Technology has revolutionized all aspects of life from socialization, culture, and trade (business). The advancements in technology have continued to make life easier for people. The advancements have also resulted in information systems whose primary asset is data. The numerous information systems working 24/7 around the world churn out millions of gigabytes every day. My main interest in the field of information technology revolves around developing Artificial Intelligence (AI) Systems that can analyze data, learn from it, identify patterns, and make more informed decisions autonomously. This is the field of machine learning. However, I dare to go a bit further and stipulate that my interests are on how machine learning can be used to reinforce the security and enhance the integrity of information systems.
Since data is vastly becoming the most critical asset in the world, it is imperative that the integrity of the data is enhanced and this can be done through securing information systems. As technology continues uninhibited, human beings are increasingly becoming more dependent on technology. People use smart systems to lock their homes, clean their houses, control medical systems, control traffic, and even drive them (smart cars). This high dependence on technology poses a significant risk to all of humanity. If a hacker manages to acquire software that could bypass a self-driving car’s security, the passengers in the car are entirely at his/her mercy. In another instance, if one could hack a hospital’s smart systems, they could cause a lot of damage not to mention the glaring breach of security and privacy. These are some of the reasons why research into the field of machine learning for information systems is imperative.
Furthermore, by engaging with and depending on information technology, humans put their trust in the systems and return, we expect privacy and security. The breach of system security is a glaring threat that seeks to hamper our trust in IT, and a lot needs to be done to rekindle this trust. For example, the iCloud hack of 2017 resulted in a lot of damaging information being leaked and many iPhone users were blackmailed over their private images, messages, and videos. It destroyed numerous reputations, and even in some extents, the victims suffered emotional and psychological abuse. This is a situation that we must strive to remedy. Through using a continuously learning framework, it is increasingly possible for the system to review millions of hacks and learn their style and be better prepared to thwart attacks. The system also can predict attacks and their outcomes, sending early warnings to system administrators before taking action. The fields of machine learning and information systems security have limitless potential in securing data and the systems it interacts with.
My journey and interests in Information Technology began unusually. While I was growing up, technology was something I never encountered. I remember always hearing from my schoolmates how they played video games or used computers, and I was generally disinterested. My parents strived to build a strong work ethic where the only person who I could depend on was me. However, as I joined high school, my interest in cars and the technology behind them began growing, and by senior year, I had visited as many car shows as I could. It is here that I learned about the different technologies and especially Toyota’s Lean manufacturing model and the quest for efficiency. The rise of social media brought about an interest in computer security as I tinkered with different applications trying to test their integrity. It is at this point that I knew I wanted to learn as much about information technology as I could. One of the best ways was acquiring the best education and complimenting it with a lot of practice and interactions with systems and people.
Selecting the best university was a tedious affair since I had to consider many aspects. The first thing I considered was the quality of education and the availability of reliable support systems. I noted that —– university had the best quality education and had adequate support services to aid me in the pursuit of the PhD. The second thing to consider was the ease of accessing the institution and the alternative methods of study available. The third thing I considered was the fee structure and how it would impact my life. Pursuing a PhD is not an easy affair, primarily due to the amount of work needed. Furthermore, the cost of education is also high and therefore, it is prudent that one considers the financial implications of undertaking the program in different institutions. After much considerations, I established that I could manage the cost implications of the programs. It is because of all these reasons why I believe that ——- university will be the best place for me to pursue a PhD in Information Technology.
Over the years, I have noted different strengths and weaknesses. For instance, I happen to be a good researcher. This spans from organizing research studies, selecting suitable research methodology, and conducting data analysis. I am especially good at data analysis, and this is an integral trait even in the pursuit of machine learning. Another strength is a vast experience in reviewing application and network security and the development of applications. This is important in learning machine learning, especially in the context of enhancing network and information systems security. I have also been practicing python skills and learning as much as I can about machine learning and how to develop proper algorithms. I enjoy research since I believe that the best way to advance in any area is to gather as much information about the area, screen the information and provide conclusive summations of the findings. Using this approach, I can review published work and use the insights of other scholars and experts to augment my research, algorithms, and systems. These strengths will help in the successful completion of the program. For instance, through proper research methods, I can publish creative, engaging, and revolutionary papers that will increase people’s understanding of machine learning and its applications.
Aside from the strengths, I have some weaknesses that I have been trying to get a handle on. For instance, I tend to be a perfectionist, and it is not always easy for me to delegate tasks that I find to be of extreme importance. This is my greatest weakness as it may come off to my team-mates as being bossy. I also have trouble speaking in front of big crowds due to stage fright. However, presenting to a panel is not a significant challenge. I have been trying to get assistance in mitigating my weaknesses, and I believe that through constant interactions with faculty and students, I will fare better. These weaknesses will, without a doubt, pose some challenges; however, through my years of studying, I have learned to face my shortcomings and seek assistance in areas where I fall short. I believe that as an independent researcher, some of these weaknesses can be transformed into strengths. I hope to get as much assistance as I need to overcome the challenge of delegating tasks.
Information technology is boundless, and as I understand, it is only going to advance more. The future of IT is in machine learning and neural networks. As we continue growing, I believe that systems will continue developing and becoming more autonomous. Through machine learning and artificial intelligence, humans will interact creatively with systems, issue verbal commands, and even build meaningful relationships with technology. The recent leaps in understanding and advancing quantum computing opens up technology to new untapped horizons. I believe that machine learning and artificial intelligence will be the main avenues that will allow humans to interact with quantum computers. Through the development of robust algorithms and advancing knowledge on machine learning and systems security, the knowledge can be scaled up to secure virtually all systems on the planet.
I see myself as a critical influence in this area. The pursuit of the PhD program is founded on my deep interest and fascination with machine learning and information system security. I hope that my research will provide a solid foundation for other scholars and developers who want to dabble in machine learning. I will also strive to develop algorithms in a controlled environment before deploying them to test for their efficiency in the real world. There is also a probability of developing algorithms that use machine learning to control application and security testing environment to be used by developers. I think that this industry is primed and ready to accept and integrate machine learning into information systems and networks.
After obtaining my PhD from University, I will continue researching and teaching others about machine learning. I will work since I believe that my insights should not just be confined to research; they should be shared with the world. Furthermore, by taking up work, I can actively test different aspects of machine learning’s interaction with people and existing systems. It would provide for exciting research that will benefit the scientific community. Thank you in advance for your consideration.At discussion board homework help, we can complete your assignment as from $12 per page.
Also Read: What Are The Different Sections On Reddit.