Introduction 1
Brainstorming method 1
The cause and effects 1
Brainstorming strategy 2
Checklists techniques 2
5 Whys methods 3
Impact diagrams 4
Conclusion 4
References 5
Introduction
The introduction of information technology (IT) has brought a great change in the business world, for instance, the use of computers has facilitated the global business by linking the people together hence advanced business transactions and communication globally. Although the introduction of IT facilitated global business interaction accompanied with other advantages. There has been a real problem ensuring efficient use of IT due to various problems associated with it, thus challenging various scientists to discover techniques on how to solve such problems. Therefore, by views arguments on different methods of solving problems, the following points are more applicable; it is very important to discover the cause and the effect of the problem, the application of brainstorming may easily help in correcting the problem. Checklists, impact diagrams and the“5-whys” strategy is also applicable in solving any IT problem (Johnson, 2005, pp. 213-215).
Brainstorming method
The key method of this paper is brainstorming; According to Johnson, 2005, pp. 213-215, it is more useful when a group of people gathers to discuss a certain issue by sharing ideas from each other through giving suggestions on how to solve the issue on hand. For example, a computer might be having a problem of connecting to the Internet, by coming together as a group it may be easier to solve such a problem; the problem might be usage of unregistered broadband transmitter with a specific Internet service provider or incorrect Internet software. Therefore, sharing with others the problem may easily be tacked (Doyle, 2001, pp. 120-130).
The cause and effects
By considering different causes and effect, it may be possible to solve the IT problems, for instance, if a
References: Terrell Ward (2008).Machine Ethics, Cambridge: Cambridge University Press, 2nd ed., pp. 107-145. Christakis Hardson (2009). “The effects of infant media usage: what do we know and what should we learn?” ActaPædiatrica, 3rd eds., pp. 8–16. Ivory John (2006). “Still a Man 's Game: Gender Representation in Online Reviews of Video Games,” Mass Communication and Society, 2nd eds., pp. 103–114. Johansson Raymond (2009). “Why unreal punishments in response to unreal crimes might actually be a really good thing,” Ethics and Information Technology, 4th eds., pp. 71–79. Johnson Mike (2005). Computer Ethics, Englewood Cliffs, New Jersey: Prentice Hall. 2nd ed., pp. 213-215. Ledin Gordon (2005). “Not Teaching Viruses and Worms is Harmful” Communications of the ACM, 2th eds., pp. 144-160. Doyle John (2001). "Information literacy in an information society: A concept for the information age." Syracuse, NY: ERIC Clearinghouse on Information & Technology. 3rd eds., pp. 120-130. Garland Mike (2005). The information search process: A study of elements associated with meaningful research tasks. "School Libraries Worldwide,” 2nd eds., pp. 41-53