Emerging Technologies James Moravec Institution Emerging Technologies Medical providers are continuously adopting technologies they see critical to the provision of several services in the healthcare environment. However, some of the emerging technologies pose some challenges because of their use, but planning on how to mitigate concerns regarding these technologies is essential…
Consequently, this case study highlights the use of intelligent building capabilities, discuss its risks, and recommend how providers can secure this technology. Inclusion of intelligent building capabilities in medical premises In a journal article, Hlousek (2008) contend that intelligent buildings have the capability of responding to the needs of its occupants along with saving on cost and reducing ecological impact. This is one of the motivators that seen people install sensory devices into everyday objects they can place in offices to monitor and provide data about users. The use of such technology has transformed how engineers design intelligent buildings, as pervasive technology continue to evolve over time. Currently, engineers can install various pervasive technologies in buildings such as CCTV cameras and wearable tags. These technologies help gather data about people in intelligent building, which can provide intelligence that can help providers deliver services to users (Moran & Nakata, 2010). The suitability of pervasive technology in proving gathering and transmitting data from users to receiving gadgets has paved way for the use of these technologies in various places. For instance, some parents use these wearable tags to track their children while some buildings have CCTV cameras to monitor people entering and exiting a building. Risks associated with the technologies Pervasive technologies have proved essential in enabling intelligent building users with services. However, there are various risks associated with this emerging technology. The risks associated with pervasive technologies in intelligent building include user perception, privacy concerns, and accuracy, ownership and accessibility. a) Perception: The use of pervasive technologies raises risk on how people perceive these technologies. In a medical environment, the installation of gadgets such as CCTV cameras can alter the behavior of physicians, as well as that of patients. Stress among users is one of the effects of surveillance technologies when users feel they are under observation (Moran & Nakata, 2010). This can affect the performance and behaviors of subjects. b) Privacy concerns: Monitoring technologies such as GPS products and wearable tags have privacy risks. In a work environment, users have concerns on what kind of information employers can gather about their employees (Michael, McNamee & Michael, 2006). In addition, users question what kind of information a provider can view from subjects under surveillance. As a result, such technologies can infringe the privacy of the subjects they are observing. c) Accuracy of data: Increasing reliance of monitoring technologies bears a risk of inaccurate data, which can lead to negative outcomes. Given that, pervasive technologies have become essential in providing critical services; their accuracy is a subject of debate as erroneous data can lead to severe impact (Michael, McNamee & Michael, 2006). For example, accidental data processing for GPS services can lead to negative outcomes because providers can make wrong decisions that have far-reaching effects on patients. d) Ownership of user data: Owners of pervasive tech ...
Cite this document
(“Emerging Technologies Case Study Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.net/other/11716-emerging-technologies
(Emerging Technologies Case Study Example | Topics and Well Written Essays - 750 Words)
“Emerging Technologies Case Study Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.net/other/11716-emerging-technologies.
Strategic Management of Chevron Corporation
The company has a strong global market. It offers diversified products which strengthen its market base. Due to its strategic planning and technological advancements, it is the second largest integrated energy company.
In this paper I will present an overview of the issues associated with this cloud computing. This paper will also present solutions and suggestions to deal with these security risks. Introduction Concerns about how an attacker can attack organizations have turned out to be a key focus area of security endeavors and strategies to protect both individual targets and the country in general.
In stemming his contribution on the cloud computing, Choo considered cloud computing as a pool of computing resources that enables users to access computer applications and data within a web based environment depending on the data or information they need (Choo, 2010).
The first part is an overview of the two industries - high street fashion and airlines - in general, their key challenges, and the traditional theories and practice of operations management in their supply chains. The second part looks at recent development trends in supply chain technologies and business process re-engineering, whilst the third part provides examples of their effects.
Sounds can be sampled and replicated to give the composer access any sound available. The Musical Instrument Digital Interface (MIDI) allows composers to write music with only the most rudimentary knowledge of music. Sequencing is able to generate the sound of every instrument imaginable as well as sound effects and percussion.
This situation can harm their reputation. In this article suggestions and recommendations are described for the Operations Director (OD) of ST to implement on the suppliers to retain the reputation of the company so that new product can be launched successfully.
ing its services and operations to serve customers better in the light of their needs and emerging technologies, and embracing change in a rapidly changing business environment.
USPS is the only postal service that serves the length and breadth of America. However, it does not
The negligence of Check point resulted to violation of privacy. ChoicePoint’s policies were proven to be insufficient and flawed in tackling fraud against the firm as the fraudsters were capable of evading being
As of 2006, the company had established itself as a multinational corporation comprising of around 60 profit centres that served as the company’s business units that brought in revenue of $11 billion. The success of the
5 Pages(1250 words)Case Study
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Case Study on topic Emerging Technologies for FREE!