Issues and Concerns in the Field of Computing: 1229470

1Research Questions:
1.What is the importance of Computing in the contemporary world?
2.What are the main issues that are arising in the field of the computing in the past few year?
3.How can these issues have an impact upon the contemporary activities?
4.How can we mitigate this issues in the future?
2Aim:
The aim of the research is to identify the challenges faced by the Computing technologies in the past five years such that they can be prevented from occurring in the future.
3Literature Review:
3.1Background:
With the advent of the twenty first century, the development of the computing technologies have spiked up rapidly. Our determination of creating an error free, efficient process has given rise to numerous technologies which have proven to be wonders. The reliability of the systems are sometime over estimated giving rise to expectation which can be misleading in the first place. However, the technological advancement in the computing sector has its own challenges as well. The history of the computer system has greatly developed based on the reliability and the reliance. Thus it is considered that the reliance on the system will be corresponding with the reliability (Mukherjee et al., 2017). The system, which is a set of components working together to accomplish a specific task. The components within a system can itself be a set of other components. Hence, any issue arising in the any of the system can affect the entire process. The main objective of the research is to determine the risk associated with the computing systems in use such that the mitigation can be obtained.
3.2Motivation:
3.2.1Importance of the computing technology:
In the contemporary world, one of the most renowned technologies is the Information System and Information Technology. The information system which is a software for organizing and analysing data, with the usage of the technology helps in the process of decision making for various fields, starting from the education to the business, finance and marketing. In the present time, we are more dependent upon the technology than ever before. The internet and network system has helped in the developing the process further. However, with the advent of the technologies like the AI, Smart Devices, mobile technology, we are completely surrounded by the technologies where we can barely imagine ourselves without them (Noor et al. 2018).
3.2.2Important technologies developed in the last 5 years:
The past few years seen wonders in the innovation of the technologies. Numerous technologies have been discovered for providing most upgraded solution to the existing technologies, such that the efficiency of the system can be increased. Some of the most well-known technologies includes the following.
Practical Augmented Reality: This is considered to be one of the latest technologies in use in the contemporary world. The technology is capable of doing wonders. The advanced micro displays present in the system helps in making the price reasonable for the majority of the people to use them for their benefit. With the help of this technology, the information will be available to us can thus can be retrieved on the minute-by-minute and daily basis.
Generative Adversarial Networks: This is more commonly known as GAN. The job of the technology is to gather more knowledge from the data which are not labelled. This is very new type of the neural network which is in use.
Chatbots: As per Serban et al. 2017, the Chatbots are one of the most important technologies that is in use. This has reduce the job of the customer executives mainly by enabling g quick automated responses to the customers. The answers are generated based on the key words. The companies like Facebook, IBM, Apple and many other business giants makes use of these technology for the purpose of their business, where they can engage more workers in the development process rather than investing more on the customer services for answering the basic questions. In addition to this the Chatbots have a benefit for collecting information based on the chats and analysing it for the further insights. They are capable of providing suggestions to the consumers on the basis of their previous search questions which was indeed challenging for any human (Shah et al. 2018).
Real-time language translation: Coupling with Artificial Intelligence has always proven to be a benefit for all the organization. The real-time language translator help a unilingual to have conversation with another language without any hindrance. With the development of this technology, it has been proven that language is no longer a barrier in communication system (Serban et al. 2017).
Artificial intelligence in the Mobile Applications: Few years back incorporating AI into mobile devices were nearly impossible for the developer of the technology and that too in a cost effective manner. But in the present time it is not at all impossible. Google Service, Amazon Services, Microsoft Cognitive Services and others using artificial intelligence technology can be included in the mobile devices as well. With this technologies in use the user experiences have improved a thousand times more than it was before. AI in mobile has made the system smarter, and made the user experience smoother and more efficient.
Inexpensive Fast Storage: As per Webber et al., 2019, the advancement of the technologies like the cloud computing, artificial intelligence, Virtual reality and a few others are the technologies that has made our lives much more easier than it used to be. With the emergence of the cloud computing and mobile computing technologies in use, the cost of the data storage has declined with the increase in the performance and efficiency in the system. The cloud services mainly rely on the SSDs for their work (Mollah, Azad and Vasilakos 2017).
AI and ML Application: All the other technologies that have been in use for the development of smart technologies are some way or the other connected to machine learning and AI. The machine learning is a way where a system can be trained to perform certain work without human intervention, it is the branch of the AI which can learn from the data that has been gathered form the other systems of information. The artificial intelligence on the other hand is the technology capable of thinking in way a human could and sometimes even better.
Brain computer interfaces: When it comes to technological wonders, Brain Scanners are unbeatable. They are capable of translating the thoughts to text words. This is an extreme usage of the digital mapping and artificial intelligence that will be in use within a decade.
3.2.3Challenges faced by the technologies:
The technologies which has provided us with ample of opportunities and enhance our day to activities have certain drawbacks as well. In this section we will discuss about some of the challenges that are the part of these technologies as well.
Challenges in the augmented reality: The most common challenge is the hardware. The Augmented reality makes use of the headsets which is bulky and expensive. In order to connect to the system, the technology have to make use of the tethering. The range of the tethering is limited hence the experience is limited as well. However, apart from this one of the other major challenges regarding the augmented reality includes the lack of rules and regulations which can be used while the usage of the AR (Bhhatarai et al., 2019). Hence the technology can be misused on the basis of that where the accounts can be hijacked by the hackers by manipulating the content of the AR and mining the data-outputs of the system. As the technology is new in the field of the technology, the awareness regarding the technology is much lesser hence apart from gaming the business fails to understand the benefits of the AR.
Challenges faced by the AI based technologies: According to Hao et al., 2017, one of the greatest problem of the AI based technology is biasing. They are completely dependent upon the data that has been inherited in to the system. Its inability to discriminate against the biasing can lead to the ethical problems in the business or the organization which are making use of these technologies. The other most notable challenge that faced in using AI is the computing problem. A huge amount of data is produced by the system making use of the AI, thus a strong computing power is extremely important. Obtaining such computing power and funding for that is a challenge that is faced by the business. Above all these, the Artificial Intelligence is a nascent technology which has been in the industry for a few years from now, thus it is very difficult to find the people who are proficient with the technology usage. Apart from this other disadvantages includes the high cost and, complex machineries and lastly unemployment.
As discussed earlier, the cloud computing one of the most efficient technology in existence which is enabling the users to get a global access to the pool of the resources for example, services, applications, servers, data and many more. There are uncountable benefits of using cloud computing technologies but the challenges cannot be ignored completely (Van Horne and Dutot, 2017). The first issue is the cost. The cloud computing in itself is a very cost effective solution but incorporating the technology in to the business as per the requirement is expensive process. The cloud has to be rented from the service providers whose availability is another chief concern of the business. It is the reputation of the service provider and the sustainability on which the business have to depend for its operations. Another major issue with the cloud computing services is the downtime. Without internet connection, no functions of the cloud is possible; thus ensuring the connectivity while using the cloud based technology becomes important.
All the computing technology has one challenge in common, that is the issue of the data privacy. The technology has negative effects as well, where the hackers are waiting patiently to introduce a malware in the system and manipulate it completely. The privacy of the data can be easily hampered if the third party access control is not enabled in the business or the system (Proskuryakova, Meissner and Rudnik 2017).
4Scope
The scope of the research is identification of the technologies which have been developed in the past few years and understanding their benefits in brief. After analysing these technologies we can simply understand how and where these technologies are lacking. Identification of the challenges of the computing technologies helps in generating insights regarding the technology’s risks and mitigation techniques can be identified.

5Objective:
The objective of the research are:
I.To determine the importance of the computing technology in the contemporary world.
For determination of the importance of the computing technology in the contemporary world, we will consider the secondary method of the research.
For performing this object we will require few authentic sources of data from the scholarly articles.
Deliverables:
Importance of the computing technologies.
Different technologies in use.
Analytical skills required.
II. To identify the areas where the technologies that are present is proving challenging in the past 5 years.
In order to perform this task, we will consider the secondary source of the data. This includes the authentic source of data from the scholarly article.
Deliverables:
Challenges faced due to the usage of the technology in business.
Analytical skills required.
III.To identify the impact of these challenges upon the daily lives of the individual.
6Risk:
Risk Id. Risk Description Impact Likelihood Mitigation

  1. Malware attack: This attacks are initiated by the hacker who without the knowledge of the authority intrude the system and modify the data or the system setting which causes hindrance in the operations and the functions of the system (Kolosnjaji et al. 2018). High High The malware attack in the system can be prevented with the help of the anti-viruses. Updating the system on a daily basis can also solve the purpose of the protection against the malwares in the system.
  2. Data privacy threat: These caused by the hackers. The third party access of the data is prohibited in the system. Without the knowledge of the authorised parties the third party access is completely unacceptable. The business data bases consists of sensitive data which can be misused by the hackers, causing a breach in the privacy and integrity of the data in the system. High High Application of the Access Control protocol is one of the best ways in which the privacy of the data can be protected.
    The data protection act can be implemented in the organizations using the technologies like the online databases and cloud such that the customers can have the right to take the hold of their own data and the data can be edited or removed as per the requirement of the customer.
  3. Expense: The Artificial intelligence equipment, or the process of incorporating a cloud based technology in the business as per the requirement, is not a cost effective process. Moderate High The risk of the expense can be mitigated with the help of proper planning and implementation of the project management tools and techniques.
  4. Unavailability of expertise: All the above mentioned technologies that are in use are quite new in the market, thus finding proper expertise in these technology is a major concern for the business sectors (Perc, Ozer and Hojnik 2019). Moderate Moderate Training the employees with the help of the employee training program can be a way in which the risk due to the lack of expertise can be mitigated.
  5. Bulky Design of Augmented Reality: This is the technology which is in use for the past few years and the designs are bulky. They are not quite user friendly. The range of the tethering is much lesser making the experience of the user limited to a boundary. Low Low Development of the lighter models can only be the solution for this issue. However, this still in the process of development.
  6. Lack of business awareness: As these technologies mentioned above has been developed in the past few years, they are not quite familiarized with the businesses around the world (Zhao and Jiang 2019). Thus the business cannot make use of it as efficiently as it is needed, which means that the purpose of the technologies are not fulfilled. High High Spreading awareness’s regarding the business uses of the technologies may help in acquiring the benefits of the technologies in the business.

7Gantt chart and activities:

8References:
Bhhatarai, B., Walters, W.P., Hop, C.E., Lanza, G. and Ekins, S., 2019. Opportunities and challenges using artificial intelligence in ADME/Tox. Nature materials, 18(5), p.418.
Hao, Z., Novak, E., Yi, S. and Li, Q., 2017. Challenges and software architecture for fog computing. IEEE Internet Computing, 21(2), pp.44-53.
Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C. and Roli, F., 2018, September. Adversarial malware binaries: Evading deep learning for malware detection in executables. In 2018 26th European Signal Processing Conference (EUSIPCO) (pp. 533-537). IEEE.
Proskuryakova, L., Meissner, D. and Rudnik, P., 2017. The use of technology platforms as a policy tool to address research challenges and technology transfer. The Journal of Technology Transfer, 42(1), pp.206-227.Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, pp.38-54.
Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M.A., Choudhury, N. and Kumar, V., 2017. Security and privacy in fog computing: Challenges. IEEE Access, 5, pp.19293-19304.
Noor, T.H., Zeadally, S., Alfazi, A. and Sheng, Q.Z., 2018. Mobile cloud computing: Challenges and future research directions. Journal of Network and Computer Applications, 115, pp.70-85.
Perc, M., Ozer, M. and Hojnik, J., 2019. Social and juristic challenges of artificial intelligence. Palgrave Communications, 5(1), pp.1-7.
Serban, I.V., Sankar, C., Germain, M., Zhang, S., Lin, Z., Subramanian, S., Kim, T., Pieper, M., Chandar, S., Ke, N.R. and Rajeshwar, S., 2017. A deep reinforcement learning chatbot. arXiv preprint arXiv:1709.02349.
Shah, A., Jain, B., Agrawal, B., Jain, S. and Shim, S., 2018, January. Problem solving chatbot for data structures. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 184-189). IEEE.
Van Horne, C. and Dutot, V., 2017. Challenges in technology transfer: an actor perspective in a quadruple helix environment. The Journal of Technology Transfer, 42(2), pp.285-301..
Webber, S.S., Detjen, J., MacLean, T.L. and Thomas, D., 2019. Team challenges: Is artificial intelligence the solution?. Business Horizons, 62(6), pp.741-750.
Zhao, M. and Jiang, Y., 2019. Great expectations and challenges of artificial intelligence in the screening of diabetic retinopathy.