ISE_690_Assignment_Olaolu_Abayomi
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
690
Subject
Industrial Engineering
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by KidCaribou1455
ISE 690
Research Assessment Consulting Problem One Worksheet
Use this template to complete the Research Assessment Consulting Problem One Worksheet
assignment. Be sure to also review the Research Assessment Consulting Problem One Worksheet
Guidelines and Rubric document as needed. Both documents are linked in the worksheet assignment in
Module Two of your course.
Remember that at least one of the three sources should be accessed through Shapiro Library. Add space
to the worksheet as needed.
Source One
Accessed through Shapiro Library? (Yes or No) ___YES___
Citation in APA style: YES
Burns, M., & Igou, A. (2019). “Alexa, Write an Audit Opinion”: Adopting Intelligent Virtual Assistants in
Accounting Workplaces. Journal of Emerging Technologies in Accounting, 16(1), 81-92.
https://eds-s-
ebscohost-com.ezproxy.snhu.edu/eds/detail/detail?vid=1&sid=f36a6e4f-fd9f-4e7e-9a46-f90cb0b579be
%40redis&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=bsu&AN=139750741
Description of source contents:
The content of this source is related to the technology that supports the use of Intelligent Virtual
Assistants (IVAs), as human-computer interface is concerned. It specified electronic devices that are
virtual assistant compatible like smart phones, laptops, and Alexa device, discussed the various types of
IVAs (Chatbots, Voice Bots, Speech to text) available. It acknowledged some trust related challenges that
organizations have in adopting IVA technology. The benefits that IVAs provide to their users and the risks
that accrue from the use of this technology. It reviewed the Privacy issues and other Security concerns
related to the use of virtual assistants. It also spoke about ‘What the future holds for IVAs”.
Evaluation of trustworthiness/reliability:
What/who is the source? How was it found and accessed? What do you know about the source (scope of
content, reliability, influence, reputation, etc.)?
The authors of this journal Mary Burns and Amy Igou are highly reputable and distinguished scholars of
the University of South Carolina Upstate and University of Northern Iowa respectively, who have
individually and jointly authored so many books and have so many other credible publications to their
credit. Moreover, this publication was featured in the American Accounting Association Journal on
Emerging Technologies in Accounting. The American Accounting Association is a highly respected
accounting authority in North America.
Assessment of use:
1
How can you use the source content in Milestone One (and the corresponding component of the Final
Project)? What aspects of the content are most relevant?
I have found this resource very useful and relevant to the consulting problem one as obtainable in the
Sonya Project in Milestone one and the relevant part of the Final project. This write-up would aid me in
preparing a good recommendation to management on the gains derivable from the use of Intelligent
Virtual Assistants in customer service delivery, the security risks associated with the use of IVAs and how
these risks can be well addressed by incorporating security into the IVA technology.
Source Two
Accessed through Shapiro Library? (Yes or No) __NO____
Citation in APA style: YES
Edu, J., Such, J., & Suarez-Tangil, G. (2020). Smart Home Personal Assistants: A security and Privacy
Review.
https://arxiv.org/pdf/1903.05593.pdf
Description of source contents:
This resource provides a comprehensive overview of the functionality of Smart Home Personal
Assistants. It explains how home users relate with this technology and how artificial intelligence is being
deployed to facilitate this computer-human relationship. It outlines the security and privacy issues
concerning the usage of this technology from the consumer standpoint and recommends the security
measures that organizations and users can apply in managing these exposures.
Evaluation of trustworthiness/reliability:
What/who is the source? How was it found and accessed? What do you know about the source (scope of
content, reliability, influence, reputation, etc.)?
This article is a very recent study and is jointly written by three respected scholars namely Jide Edu, Jose
Such, and Guillermo Suarez-Tangil all
from the world-renowned Kings College, London, United Kingdom,
with input and contributions from over fifty other sources. This article has been featured in the
Association for Computing Machinery (ACM) journal and has been cited in so many other publications. I
have no concern about its credibility
Assessment of use:
How can you use the source content in Milestone One (and the corresponding component of the Final
Project)? What aspects of the content are most relevant?
This article would be most useful in addressing the fundamental elements of milestone one, the
numerous advantages that the usage of an Intelligent Virtual Assistant would give to Collage in terms of
accuracy and consistency of information, the improvement in turnaround time and the overall growth
potential for Collage as an organization. It would be most useful in highlighting the security concerns on
2
the implementation of the “Sonya Project”, while stating some likely security incidents that may
potentially occur. All of which management needs to understand in order to effectively tackle.
Source Three
Accessed through Shapiro Library? (Yes or No) __NO____
Citation in APA style: YES
Audin, G. (2018). Can You Trust Intelligent Virtual Assistants? Enterprise Connect Publication
https://www.nojitter.com/can-you-trust-intelligent-virtual-assistants
Description of source contents:
This article is a product of Enterprise Connect, a leading IT solution firm based in the United States that
brings together IT professionals, vendors, IT service providers and consultants into a community where
they can freely exchange ideas, network, discuss issues of common interest and explore new
technologies. The article explains how Virtual Assistants are programmed to behave like humans. It
highlights the various security risks facing the usage of Intelligent Virtual Assistants, which include but
not limited to malicious voice commands, voice imitation, denial of service, packet sniffing
(eavesdropping, accidental voice recordings among others. Lastly, it recommended security measures
that should be implemented in order to limit these risks.
Evaluation of trustworthiness/reliability:
What/who is the source? How was it found and accessed? What do you know about the source (scope of
content, reliability, influence, reputation, etc.)?
This article emanates from Enterprise Connect, a leading IT conference and training provider in North
America with over 225,000 delegates partaking in its yearly events and 18,00 students attending its
training programs. The author of the article, Gary Audin, is a computer,
communication, and security
expert with over 40years industry experience. He is the serving President of Delphi Inc, and his writings
have been featured severally in reputable journals and magazines like Computerworld, Infosystems, and
Business Communications Review.
Assessment of use:
How can you use the source content in Milestone One (and the corresponding component of the Final
Project)? What aspects of the content are most relevant?
This source will assist me in drafting my security recommendation memo as a subject matter expert. It
would enable me to itemize the numerous benefits derivable from the use of an IVA, likewise the
potential risks associated with this technology usage. Most importantly it would aid me in drawing
management’s attention to the underlining security risks as well as explaining how these risks can be
addressed.
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help