Campbellsville University IT Field: InfoTech in a Global Economy IT field Information Technology is a vast field that can be highly sophisticated to highl

Campbellsville University IT Field: InfoTech in a Global Economy IT field

Information Technology is a vast field that can be highly sophisticated to highly simple forms of knowledge. The main aim of Artificial Intelligence or simply AI is to ensure smart behavior in various machines. In the viewpoints of Lu e al. (2018), it can be stated that this is highly necessary, given the fact that world is shifting towards a totally automatized phase, where machine learning will be of ultimate importance for the success of an individual or organization. It is a highly interesting field that can help in solving many issues related to manpower and employee turnover in various industries. However, as per the ideas of Lu et al. (2018), it can be stated that the most important part about AI is the fact that it has grown to be one of the most popular and attractive fields of IT that all IT professionals tend to study and gain expertise in. However, it must be mentioned here that AI is a highly complex subject and requires high amounts of precision to ensure greater success for an entire project. There is a high need for individuals to gather classified knowledge before getting into the field.

Contemporary times have seen the high application of the concept of AI, as it is said that Artificial Intelligence is present everywhere. This is true, as big organizations like Google and Microsoft have invested billions of dollars on AI to ensure greater development of the tools. As influenced by the ideas of Lu et al. (2018), it can be stated that Artificial Intelligence has allowed many organizations to ensure greater growth and profitability as well. Therefore, I choose this highly interesting aspect of Information Technology as my intended field.

Research question

Is the fault detection process in machines using Artificial Intelligence flawless and is it possible to ensure zero errors in machines with Artificial Intelligence?

Research Methodology

The Research Methodology adopted by a researcher should be in alignment with the Research Questions that are to be answered in the research. For ensuring greater success of research, a correct philosophy is required to be applied. In the words of Hoover (2018), Positivism is the most appropriate Research philosophy as there is a need for greater logical reasoning to come to a specific conclusion in this research. In addition there is a need to undertake a deductive research design. As stated by Hoover (2018), deductive research design is best suited to be conducted alongside Positivist research philosophy. Undertaking a deductive research approach is highly necessary as it allows reaching a conclusion by effectively analyzing all the existing theories and data. This is a necessity in this case, as there is a high need to reach correct conclusions for the success of the overall research.

The data collection method requires to be a secondary method, with a secondary data analysis to be conducted to reach a convenient result. All the data is to be collected from previous existing data and research in this direction and analyzed to reach the required conclusion. In the opinions of Santini et al. (2019), secondary data focuses on data already available. Secondary data collection will involve the collection of data from the various online journals and books available. However, there is a need to pick only authentic sources of data and make sure that empirical analysis is conducted. Therefore, there is need to collect both qualitative and quantitative data. Besides, it is required to be ensured that ethical means are applied to collect data and make use of patented data. Thus, the research methodology should include steps that ensure total success of the research and help in promulgating ways which error in fault detection can be checked within a machine developed by means of Artificial Intelligence.

References

Hoover, K. D. (2018, June). A Countercultural Methodology: Caldwell’s Beyond Positivism at Thirty-Five☆. In Including a Symposium on Bruce Caldwell’s Beyond Positivism After 35 Years (pp. 9-17). Emerald Publishing Limited.

Lu, H., Li, Y., Chen, M., Kim, H., & Serikawa, S. (2018). Brain intelligence: go beyond artificial intelligence. Mobile Networks and Applications, 23(2), 368-375.

Santini, T., Brinkmann, H., Reitstätter, L., Leder, H., Rosenberg, R., Rosenstiel, W., & Kasneci, E. (2019). Data Collection, Data Management, Data Analysis, Oh My! Training Videos for Evaluation in Informal Learning Environments. 32nd Annual Visitor Studies Association, 12.

2

What is an area of IT you intend to or would like to study?

I would like to choose and study the security and database because nowadays most of the organizations and the people working and worrying about the security and handling of the organization database. And the security concepts are really interesting that relates to the organizations especially in the finance and the HR departments because of the data or the information of the employees or the organization data will store in the database and need to have more security when the employees or anyone have to access in the organization. That’s one of my interest to manage the huge volume of the data and giving more security on data.

What is your current research question?

My current research question is how can we manage the huge volume of data by using any tools or latest technologies? How can we protect and secure the small volume of data to the huge volume of data?

What methodology or methodologies do you think would be appropriate to address your research question, and why?

I would choose two technologies that based on the tools and the specific steps or process that will help my research question because nowadays most of the organizations and the people relying on the automation tools because automation tools will reduce the manpower the cost and will give results within a target time. There are several tools that will manage the huge amount of data and there is one concept called bid data and it contains to manage the data in different ways and it depends on the requirement and volume. The other way is to take several steps to secure the data by using the cryptography concept like encrypting and decrypting the data based on the public and private keys. There are so many cloud areas to handle the data and they will give some security as well but not like to take and initiate the several policies and processes.

Leave a Reply

Your email address will not be published. Required fields are marked *