular format, with the attribute names displayed in the header of the table.

 

import java.sql.*;

public class Mystery {

public static void main(String[] args) {

try {

Connection con=null;

Class.forName(“oracle.jdbc.driver.OracleDriver”);

con=DriverManager.getConnection(

“jdbc:oracle:thin:star/X@//edgar.cse.lehigh.edu:1521/XE”);

Statement s=con.createStatement();

String q;

String empName = “dog”;

boolean more;

ResultSet result;

do {

q = “select mname from mgr where ename = ’” + empName + “’”;

result = s.executeQuery(q);

more = result.next();

if (more) {

empName = result.getString(“mname”);

System.out.println (empName);

}

while (more);

s.close();

con.close();

catch(Exception e){e.printStackTrace();} }}

 

a. What do you need to know about relation to be able to print the result in the specified tabular format.

b. What JDBC methods(s) can get you the required information?

c. Write the method printTable(String r) using the JDBC API.

Answer:

 

5.14 Repeat Exercise 5.13 using ODBC, defining void printTable(char *r) as a function instead of a method. (Database Management Systems 1)

Answer:

 

5.15 Consider an employee database with two relations

     employee (employee namestreetcity)

     works (employee namecompany namesalary)

where the primary keys are underlined. Write a query to find companies

whose employees earn a higher salary, on average, than the average salary at “First Bank Corporation”.

a. Using SQL functions as appropriate.

b. Without using SQL functions.

Answer:

 

5.16 Rewrite the query in Section 5.2.1 that returns the name and budget of all

departments with more than 12 instructors, using the with clause instead of using a function call.

Answer:

 

5.17 Compare the use of embedded SQL with the use in SQL of functions defined in a general-purpose programming language. Under what circumstances would you use each of these features?

Answer:

 

5.18 Modify the recursive query in Figure 5.15 to define a relation

     prereq depth(course idprereq iddepth)

where the attribute depth indicates how many levels of intermediate prerequisites are there between the course and the prerequisite. Direct prerequisites have a depth of 0.

Answer:

 

5.19 Consider the relational schema

     part(part idnamecost)

     subpart(part idsubpart idcount)

A tuple (p1p23) in the subpart relation denotes that the part with part-id p2 is a direct subpart of the part with part-id p1, and p1 has 3 copies of p2.

Note that p2 may itself have further subparts. Write a recursive SQL query that outputs the names of all subparts of the part with part-id “P-100”. (Database Management Systems 1)

Answer:

 

5.20 Consider again the relational schema from Exercise 5.19. Write a JDBC function using non-recursive SQL to find the total cost of part “P-100”,including the costs of all its subparts. Be sure to take into account thefact that a part may have multiple occurrences of a subpart. You may userecursion in Java if you wish.

Answer:

 

5.21 Suppose there are two relations and s, such that the foreign key of references the primary key Aof s. Describe how the trigger mechanism canbe used to implement the on delete cascade option,when a tuple is deleted from s.

Answer:

 

5.22 The execution of a trigger can cause another action to be triggered. Most database systems place a limit on how deep the nesting can be. Explain why they might place such a limit.

Answer:

 

5.23 Consider the relation, , shown in Figure 5.27. Give the result of the following query:

 

uilding room

number

time

slot

id

course

id

sec

id

Garfield Garfield Saucon Saucon Painter Painter 359

359

651

550

705

403

A B A C D D BIO-101 BIO-101 CS-101 CS-319 MU-199 FIN-201 1 2 2 1 1 1

 

     select buildingroom numbertime slot idcount(*)

     from r

     group by rollup (buildingroom numbertime slot id)

Answer:

 

5.24 For each of the SQL aggregate functions sum, count, min, and max, show how to compute the aggregate value on a multiset S1 ∪S2, given the aggregate values on multisets S1 and S2.

On the basis of the above, give expressions to compute aggregate values with grouping on a subset of the attributes of a relation (AB,CDE), given aggregate values for grouping on attributes S, for the following aggregate functions:

a. sum, count, min, and max

b. avg

c. Standard deviation

Answer:

 

5.25 In Section 5.5.1, we used the student grades view of Exercise 4.5 to write a query to find the rank of each student based on grade-point average.

Modify that query to show only the top 10 students (that is, those students whose rank is 1 through 10).

Answer:

 

5.26 Give an example of a pair of groupings that cannot be expressed by using a single group by clause with cube and rollup.

5.27 Given relation s(abc), show how to use the extended SQL features to generate a histogram of versus a, dividing into 20 equal-sized partitions

(that is, where each partition contains 5 percent of the tuples in s, sorted by

a).

Answer:

 

5.28 Consider the bank database of Figure 5.25 and the balance attribute of the account relation. Write an SQL query to compute a histogram of balance values, dividing the range 0 to the maximum account balance present, into three equal ranges. (Database Management Systems 1)

 

Answer:

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Programming Assignment Help: Example

Given an integer representing a 7-digit phone number, excluding the area code, output the prefix and line number, separated by a hyphen.

Ex: If the input is 5551212, the output is:

555-1212

Hint: Use % to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which is 72.

Hint: Use / to shift right by the desired amount. Ex: Shifting 572 right by 2 digits is done by 572 / 100, which yields 5. (Recall integer division discards the fraction).

For simplicity, assume any part starts with a non-zero digit. So 011-9999 is not allowed.

2. Summary: Given integer values for red, green, and blue, subtract the gray from each value.

Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color’s value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray).

Given values for red, green, and blue, remove the gray part.

Ex: If the input is 130 50 130, the output is:

80 0 80

Find the smallest value, and then subtract it from all three values, thus removing the gray.

3. On a piano, each key has a frequency, and each subsequent key (black or white) is a known amount higher. Ex: The A key above the middle C key has a frequency of 440 Hz. Each subsequent key (black or white) has a frequency of 440 * r^n, where n is the number of keys from that A key, and r is 2^(1/12). Given an initial frequency, output that frequency and the next 4 higher key frequencies.

Ex: If the input is 440, the output is:

440.0 466.1637615180899 493.8833012561241 523.2511306011974 554.3652619537442

Note: Include one statement to compute r = 2^(1/12) using the RaiseToPower() function, then use r in the formula fn = f0 * r^n. (You’ll have four statements using that formula, different only in the value for n).

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Assignment Help on The Physical-Network Layer Of The Cyber Domain

Assignment Help on The Physical-Network Layer Of The Cyber Domain

Describe How You Are Connected To The Physical-Network Layer Of The Cyber Domain.

Write a 1- to 2-page paper or create a 6- to 8-slide presentation with visuals and speaker notes about how you are connected to the physical-network layer of the cyber domain. Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices. Explain how those devices are connected to a larger network, such as a cellular provider or ISP. Discuss at least 3 threats to you and your connected networks. Format any references according to APA guidelines.

Typical devices I have connected to my house are as follows:

Modem from ISP (Wave)

Orbi Router – plus 2 satellites

5 laptops

2 smart TV’s

14 FEIT Smart dimmable light switches

4 FEIT/Wemo smart plugs

5 Alexa’s

Garage Opener unit

1 networked printer

Dual Microwave/Oven smart appliance

2 Roomba Vacuum Cleaners

Honeywell Thermostat (Assignment Help on The Physical-Network Layer Of The Cyber Domain)

The physical-network layer

The physical-network layer is a crucial component of the cyber domain, serving as the foundation for all digital interactions. This layer encompasses the tangible infrastructure that facilitates data transfer and communication between devices. At its core, it includes physical cables, routers, switches, servers, and other hardware elements that form the backbone of the internet and interconnected networks.

In the physical-network layer, data travels in the form of electrical signals or light pulses through cables and optical fibers. This layer is responsible for the reliable and efficient transmission of information across vast distances, linking disparate devices and enabling seamless communication. The architecture of this layer is designed to ensure the stability, scalability, and security of the entire cyber ecosystem.

Cybersecurity measures at the physical-network layer are paramount to protect against physical threats, such as unauthorized access to data centers or the tampering of network infrastructure. Additionally, advancements in technology, like 5G networks and high-speed fiber optics, continue to shape and enhance the capabilities of the physical-network layer, fostering a more interconnected and digitally agile world. As the digital landscape evolves, the physical-network layer remains a critical enabler of the modern cyber domain.

Assignment Help on The Physical-Network Layer Of The Cyber Domain

References

https://www.sciencedirect.com/topics/engineering/connected-network

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MS CS – Machine Learning Assignment Help

MS CS – Machine Learning Assignment Help

CS Machine Learning

Homework 1 – Theory

Keywords: Boolean functions, mistake bounds, PAC learning

Instructions: Please either typeset your answers (LATEX recommended) or write them very clearly and legibly and scan them, and upload the PDF on edX. Legibility and clarity are critical for fair grading.

1. Let D be an arbitrary distribution on the domain {−1, 1}n, and let f, g : {−1, 1}n → {−1, 1} be two Boolean functions. Prove that

Px∼D[f(x) 6= g(x)] = 1− Ex∼D[f(x)g(x)]

2 .

Would this still be true if the domain were some other domain (such as Rn, where R denotes the real numbers, with say the Gaussian distribution) instead of {−1, 1}n? If yes, justify your answer. If not, give a counterexample.

2. Let f be a decision tree with t leaves over the variables x = (x1, . . . , xn) ∈ {−1, 1}n. Explain how to write f as a multivariate polynomial p(x1, . . . , xn) such that for every input x ∈ {−1, 1}n, f(x) = p(x). (You may interpret −1 as FALSE and 1 as TRUE or the other way round, at your preference.) (Hint: try to come up with an “indicator polynomial” for every leaf, i.e. one that evaluates to the leaf ’s value if x is such that that path is taken, and 0 otherwise.)

3. Compute a depth-two decision tree for the training data in table 1 using the Gini function, C(a) = 2a(1− a) as described in class. What is the overall accuracy on the training data of the tree?

X Y Z Number of positive examples Number of negative examples

0 0 0 10 20 0 0 1 25 5 0 1 0 35 15 0 1 1 35 5 1 0 0 5 15 1 0 1 30 10 1 1 0 10 10 1 1 1 15 5

Table 1: decision tree training data

4. Suppose the domain X is the real line, R, and the labels lie in Y = {−1, 1}, Let C be the concept class consisting of simple threshold functions of the form hθ for some θ ∈ R, where hθ(x) = −1 for all x ≤ θ and hθ(x) = 1 otherwise. Give a simple and efficient PAC learning algorithm for C that uses only m = O(1� log

1 δ ) training examples to output a classifier with

error at most � with probability at least 1− δ.

1

 

gchourasia
Cross-Out

 

5. In this problem we will show that mistake bounded learning is stronger than PAC learning, which should help crystallize both definitions. Let C be a function class with domain X = {−1, 1}n and labels Y = {−1, 1}. Assume that C can be learned with mistake bound t using algorithm A. (You may also assume at each iteration A runs in time polynomial in n, as well as that A only updates its state when it gets an example wrong.) The concrete goal of this problem is to show how a learner, given A, can PAC-learn concept class C with respect to any distribution D on {−1, 1}n. The learner can use A as part of its output hypothesis and should run in time polynomial in n, 1/�, and 1/δ.

To achieve this concrete goal in steps, we will break down this problem into a few parts. Fix some distribution D on X, and say the examples are labeled by an unknown c ∈ C. For a hypothesis (i.e. function) h : X → Y , let err(h) = Px∼D[h(x) 6= c(x)].

(a) Fix a hypothesis h : X → Y . If err(h) > �, what is the probability that h gets k random examples all correct? How large does k need to be for this probability to be at most δ′? (The contrapositive view would be: unless the data is highly misleading, which happens with probability at most δ′, it must be the case that err(h) ≤ �. Make sure this makes sense.)

(b) As we feed examples to A, how many examples do we need to see before we can be sure of getting a block of k examples all correct? (This doesn’t mean the hypothesis needs to be perfect; it just needs to get a block of k all correct. Think about dividing the stream of examples into blocks of size k, and exploit the mistake bound. How many different hypotheses could A go through?)

(c) Put everything together and fully describe (with proof) a PAC learner that is able, with probability of failure at most δ, to output a hypothesis with error at most �. How many examples does the learner need to use (as a function of �, δ, and t)? (MS CS – Machine Learning Assignment Help)

References

https://www.ibm.com/topics/machine-learning

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Introduction

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Antisocial Personality Disorder (ASPD), like all personality disorders represents a stable, pervasive pattern of behavior that is present for an individual’s entire life. In ASPD generally, the configuration is primarily one of a disregard for, and a violation of, the rights of others. This manifests itself in the individual fundamentally not caring about the wants, needs, and desires of others. The result of this core belief that others do not matter is behavior that mostly leads to arrest for petty offenses like theft. Though these crimes are not personality traits, the record that they create is reliable and traceable, making a good diagnostic tool. Another similar diagnostic tool is the individual’s work and school record. ASPD traits make listening to authority figures nearly impossible so most of these individuals have spotty educational and work histories.

These behavioral markers are the result of several personality traits. One of these chief characteristics is impulsiveness. Individuals with ASPD do not stop to carefully consider the consequences of their activity, rather they simply do what they want for themselves in the moment. This impulsivity can lead to reckless and dangerous activity both for their own safety and for the safety of others. They may drive with excessive speed or push others near a traffic filled intersection. If they desire the property of others and they can take it, they will. This same attitude that is used toward property is used toward other people. They will lie or con others in order to fulfill their personal desires. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

If the individual with ASPD is not able to meet their desires through theft or con, they will not stop trying to fulfill their needs. They are prone to get very irritable and often get very aggressive towards others. Fighting with others will likely be prevalent in their personal history. At the end of their theft, maltreatment, and aggressiveness they will not feel sorry for their actions. They will either not care that they have caused harm or rationalize the situation.

In order to qualify for a diagnosis three other criteria must be met:

The individual must be at least 18 years old. Individuals who are growing up and going through puberty do not have the stable personality required to be diagnosed with a personality disorder.

There must also be proof in their developmental history that the individual had antisocial traits as a child. This is demonstrated by fulfilling criteria for Conduct Disorder before age 15. Diagnosticians want to know that the individual’s personality has been set. They would like to know that the individual was like this before puberty and will be like this long after puberty before diagnosing a personality disorder.

The antisocial behavior must not be exclusively during schizophrenia or a manic episode. The behavior should not be because of an Axis I condition. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Psychopathy & Sociopathy

In the literature there is a much greater emphasis on studying psychopathy and sociopathy than there is antisocial personality disorder. These three are related but are not identical. Antisocial personality disorder is the only one of these three terms that exists in the DSM-IV-TR. Psychopathy is defined by characteristics such as a lack of empathy and remorse, criminality, antisocial behavior, egocentricity, manipulativeness, irresponsibility and a parasitic lifestyle. It is commonly conceptualized that psychopathy is a more severe form of APD and this thinking is reasonably accurate. Almost all individuals who fulfill the requirements to receive the label of psychopathy fulfill the requirements for ASPD but most of the individuals who fulfill the requirements of ASPD do not also get the label of psychopath. The term sociopath is an attempt to demystify the term psychopath since many generalize the term psycho in psychopath to apply to other terms like psychotic. Sociopathy is also an attempt by some clinicians to explain the etiology of the condition as characterized by early socialization experiences. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Still Human

Subtypes

One of the diagnostic challenges with any personality diorder is that there is typically significant overlap between the personality disorders. This is due both to the diagnostic overlap in the definition of each of the personality disorders and the fact that individuals typically display many different traits throughout their lifetime. In order to get a better understanding of the common personality trait overlaps, Theodore Miller created a series of 5 subtypes of ASPD:

Coveteus—this type is purely made up of ASPD traits. This individual feels intentionally denied and deprived and seeks to get the things s/he covets but gets little satisfaction from ownership.

Nomadic—this type is ASPD with schizoid, schizotypal and avoidant features. This individual feels cast aside and is typically a drifter and societal dropout. When this individual acts out it is against that impulse.

Malevolent—this type is a mix of ASPD with paranoid personality features. This individual is typically more violent than the other personality disorder types. He expects betrayal and punishment and attempts to get revenge in a pre-emptive manner.

Risk-taking—this type is a mix of ASPD and histrionic features. This individual has the risk taking features of ASPD amplified heavily. They are very audacious and bold to the point of recklessness and they continuously pursue perilous adventures.

Reputation-defending—this type is a mix between ASPD and narcissistic features. This individual has a need to be thought of as unflawed and formidable and will react extremely negatively to perceived slights to status. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Differences

Two of the most problematic differences for ASPD are Narcissistic and Histrionic personality disorder. Narcissistic Personality Disorder shows similar distorted thinking about others. They care little for the wants and needs of others and have limited empathy. Individuals with Narcissistic PD can be manipulative as well. However, Narcissistic individuals rarely show evidence of conduct disorder in youth or antisocial aggression. The underlying thought process behind their rules and norms breaking behavior is different as well. With ASPD the individual feels that they are entitled and special and that they can break the rules because of this fact. The ASPD individual does not need the rationalization, typically they do what they want because they want to do it. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Individuals with Histrionic PD are often impulsive, show very little depth in their empathy and understanding of others. Their dramatic flair can be seen as impulsivity and can do things like maintaining affairs that can be characterized as violating social norms. However, histrionic individuals are not aggressive and will not show evidence of Conduct Disorder in typical presentation.

Symptom Overlap Between Antisocial and Narcissistic/Histrionic

 

Etiology

The nature of personality disorders makes their etiology more difficult to pin down than other disorders. ASPD requires even more evidence of prolonged atypical functioning than other personality disorders because it requires evidence of maladaptive functioning before age 18. This requirement muddies the already murky waters that are the interplay of genetics and environment and their expression in both brain anatamy and psychological activity. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Irregularities of the serotonin network in the brain responsible for the release, use, and reuptake of the neurotransmitter are linked to individuals with ASPD. This network has been linked separately both to individuals diagnosed with ASPD and to highly impulsive behavior. The theory is that this deficit can lead either to arousal thresholds being too low in individuals who show impulsivity or the arousal threshold is too high in individuals who are cold or callous.

Psychological and family systems factors have also been shown to have an effect on the expression of ASPD. The researchers used national epidemiological survey and found individuals from a data set of alcohol users who also were antisocial, finding 1200 individuals on which to base their results. They found that significant childhood experiences of abuse and neglect significantly predict eventual display of ASPD. These early experiences of violence or abandonment have significant effects on attachment and relationship formation. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Duggan (Duggan, et al. 2012) showed a positive relationship between early onset of alcohol use and the transition of conduct disorder to ASPD. Those who used alcohol and other substances at an earlier age more often wound up being diagnosed with ASPD than those who did not. This effect can easily by hypothesized to have an etiological function in either biological or social bases. Perhaps the drug use affected neurological pathways to make the individuals more susceptible. Perhaps early onset drug use was indicative of a social network that was more conducive to reinforcing antisocial behavior.

Gender Gap

There is a very wide diparity between the number of men and women who meet the criteria for diagnosis with ASPD. Epidemiological research suggests that as many as 3% of men have ASPD while less than 1% of women do. Some theorists, like Miller, have argued that the disparity in men and women in ASPD is mirrored by the same disparity with the diagnosis of Borderline Personality Disorder. Women are proportionately more likely to receive that diagnosis than men are to receive a diagnosis of ASPD. This may be due to the fact that the criteria for APD are heavily gender biased. Where men will use naked aggression in a way that leads to multiple arrests (criteria A-1 and criterion A-4) women tend to use relational aggression which has very different outcomes. The same underlying etiology and pathology lead to very different behaviors because these behaviors are mediated by cultural norms. The masculine ideal in the United States contains many antisocial traits. Men are encouraged to be self-reliant, independent, and to use physical force when necessary. They are taught to be stoic and unemotional. This antisocial personality is an overextension of that ideal. Women, on the other hand, are not taught to be unemotional or physically violent, so they manifest that same aggression in different ways. Alegria (Alegria, et al. 2013) found that women have to have a significantly higher lifetime loading of abuse and neglect to show antisocial traits than men do. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

The top theoretical explanations for antisocial personality traits unfortunately leave little for individual agency. The difficulty is that the diagnosis of ASPD requires that the individual gain their personality traits when they are least able to defend against them – during or before their teen years. The biological explanation leaves basically no room for personal agency. It is impossible to willfully change your brain chemistry. Other theoretical standpoints argue that childhood maltreatment and neglect are to blame. A neglected or abused child has little ability to even avoid their maltreatment, let alone recover from their own psychological load. One simple step that is clear from the literature is to delay the onset of alcohol and substance use. Using substances at an early age is a significant loading factor for ASPD. Avoiding early alcohol use can positively affect brain chemistry and alter future habitual activity for the better.

Hypothetical Conceptualization

Psychodynamic

Psychodynamic theorists conceptualize ASPD begins in the early childhood phase of trust vs. mistrust. Children who will later show evidence of conduct disorder and then ASPD do not have adequate social relationships as children. These inadequate relationships center on a lack of parental love. A lack of parental love can lead a child in many different pathological directions and is not necessarily indicative of ASPD in and of itself. Some subset of these children respond to the lack of love demonstrated by their parents by becoming emotionally aloof. They begin to develop the relational style that they are taught at home by bonding with others through overt power dynamics instead of a shared emotional bond. Psychodynamic theorists can point to the evidence of pervasive early childhood trauma in individuals who eventually develop ASPD as proof of their conceptual framework. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Unfortunately, psychodynamic theoretical framework is largely ineffective. There are a number of hypothesized reasons for this therapeutic failure. The first is that almost no one with ASPD is in treatment voluntarily. In addition to this difficulty, individuals with ASPD also have no conscience and little motivation to change who they are naturally which further compounds treatment difficulty. Antisocial individuals also tend to have a very low frustration tolerance which makes seeing treatment through to its conclusion very difficult. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Cognitive-Behavioral

Cognitive-Behavioral therapists conceptualize antisocial activity as a modeled behavior. Children may be reenacting the violent behavior that they experience in a far too personal manner. Theorists also believe that the negative acting out and violent behaviors may be reinforced by the attention that they receive. Parents may give in to violent outbursts simply to restore the peace once individuals have acted out.

Cognitive-behavioral therapists do not attempt to repair the causes of ASPD, consistent with their treatment modalities. They target problem behavior. Therapists attempt to give APD individuals skills to understand moral issues and conceptualize the needs of others. Some prisons and hospitals have tried to put ASPD individuals in group settings to teach responsibility. This approach does not seem to have any effect in most cases. (Arntz, Cima and Lobbestael 2013). (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Biological Theories

Biological theorists have begun using psychotropic medications on individuals with ASPD. Atypical Antipsychotic drugs have been used to treat ASPD. These newer antipsychotic medications bind to multiple dopamine receptor but also have an effect on serotonin. These therapies have not been evaluated in large scale trials to date. (Brook and Kosson 2013)

Biological models have many findings pertinent to individuals with ASPD. First, as was stated in depth earlier, serotonin deficits may be responsible for ASPD traits, especially in individuals who display highly impulsive behavior. Another area of research is the frontal lobes. Many individuals with ASPD have smaller or deficient frontal lobes. Lastly, it appears that many individuals with ASPD have very low resting levels of anxiety. Low levels of anxiety explain why it is difficult for individuals to learn from past negative experiences. (Boccaccini, et al. 2012)The biological model theorizes multiple etiologies for these deficiencies. They may come from genetic factors that cause malformation as children, nutritional deficiencies at key periods in development, the effect of viruses, or from physical harm such as brain lesions. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Conclusion

Antisocial Personality Disorder is a difficult but influential disorder. It is an important problem both for the psychological community and for society. The psychological community has not been able to offer any meaningful therapeutic approaches. Part of the reason that this is the case has to do with the very recalcitrant nature of the disorder itself. Another significant part of that reason is that the psychological community cannot decide where to focus its research. Many very distinguished individuals have been trying to dissect a tiny subset of the APD population because they are very scary and are good for getting grant money. Society at large has a vested interest in ASPD because it makes up such a significant portion of the prison population. These individuals are likely to recidivate and likely to commit violent crimes. Understanding this population better is vital for long term meaningful prison reform. (Lewis, Olver and Wong 2013)

In addition to failing individuals with ASPD in terms of treatment, it is relevant to note that society is failing individuals with ASPD in their formative years. Recurrent episodes of neglect and abuse are run-of-the-mill for individuals with ASPD. Society at large needs to do a better job of policing this kind of abuse and neglect and provide safe, rehabilitative experiences for those who are victims of it. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

References

https://pubmed.ncbi.nlm.nih.gov/31536279/

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

PC & Industrial Networks

PC & Industrial Networks

 

70 Points

Answer each of the following questions in complete detail:

 

1. (10 points) Assume a host computer has the following configuration:

IP Address: 200.110.84.176

Subnet Mask: 255.255.248.0

Default Gateway: 200.110.84.1

a. What is the Class of this ‘network’?

 

b. Is this a Network, Subnetwork, Supernetwork or something else? How do you know?

 

c. How many possible hosts would there be on the above network if all usable addresses were assigned?

 

d. How would this IP address be expressed using CIDR notation?

 

e. Using CIDR notation, what is the range of the block of addresses this Host belongs to?

 

2. (6 points) Explain everything that can be determined from the following:

 

a. fe80::9890:96ff:fea1:53ed%12

b. 2002:77fe:8921::77fe:8921

c. ::01

d. ::

 

3. (4 points) What is the significance of the ninth octet in the header of the IP datagram?

 

 

4. (5 points) SSK Corp has offices in Toledo, Detroit and Columbus. Each office has 127

 

Computers. The IT plan calls for connecting all offices using data lines. The Toledo site will also connect to the Internet. SSK Corp. has elected to use PUBLIC IP address space on all computers at each of its sites.

Their ISP has restricted the IP ranges to the ones below. The ISP’s Network

Administrator is on vacation – you have been asked to fill-in and select a range of addresses that will satisfy SSK Corp.’s needs with the least amount of wasted IP addresses. Propose a range of addresses for SSK Corp. and explain your answer.

225.113.8.0/24

225.113.9.0/24

192.168.0.0/16

221.127.136.0/24

221.128.135.0/24

221.128.136.0/24

221.128.137.0/24

221.128.138.0/24

206.122.148.0/24

10.0.0.0/8

221.125.138.0/24

221.126.137.0/25

221.128.139.0/24

5. (5 points) Using the IP ranges below:

a) What IP range would an ISP provide to a customer, if the customer wanted a range of Public IP’s for use on the Internet? Explain your choice and why you feel the other choices are not adequate?

b) Using the Range you selected in ‘5a’ above – subnet the range into as many /28 networks as possible – show your work and each /28 range of addresses. (Show the network address and the broadcast address for each /28 subnet)

225.113.8.0/24

225.113.9.0/25

192.168.0.0/16

201.127.136.0/24

172.16.0.0/24

10.0.0.0/8

169.254.137.0/25

245.125.1378.0/24

10.0.0.0/24

245.0.0.0/8

127.0.0.0/8

6. (15 points) The following information was extracted from an Ethernet Frame:

IP Datagram Header: 45 00 00 44 5b d2 00 00 80 11 ef 4d 83 b7 75 39 83 b7 72 e1

Based on the above information, describe everything that can be determined about this packet (give the actual data value for each field). Convert each field to its normally displayed value (i.e. Hexadecimal/Decimal/Binary).

Example: Version is 4 which is IPv4

7. (10 points) Bob obtained the following information from a workstation: C:\>ipconfig

Ethernet adapter Local Area Connection:

IP Address. . . . . . . ……… . : 169.254.10.105 Subnet Mask . . . . . . ……… : 255.255.0.0 Default Gateway . . . . ……..:

Link-Local IPv6 Address…..fe80::9890:96ff:fea1:53ed%12

a. Explain everything that can be determined about this host.

 

After waiting 5 minutes and making no changes to his workstation. Bob obtained the following information from his workstation.

C:\>ipconfig

Ethernet adapter Local Area Connection:

IP Address. . . . . . . . ………………: 138.110.10.50 Subnet Mask . . . . . . …………….. : 255.255.0.0

Default Gateway . . . …………….. : 138.110.10.1

Link-Local IPv6 Address………….:fe80::9890:96ff:fea1:53ed%12

b. How would you explain the changes to the IP stack? Explain in detail what occurred.

 

8. (5 points) Explain each of the good ‘Network Design goals’ as discussed in class.

9. (10 points) You have been given the task of changing the IP Address and enabling telnet remote access on a CISCO 2950 enterprise switch.

The current IP address is 172.25.2/16 the new IP address is 10.0.0.2/24

The enterprise switch has no password configured.

a. Explain all of the commands needed for you to successfully accomplish the IP Address change and telnet remote access.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!