Tuesday, May 26, 2020

Systems Informations Analysis - 2077 Words

CATWOE, Root Cause, amp; Rich Picture Question 1. Management commitment and communications The management teams leadership and communication, specifically wit the IT department, resulted in helping the Columbus Project fail. Had senior management clearly communicated from the start that the project was a survival issue, the results may have born strong leadership and follow through with the IT Department. C While the topic is an internal based investigation, I still see the end user as the customers of the bank. The Columbus Project was supposed to be overseen by the managers to primarily make banking easier and more accessible for their customers. The service was to be upgraded to instant, seamless, and efficient, with over 100†¦show more content†¦Over the last decade information systems on the logistics side have increased dramatically, with even the US government getting on board. I am going to discuss the process of how these internal and external systems has increased the documentation for tracing the lot numbers, but also created challenges from a managerial and employee perspective. We first have to get the product from the manufacturer, which is in Brazil – so much for the organic credo of buying local and reducing your carbon footprint – to the main point of distribution in New Jersey, US. Now the current import team is a total of 2 people, one with an extensive background is customs regulation, and the other is an eager assistant fresh out of college looking for quick advancement within the company. We receive an electronic ASN file, or â€Å"advanced ship notice† from our supplier, this usually comes through our company extranet. Once we receive these docs, the clock starts. We have to set up bookings with our shipping lines through their website portals right away to secure spots on the vessels for our containers. Once we receive confirmation for the booking, we have to log onto the US Customs and Border Protection website and their Automated Manifest amp; Broker System to issue a 10+2 or â€Å"Importer Security Filing† within 48 hrs of the vessels departure. This is a heavily automated time sensitive system of receivingShow MoreRelatedInformation Systems Assessment : System Analysis3618 Words   |  15 PagesF21IF1 Information Systems Assessment 1 System Analysis Boris Mocialov Sà ¶ren Pollakowski Yernar Akshabayev Assem Madikenova Max M Baird Date: 03.10.14 by 1PM Table of contents î ¿ ¿Table of contents 1 Introduction 2 Evolution of Systems Analysis 2.1.1 Origins â€Å"Systems analysis applies scientific methods to analyze large and complex systems.† (bad definition in my opinion) Policy Analysis of Multi-Actor Systems / Bert Enserink, Leon Hermans, Jan Kwakkel, Wil ThissenRead MoreCollection of Information for Systems Analysis Essay examples1534 Words   |  7 PagesA critical part for systems analysis is the collection of information. From the very beginning, analyst need to understand the information systems that are currently in use. Besides, analyst has to find out expectations of users about how they prefer to improve the current systems and organizational operations with the new or replacement information systems. Last but not least, analyst will need to discover how users feel about the new or replacement information systems. There are many techniquesRead MoreISAC Introduction ISAC stands for information systems work and analysis of changes. ISAC is the1100 Words   |  5 PagesIntroduction ISAC stands for information systems work and analysis of changes. ISAC is the method used for system development. Such methods are developed in order to improve the quality and efficiency of system development process. The ISAC methodology was developed by a research group at the Swedish royal institute of technology and at the University of Stockholm. Systems descriptions are made and used throughout the system development process. The tools used for system description have an importantRead MoreInformation Systems Analysis And Design1662 Words   |  7 Pages COIT20248: Information Systems Analysis and Design Term1, 2015 Assessment 1 - Systems Development Lecturer: Tutor: Prepared by: Student Name Student ID Contents 1 Introduction 2 2 Approaches to Systems Development 3 3 System Requirements 4 4. Project Cost Benefit Analysis 6 5. Project Schedule 8 6. System Information Requirement Investigation Techniques 9 7. Reflections and Conclusions 10 8. References 11 1 Introduction Aim of the Report: The main focusRead MoreInformation Systems Analysis And Design2008 Words   |  9 PagesCOIT20248: Information Systems Analysis and Design COIS 20025: Systems Development Overview Term2, 2015 Assessment 1 - Systems Development Lecturer: Jha, Meena Tutor: Tao, Aries Prepared by: Your Name: Anand Sagar Koneti Your Student Number: S0268609 Table of Contents 1 Introduction 4 1.1 Objectives 4 2 Approach to systems development 4 2.1 Methodologies 4 2.2 Model 4 2.3 Tools 5 2.4 Techniques 5 Justification for chosen approach 5 3 Systems requirements 6 3.1 Functional requirementsRead MoreAnalysis of Netflix Information Systems2074 Words   |  9 PagesNetflix: Business Success Achieved through Information Systems First formed in 1991, Netflix has become today’s predominant video rental service. They offer a hybrid service allowing DVD delivery by mail as well as streaming movies and TV shows via their company website or access on 200 other devices. Their unique business process has netted them over 16 million subscribers and revenue around $500 million annually. The reason for their growing success can be attributed to a good business modelRead MoreInformation Analysis And Systems Sep 20141184 Words   |  5 PagesGREG CRANITCH Disaster Recovery ACCT71-601 Information Analysis and Systems Sep 2014 JIANI HE 13221506 Table of Contents Introduction 3 Disaster Recovery 3 Cloud Services 4 Models 4 Public Cloud 4 Private Cloud 4 Community Cloud 4 Onsite backup and cloud resources 5 Threats and measures 5 Recommendations 5 Conclusion 5 References 5 â€Æ' Introduction It is not hard to see the rapid growth of computer technology and the common usage on internet services across different industriesRead MoreElectronic Healthcare Information Systems Analysis1348 Words   |  6 PagesDatabases, Electronic Healthcare Information Systems, Data Sets and Data Standards Patient data is crucial to healthcare practice. Having the ability to create, modify, delete, and view patient data is the most important aspect of healthcare. A vital storage mechanism to perform the above functions is a database. A database is essential in development of Electronic Health Record system A database is an organized collection of data saved as a binary-type file on a computer (Sayles, 2013). Binary-typeRead More Information Systems Case Analysis Essay3506 Words   |  15 Pagesvision continues today. Stryker continually improves its systems to develop, produce, and market products that exceed the requirements of customers around the world (Hager, 1993). Value of Information for the Company Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise (FOLDOC). Stryker uses information technologies for internal communications, supply chainRead MoreAdvanced Information Systems Analysis And Design3360 Words   |  14 PagesISM 6124 - ADVANCED INFORMATION SYSTEMS ANALYSIS AND DESIGN QUIZ 1 - FALL SEMESTER 2014 Quiz 1 is a take home, open-book quiz consisting of five questions. The quiz will be posted on the ISM 6124 site in Canvas under Assignments. The quiz will be available for downloading at noon on Wednesday, October 1. You will have one week to work on the quiz. Estimated time required to complete the quiz is 2 to 4 hours. Place all of your answers within the quiz Word document. Read the questions carefully

Friday, May 15, 2020

Contribution and Effect of Stakeholders on the International Business Free Essay Example, 3250 words

The stakeholder theory looks for methodically to undertake the query of which stakeholders be worthy of or do not deserve or necessitate management absorption in the course of assessment of associations among organizations and stakeholders carried out by trade transactions, legitimacy declarations, dependencies, or other claims (Sharplin et al, 1999). Through acknowledgment, assessment, and appraisal of stakeholders and stakeholder associations, organizations would be able to plot a course in a better way in the public and private intentional situations in which they carry out activities, and in doing so, explanation for the variety of associations, duties, and communication in their policy formulation and execution (Daake et al, 2000). Stakeholder theory is administrative in that it reproduces and expresses how directors perform actions relatively than mainly addressing organization economists and theorists. The focal point of stakeholder theory is expressed in two foundation quest ions initially it inquires, what is the most important purpose of the organization? This gives assurance to managers to communicate the communal wisdom of the worth they generate, and what carries its basis stakeholders in cooperation (Alkhafaji, 1989). We will write a custom essay sample on Contribution and Effect of Stakeholders on the International Business or any topic specifically for you Only $17.96 $11.86/page

Wednesday, May 6, 2020

Descartes Claim Of The Universe - 1211 Words

Descartes’ claim of â€Å"I think, therefore I am†, is an attempt to establish a firm foundation for the understanding of the universe and explores the ideas of the self and what we can know to be real. However, there is one major flaw in this approach. That flaw is how we are to create this foundation when before it we had nothing and the paradoxes in the creating definitions of words. His goal is to better understand what he is in order to reestablish the foundations of his understanding of the world around him. This is a normal human behavior to explore the unknown or not well understood. Any explorer that sails the ocean in search of new land may know what land is but new land that was unknown to him/her is a satisfying development in the person s understanding of everything that is real. The modern practice of this behavior includes, but not limited to, an astronomer using space telescopes to look deep into space where light from an ancient universe is arriving at the Earth or an experimental physicist when smashing particles together in hopes to find new and smaller part that makes up the fundamental building blocks of the universe. Descartes hopes to apply his logical process to reveal the fundamental building blocks of the universe that humans can exist in. He also wants to create a fundamental understanding of the way to observe the universe that we can per ceive with the limited senses that we have. He uses this logical process in an attempt to create the foundations ofShow MoreRelatedDescartes Claim Of The Universe1216 Words   |  5 PagesHow Fix a Universe That is Nothing but Paradoxes Descartes’ claim of â€Å"I think, therefore I am†, is an attempt to establish a firm foundation for the understanding of the universe and explores the ideas of the self and what we can know to be real. However, there is one major flaw in this approach. That flaw is how we are to create this foundation when before it we had nothing and the paradoxes in the creating definitions of words. His goal is to better understand what he is in order to reestablishRead MoreDescartes, Descartes And Descartes918 Words   |  4 Pages In Descartes third Meditation, Descartes comes to the posteriori that he is a thing that thinks. According to Descartes all mental operations are thoughts. Some of which include; imagining, sensing, reasoning, hoping, and doubting. Subsequently, he claims that thoughts are constructed of both a formal and an objective reality. In compliance with Descartes’ claims, I will argue that the supposition that the Meditator could potentially exist alone in the universe is possible because thoughts as indicatorsRead MoreWhat Does It All Mean?896 Words   |  4 PagesThe belief in something out of the universe is what helps most people continue on with their day. It may be hard for some to believe that they are only on this planet, living, just to die one day. Therefore, many turn to religion to seek a hope in an afterlife in which they can exist after death. However, believing in most religions means believing in something in charge of the universe. Something, or someone, that is prac tically supernatural, and supremely powerful. Thomas Nagel, in his text WhatRead MoreDualism In Descartes : The Mind And Body Dualism1039 Words   |  5 PagesMind and body dualism can be regarded as one of the most profound segments of Descartes’ legacy. His assertion was that the mind and the body were not the same thing, and that there was a real distinction between the two. For instance, he believed that the mind was indivisible and the body was actually divisible. His reasoning for that contention was simply put. He explained that when the mind imagines, the whole thing does. Not just a certain part. On the other hand, when the body moves, it is notRead MoreTruth as the Goal of Philosophy Essay1255 Words   |  6 Pageseliminating falsity, while others, like Rene Descartes, look for causes to explain effects. A cause and effect argument is called a causal argument. Descartes is interested in logic, one truth progressing to the next. Descartes gives a causal argument for the existence of God in Meditation III. He deals with the effect of the idea of absolute perfection in our minds and rationalizes that the cause is God, therefore proving the existence of God. Descartes believes there are two types of reality:Read MoreSimilarities Between Galen, Paracelsus, Spinoza, And The Modern Medical World917 Words   |  4 PagesChapter 16 Assignment #2 16.3 - 16.6 VOCABULARY: Galen, Cavendish, Paracelsus, Vesalius, Descartes, Scientific Method, Bacon, Spinoza, Pascal 1. Galen. Galen was a physician of Greek descent and was well known for his influences on the medieval medical world. Galen mainly did experiments on animals rather than humans which caused his humanistic generations to be inaccurate. Galen was able to take color of a patient’s urine to be able to tell what was wrong with him/her. 2. Cavendish. Margaret CavendishRead MoreDescartes And Spinoza On Nature Of God1282 Words   |  6 Pages This is certainly the case when it comes to Descartes and Spinoza, who are both adamant that their views provide the correct context and insight on their opinions of God. In Readings in Modern Philosophy by Ariew and Watkins, it is revealed that while both philosophers tend to agree on opinions like God being infinite, there are many reasons why Descartes and Spinoza disagree on the nature of God and their opinion of substance, for example, Descartes believes that there is more than one type ofRead MorePhilosophy: Do We Have Innate Ideas? Essay1491 Words   |  6 PagesDo we have innate ideas? Offer your view with reference to the work of Descartes and Locke I understand the concept of innate ideas alone means ideas that presents our mind at birth. Descartes and Locke both have their own views about innate ideas and their arguments are completely different to each other and the question remain to the human knowledge. Do innate ideas really exist? Descartes does not put experiences to his philosophy like the other philosophers, Bacon and Hobbes. He believes thatRead MoreDescartes and HisThoughts Regarding Dreams Vs Reality731 Words   |  3 PagesIn first mediation Descartes ponders on the idea of what is real and what is a dream; he concludes that anything thing he can doubt is false and therefor a dream. After establishing the existence of the dream world he tries to figure out who is responsible for tricking him into this false world. He ponders on the idea that God could be responsible for tricking him, but quickly disregards that assumption believing that God, who represents everything that is good, could not deceive him; and concludesRead MoreEssay about Descartes Theory of Substance Dualism791 Words   |  4 PagesDescartes Theory of Substance Dualism Throughout the history of man, philosophers have tried to come up with an explanation of where our minds, or consciousness, came from and how we are able to have a nonphysical characteristic of ourselves. Does our physical brain automatically give us nonphysical characteristics like feelings, thoughts, and desires or is there something else there, the mind, that interacts with our bodies and makes us feel, think, and desire? Also, is the mind the

Tuesday, May 5, 2020

Computer Science - Actor Network Theory

Question: Describe about the Computer Science - Actor Network Theory? Answer: Introduction In this modern computing society, every actant is dependent and dominated by other actants and their activities are co-related to each other that help to fulfill the aims and objectives of the assemblage (Schreurs et al. 2013). This particular assignment focuses on two recent computing stories through which concept of actor-network theory can be explained in details by categorizing the actors and network. However, sometimes queries of customers become unanswered due to proper customer service support (Mpazanje, Sewchurran and Brown 2013). Therefore, the collaborations of Twitter with the management of Apple Company help to implant proper IT support system that is considered as software actant to serve their twitter account holder customers via online communication methods. Actor Network Theory: Idea and Concept Concepts of actor-network theory deal with human-machine interactions, and this relationship has evolved the advancement of modern computing greatly. The computing stories analyzed with the concepts of ANT and its helps to identify the actors and network system. Input-Process-Output While talking about the input, process and output model in actor network theory, information input and resources are considered as the major input parameters. At the same time, planning process and planning output within the organizational context will explore the motivations and actions of actors who form elements, linked by associations. Acts on Humans It has seen that in Actor network theory, both human and nonhuman actors are equally treated. This normally described by the principle of generalized symmetry. Both human as well as non human actors are denoted as actants and they provide the shape towards the network by the virtue of their association (Mpazanje, Sewchurran and Brown 2013). Acts on the material environment According to the concept of actor network theory, it demonstrates the interrelation between material and human factors. While human actors represents the material actants, it also explore how these material environment interacts with other actants exists in the network. Acts cultures and structures Considering the actor network theory, it has seen that there are three broad aspects involved in it: actor world, translation and actor network. The term actor world represents the entities, their role, and respective size. While talking about translation, it has seen that this will consider actor culture, actor structure, Problematization, Interessement, Enrollment, and Mobilization. Figure 1: Actor Network Theory (Source: Ruppert, Law and Savage 2013, p 26) Analysis Using of Actor Network Theory (Application Computing News Story 1: Fake Profiles over Social Media Platforms While talking about this computing story, it has become apparent that in this growing technical world, everyone shares everything on the social media platforms such as Facebook, Twitter, and many others. As these events increased day by day, criminal offenses also increased parallel to this. According to Bijker (2012), online platforms are built to develop social and cultural communication, not for these bullshit things. Actor-network theory is also known as sociology of translation or enrollment theory, introduced by Bruno Latour, John Law and Michel Callon in mid-1980s (Bechmann and Lomborg 2013). It is the conceptual framework to explore collective processes by concentrating on the technical and science activities. This theoretical framework is used as guidelines and interpretations of processes to examine the network activities and features. Analyzing on the Case of Culture By analyzing the interactions and interrelationship between the fake profiles in these social media platforms from actor-network theory perspectives, victims are considered as actants, technical security in the social media sites are considered as software actants, and the social media platform is the network (Hughes et al. 2012). Views of different critics and theorists have been adopted to analyze the pros and cons of contemporary computing and Actor Network Theory based debate. However, information and data can be hacked due to the absence of proper security mechanisms. The social media platforms is a broad network channel and involves some amazing features which can be used on the Facebook. Over Facebook, everyone can create an individual account by providing some basic information such as names, address, date of birth and many other things (Pinch et al. 2012). In order to make own identity people put a picture on their profiles and then make a friends circle with close family members and friends. Also, sometimes people forgot to maintain their privacy and share many confidential things over the internet with unknown persons (Douglas et al. 2012). Knowledge Scale The privacy settings of these social media platforms such as firewall web application, encryption, and decryption module are considered as software actants, in this case, is used to the main authenticity of one's identity and his or her personal stuff (Coolhackingtrick.com. 2016). However, the technical actants or software actants mean security settings of the social platform by damaging those and by using some hacking websites such as GETFBHACK.com and the programs of this application, attackers hack the password of the Facebook within one day. They also use Hack Fbook Password, where after entering the id of the victim, the password can be easily traced out (ITV News. 2016). Based on the actor-network theory, these entities are interrelated, and their relationships involve the different actors within a social media platform called as the single network. By analyzing the two computing stories some of the largest issues have come in front of the modern society. According to their guidelines, whoever will try to make fake profiles harass other people have to face challenges and will be punished seriously under criminal justice, and courts act 2015 (Mpazanje, Sewchurran and Brown 2013). Computing News Story 2: Apple Features are Available on Twitter The concept of actants is used to quantify the relationships between the human factors and materials of a process. The network is the integration of semiotic environments and materials of the system and conveys the ideas of the actors' influences. By introducing new iPhones on the market, people have so much interest to buy those amazing gadgets. However, as these advanced phones have so much complex features, customers have many problems to operate these devices (AdWeek. 2016). Therefore, it is the responsibility of the apple authorities to serve those customers by answering their queries. Apple is one of the top leading telecommunication industries of this world and has no such physical outlets everywhere (Business Insider. 2016). Therefore, in order to serve customer services, this organization has taken the initiatives to reach to their customers through online platform Twitter. The attackers make fake accounts with false information of the person they want to attack and post emb arrassing things on their profiles (The Huffington Post UK. 2016). From some recent cases, it has been come to front those girls' photos or videos are shared on the pornographic sites without their concern (ITV News. 2016). These incidents are the greatest curse of those girls' lives and due to these, some of them also tried to commit suicide. Analyzing on the Scale of Culture In order to protect oneself from online offenses and crimes, proper use of the technical security applications of social media platforms can help a lot to get harassed or embarrassed on the societal world and over the internet (De Laat et al.2013). The firewall and encryption technique present in the security protocol can filter and block the HTTP (Hyper Text Transfer Protocol) from web application by controlling its input-output access. After considering the relationships of apple support and Twitter accounts, Twitter account holders are considered as the actants and the apple support channel is considered as the network. By the use of the Twitter account, registered users can read and send short messages (140 characters) which are also known as tweets, however, unregistered users can use this only to read messages (Venturini 2012). Knowledge Scale Apple has made the account on Twitter as @AppleSupport, and their support team responds to the customers' queries by directing the users to the web pages to resolve their issues. This chain support system also reaches to the customers via direct messaging applications (Wired UK. 2016). Apple has enough resources to manage the large volume of customers and their requests over the twitter channel. The IT support system has been considered as software actant where each of its components has owned significances to enhance the managerial functions of the entire network system (AdWeek. 2016). Therefore, authorities of Apple organization use this tool for their customer service, which is a greater benefit for the Twitter account holders (Schreurs et al.2013). Customers also get the tips regarding their new products and services. Most of the queries have come related to the IOS, Apple music store, and Safari browser and by the support of the Twitter account; they answered to the questions ve ry well and obtained greater customer satisfactions. Enhancement Management In the first case, technical security of social media platform has been considered as software actants and theses actants can significantly enhance the managerial functions of computing stories (Ferguson et al. 2013). This firewall web application inspects every data packet inside the network and protects it from various malware and unauthorized access (Buckingham Shum et al. 2013). The organization created it twitter account named as @AppleSupport, where they provide tutorial and tips for its Twitter followers and after launching this, by the next day it has replied to 500 queries and achieved more than 45,000 twitter followers toward their service (Business Insider. 2016). The database management system maintains data quality by restricting the unauthorized access, limits the access to protect confidential information and enforce proper security during the network operations (Kapko 2016). The customer relationship management helps the Apple supporters to provide bets quality servic e regarding the queries of the customers who hold Twitter accounts. Contemporary Debate (Issues) Actor-network theory is used as the reflection of modern computing society. This section is highlighted to describe the advantages and disadvantages contemporary computing in the aspect of actor-network theory. From the knowledge and information perspective, Parasie and Dagiral (2012) stated that contemporary accounting helps to provide suitable information and data to streamline the entire business operations. Conclusion From this assignment, it can be concluded that, every actant of computing stories are impacted by other actants to achieve the aim of assemblage. The two special stories which have discussed for this particular assignment have different hardware and software actants, which are interrelated to each other. While talking about the fake profiles over the social media, the failure of technical security to be considered as software actants that cannot protect victims' lives from unauthorized and fake users. However, in the second case management authority of Apple organization tried to reach to their customers through the support of Twitter accounts. Therefore, in both the cases, actor-network theory covers all the aspects of human phenomenon to no human activities References AdWeek. 2016.Apple Finally Joins Twitter With an Eye Toward Socializing Its Customer Service. [online] Available at: https://www.adweek.com/news/technology/apple-finally-joins-twitter-eye-toward-socializing-its-customer-service-169979 [Accessed 11 Mar. 2016]. Bechmann, A. and Lomborg, S., 2013. Mapping actor roles in social media: Different perspectives on value creation in theories of user participation.New media society,15(5), pp.765-781. Bijker, W.E., Hughes, T.P., Pinch, T. and Douglas, D.G., 2012.The social construction of technological systems: New directions in the sociology and history of technology. MIT press. Business Insider. 2016.Apple's new Twitter account has already helped thousands of users in its first day. [online] Available at: https://www.businessinsider.in/Apples-new-Twitter-account-has-already-helped-thousands-of-users-in-its-first-day/articleshow/51260322.cms [Accessed 11 Mar. 2016]. Coolhackingtrick.com. 2016.Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You Can't! | Cool Hacking Tricks. [online] Available at: https://www.coolhackingtrick.com/2014/02/facebook-hacking-website-truth.html [Accessed 11 Mar. 2016]. ITV News. 2016.'Fake profile' online trolls can now face criminal charges. [online] Available at: https://www.itv.com/news/2016-03-03/fake-profile-online-trolls-can-now-face-criminal-charges/ [Accessed 11 Mar. 2016]. Kapko, M. 2016.Apple launches new @AppleSupport channel on Twitter. [online] CIO. Available at: https://www.cio.com/article/3040863/tech-support/apple-launches-new-applesupport-channel-on-twitter.html [Accessed 11 Mar. 2016]. Mpazanje, F., Sewchurran, K. and Brown, I., 2013. Rethinking Information Systems Projects using Actor-Network TheoryPerspectives from a Developing Country.The Electronic Journal of Information Systems in Developing Countries,58. Parasie, S. and Dagiral, E., 2012. Data-driven journalism and the public good:Computer-assisted-reporters and programmer-journalists in Chicago.New Media Society, p.1461444812463345. Ruppert, E., Law, J. and Savage, M., 2013. Reassembling social science methods: The challenge of digital devices.Theory, Culture Society,30(4), pp.22-46. Schreurs, B., Teplovs, C., Ferguson, R., De Laat, M. and Buckingham Shum, S., 2013, April. Visualizing social learning ties by type and topic: Rationale and concept demonstrator. InProceedings of the Third International Conference on Learning Analytics and Knowledge(pp. 33-37). ACM. The Huffington Post UK. 2016.This Big Part Of Online Trolling Is About To Become Illegal. [online] Available at: https://www.huffingtonpost.co.uk/2016/03/03/internet-trolls-fake-profiles-humiliate-people-criminal-charges-cps_n_9371548.html [Accessed 11 Mar. 2016]. Venturini, T., 2012. Building on faults: how to represent controversies with digital methods.Public Understanding of Science,21(7), pp.796-812. Wired UK. 2016.Apple Support is now available on Twitter (Wired UK). [online] Available at: https://www.wired.co.uk/news/archive/2016-03/03/apple-support-twitter-customer-support [Accessed 11 Mar. 2016]. Wired UK. 2016.Trolls who use fake profiles will face prosecution (Wired UK). [online] Available at: https://www.wired.co.uk/news/archive/2016-03/03/trolls-criminal-prosecution-facebook-twitter [Accessed 11 Mar. 2016].