ISE_690_Assignment_Olaolu_Abayomi

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

690

Subject

Industrial Engineering

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by KidCaribou1455

Report
ISE 690 Research Assessment Consulting Problem One Worksheet Use this template to complete the Research Assessment Consulting Problem One Worksheet assignment. Be sure to also review the Research Assessment Consulting Problem One Worksheet Guidelines and Rubric document as needed. Both documents are linked in the worksheet assignment in Module Two of your course. Remember that at least one of the three sources should be accessed through Shapiro Library. Add space to the worksheet as needed. Source One Accessed through Shapiro Library? (Yes or No) ___YES___ Citation in APA style: YES Burns, M., & Igou, A. (2019). “Alexa, Write an Audit Opinion”: Adopting Intelligent Virtual Assistants in Accounting Workplaces. Journal of Emerging Technologies in Accounting, 16(1), 81-92. https://eds-s- ebscohost-com.ezproxy.snhu.edu/eds/detail/detail?vid=1&sid=f36a6e4f-fd9f-4e7e-9a46-f90cb0b579be %40redis&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=bsu&AN=139750741 Description of source contents: The content of this source is related to the technology that supports the use of Intelligent Virtual Assistants (IVAs), as human-computer interface is concerned. It specified electronic devices that are virtual assistant compatible like smart phones, laptops, and Alexa device, discussed the various types of IVAs (Chatbots, Voice Bots, Speech to text) available. It acknowledged some trust related challenges that organizations have in adopting IVA technology. The benefits that IVAs provide to their users and the risks that accrue from the use of this technology. It reviewed the Privacy issues and other Security concerns related to the use of virtual assistants. It also spoke about ‘What the future holds for IVAs”. Evaluation of trustworthiness/reliability: What/who is the source? How was it found and accessed? What do you know about the source (scope of content, reliability, influence, reputation, etc.)? The authors of this journal Mary Burns and Amy Igou are highly reputable and distinguished scholars of the University of South Carolina Upstate and University of Northern Iowa respectively, who have individually and jointly authored so many books and have so many other credible publications to their credit. Moreover, this publication was featured in the American Accounting Association Journal on Emerging Technologies in Accounting. The American Accounting Association is a highly respected accounting authority in North America. Assessment of use: 1
How can you use the source content in Milestone One (and the corresponding component of the Final Project)? What aspects of the content are most relevant? I have found this resource very useful and relevant to the consulting problem one as obtainable in the Sonya Project in Milestone one and the relevant part of the Final project. This write-up would aid me in preparing a good recommendation to management on the gains derivable from the use of Intelligent Virtual Assistants in customer service delivery, the security risks associated with the use of IVAs and how these risks can be well addressed by incorporating security into the IVA technology. Source Two Accessed through Shapiro Library? (Yes or No) __NO____ Citation in APA style: YES Edu, J., Such, J., & Suarez-Tangil, G. (2020). Smart Home Personal Assistants: A security and Privacy Review. https://arxiv.org/pdf/1903.05593.pdf Description of source contents: This resource provides a comprehensive overview of the functionality of Smart Home Personal Assistants. It explains how home users relate with this technology and how artificial intelligence is being deployed to facilitate this computer-human relationship. It outlines the security and privacy issues concerning the usage of this technology from the consumer standpoint and recommends the security measures that organizations and users can apply in managing these exposures. Evaluation of trustworthiness/reliability: What/who is the source? How was it found and accessed? What do you know about the source (scope of content, reliability, influence, reputation, etc.)? This article is a very recent study and is jointly written by three respected scholars namely Jide Edu, Jose Such, and Guillermo Suarez-Tangil all from the world-renowned Kings College, London, United Kingdom, with input and contributions from over fifty other sources. This article has been featured in the Association for Computing Machinery (ACM) journal and has been cited in so many other publications. I have no concern about its credibility Assessment of use: How can you use the source content in Milestone One (and the corresponding component of the Final Project)? What aspects of the content are most relevant? This article would be most useful in addressing the fundamental elements of milestone one, the numerous advantages that the usage of an Intelligent Virtual Assistant would give to Collage in terms of accuracy and consistency of information, the improvement in turnaround time and the overall growth potential for Collage as an organization. It would be most useful in highlighting the security concerns on 2
the implementation of the “Sonya Project”, while stating some likely security incidents that may potentially occur. All of which management needs to understand in order to effectively tackle. Source Three Accessed through Shapiro Library? (Yes or No) __NO____ Citation in APA style: YES Audin, G. (2018). Can You Trust Intelligent Virtual Assistants? Enterprise Connect Publication https://www.nojitter.com/can-you-trust-intelligent-virtual-assistants Description of source contents: This article is a product of Enterprise Connect, a leading IT solution firm based in the United States that brings together IT professionals, vendors, IT service providers and consultants into a community where they can freely exchange ideas, network, discuss issues of common interest and explore new technologies. The article explains how Virtual Assistants are programmed to behave like humans. It highlights the various security risks facing the usage of Intelligent Virtual Assistants, which include but not limited to malicious voice commands, voice imitation, denial of service, packet sniffing (eavesdropping, accidental voice recordings among others. Lastly, it recommended security measures that should be implemented in order to limit these risks. Evaluation of trustworthiness/reliability: What/who is the source? How was it found and accessed? What do you know about the source (scope of content, reliability, influence, reputation, etc.)? This article emanates from Enterprise Connect, a leading IT conference and training provider in North America with over 225,000 delegates partaking in its yearly events and 18,00 students attending its training programs. The author of the article, Gary Audin, is a computer, communication, and security expert with over 40years industry experience. He is the serving President of Delphi Inc, and his writings have been featured severally in reputable journals and magazines like Computerworld, Infosystems, and Business Communications Review. Assessment of use: How can you use the source content in Milestone One (and the corresponding component of the Final Project)? What aspects of the content are most relevant? This source will assist me in drafting my security recommendation memo as a subject matter expert. It would enable me to itemize the numerous benefits derivable from the use of an IVA, likewise the potential risks associated with this technology usage. Most importantly it would aid me in drawing management’s attention to the underlining security risks as well as explaining how these risks can be addressed. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help