Integrated Professional Skills in Digital Age
VerifiedAdded on 2023/06/08
|11
|3948
|143
AI Summary
This report discusses collaborative tools, cloud storage, privacy and security challenges in the digital age. It identifies potential privacy and security challenges and measures to protect digital assets. Advantages and disadvantages of cloud computing and storage are also discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated Professional
Skills in Digital Age
Skills in Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Identification of collaborative tools along with discussion about how they can help companies
during the global pandemic....................................................................................................1
Discussing advantages along with disadvantages and suitability along with application of
cloud storage with computing improved digitalisation..........................................................3
Identification of privacy along with security challenges through measuring potential which
should in consider by the individual along with establishment that can protect digital assets5
Discussing bubble bursting procedure about cryptocurrency along with its justification......8
CONCLUSION................................................................................................................................8
REFERENCES................................................................................................................................9
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Identification of collaborative tools along with discussion about how they can help companies
during the global pandemic....................................................................................................1
Discussing advantages along with disadvantages and suitability along with application of
cloud storage with computing improved digitalisation..........................................................3
Identification of privacy along with security challenges through measuring potential which
should in consider by the individual along with establishment that can protect digital assets5
Discussing bubble bursting procedure about cryptocurrency along with its justification......8
CONCLUSION................................................................................................................................8
REFERENCES................................................................................................................................9
INTRODUCTION
Information and communication technology broaden for information technology (IT)
sector. ICT is also used for the digital convergence of audiovisual with the telephonic network
with a single cable connection. It provides all communication technologies which includes
wireless network, internet, telephones, computers and laptops. Through these platform people
can connect with each other from different countries. Video conferencing, social networking and
media application gives many opportunities to people by which they can use it in better way. It’s
necessary to use and understanding different information in better way that can help to improve
the information and communication technology with consideration. In this report, there is
discussion about understanding about the collaborative tools at the workplace (Verma and Sheel,
2022). There is also discussion about the cloud computing along with e-commerce at the modern
workplace. There is also discussion about privacy concern along with security threats which
include the business organisation through using internet. There is also discussion about the
bubble bursting procedure including cryptocurrency in market.
MAIN BODY
Identification of collaborative tools along with discussion about how they can help companies
during the global pandemic
Collaborative tool can be effective and allow to provide better and effective response
about effective user with the purpose of supporting group of individuals to achieve the common
goals. This can include the form of application software that allows their employee to work
collaboratively with sharing their knowledge with other individual on virtual basis. These are the
collaborative tools that can allow to perform the organisational tasks from anywhere on a remote
basis. It can also help to store different document in cloud that can allow to get access from
anywhere.
These are the collaborative tools that can be effective and allow to provide better impact on
employee through reducing their downtime and allow to enhance their productivity (Kiedrowicz
and Stanik, 2018). Through using this virtual collaborative tool, it can allow to improve the
communication channels and improvised it effectively. during the global pandemic and during
the lockdown, there were many organisations who like to use this virtual collaborative software
which enable to connect with their employees with strategic manner. There are two collaborative
1
Information and communication technology broaden for information technology (IT)
sector. ICT is also used for the digital convergence of audiovisual with the telephonic network
with a single cable connection. It provides all communication technologies which includes
wireless network, internet, telephones, computers and laptops. Through these platform people
can connect with each other from different countries. Video conferencing, social networking and
media application gives many opportunities to people by which they can use it in better way. It’s
necessary to use and understanding different information in better way that can help to improve
the information and communication technology with consideration. In this report, there is
discussion about understanding about the collaborative tools at the workplace (Verma and Sheel,
2022). There is also discussion about the cloud computing along with e-commerce at the modern
workplace. There is also discussion about privacy concern along with security threats which
include the business organisation through using internet. There is also discussion about the
bubble bursting procedure including cryptocurrency in market.
MAIN BODY
Identification of collaborative tools along with discussion about how they can help companies
during the global pandemic
Collaborative tool can be effective and allow to provide better and effective response
about effective user with the purpose of supporting group of individuals to achieve the common
goals. This can include the form of application software that allows their employee to work
collaboratively with sharing their knowledge with other individual on virtual basis. These are the
collaborative tools that can allow to perform the organisational tasks from anywhere on a remote
basis. It can also help to store different document in cloud that can allow to get access from
anywhere.
These are the collaborative tools that can be effective and allow to provide better impact on
employee through reducing their downtime and allow to enhance their productivity (Kiedrowicz
and Stanik, 2018). Through using this virtual collaborative tool, it can allow to improve the
communication channels and improvised it effectively. during the global pandemic and during
the lockdown, there were many organisations who like to use this virtual collaborative software
which enable to connect with their employees with strategic manner. There are two collaborative
1
tools which are effective and allow to be used in the workplace that can allow to get better
connect with regards with better examples of Boohoo Group Plc along with Deliveroo that are
going to be discussed further.
Slack refers to a workplace communication tool that includes the instant messaging system
and have the potential to provide two different methods that can allow employees to
communicate with each other along with their superiors within the formal settings. It helps to
organise the organisational conversation in the better manner through sharing employee ideas to
making better decision. It can help team members to perform well and concentrate on their
culture that can allow to enhance their working performance and enable them in increasing the
organisational productivity. For example, Deliveroo is food delivery service organisation which
uses the slack to effectively control and organise their business operation in better way with
distributing their workforce effectively. Here, slack provides numerous application software that
allow to integrate with the workforce remotely. Slack is also used in the Airbnb which allow
manager to get connect with their third parties in better and strategic manner.
Slack huddles can also provide alternative for the video calls which provide great experience
to organisational manager to effectively interacting with staff members or their employees along
with their external clients.
Webex is another collaborative tools which have different features like video, audio along
with content sharing opportunity to their user. This can help to provide better experience to their
user which can allow organisation members to get engage in their meetings. It also offers
seamless experience to their user which can enable to use in better manner and allow to perform
their activities more effectively. It allows the team member to collaborate with each other in
more effective way and allow to provide better experience and enhance their productivity. It can
help organisation to establish better relationship with each other even from the remote area and
effectively strengthen the business relationships (Neumayr and et. al., 2018). There are number
of organisation that are perform well through using these collaborative tools and allow to
schedule their meeting in better manner. It also enables manger to perform well and allow to
perform in better way. This can also help them to transfer files with other and remove unwanted
attendees in instant basis.
Moreover, Webex also allow in screen sharing and cloud recording with storage. It also
helps to perform well and enable to use different features like digital white boarding that can
2
connect with regards with better examples of Boohoo Group Plc along with Deliveroo that are
going to be discussed further.
Slack refers to a workplace communication tool that includes the instant messaging system
and have the potential to provide two different methods that can allow employees to
communicate with each other along with their superiors within the formal settings. It helps to
organise the organisational conversation in the better manner through sharing employee ideas to
making better decision. It can help team members to perform well and concentrate on their
culture that can allow to enhance their working performance and enable them in increasing the
organisational productivity. For example, Deliveroo is food delivery service organisation which
uses the slack to effectively control and organise their business operation in better way with
distributing their workforce effectively. Here, slack provides numerous application software that
allow to integrate with the workforce remotely. Slack is also used in the Airbnb which allow
manager to get connect with their third parties in better and strategic manner.
Slack huddles can also provide alternative for the video calls which provide great experience
to organisational manager to effectively interacting with staff members or their employees along
with their external clients.
Webex is another collaborative tools which have different features like video, audio along
with content sharing opportunity to their user. This can help to provide better experience to their
user which can allow organisation members to get engage in their meetings. It also offers
seamless experience to their user which can enable to use in better manner and allow to perform
their activities more effectively. It allows the team member to collaborate with each other in
more effective way and allow to provide better experience and enhance their productivity. It can
help organisation to establish better relationship with each other even from the remote area and
effectively strengthen the business relationships (Neumayr and et. al., 2018). There are number
of organisation that are perform well through using these collaborative tools and allow to
schedule their meeting in better manner. It also enables manger to perform well and allow to
perform in better way. This can also help them to transfer files with other and remove unwanted
attendees in instant basis.
Moreover, Webex also allow in screen sharing and cloud recording with storage. It also
helps to perform well and enable to use different features like digital white boarding that can
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
help manger to share their presentation from the remote area. For example, Boohoo Group Plc
uses Webex to organise their meeting for discussion their designs and other business aspects.
Webex has performed well and allow different business organisation to run their business even in
the pandemic where there was the situation of lockdown. It allows to maintain business operation
even from the remote area.
Discussing advantages along with disadvantages and suitability along with application of cloud
storage with computing improved digitalisation
Clound computing refers to the general term which include the delivering hosted services
through the internet. It can understand as the practices that are used by the business organisation
for hosting different servers for managing their large data in better and effective manner. This
can help in significant establishments for protecting their data along with system from any type
of cyber theft and can be considered effective in the continuous planning. It is vital and should be
considered in the assessing the vital signs that can help to minimise downtime along with
enhancing the productivity. It also enables employees to get flexible with their working that can
help in getting connected with the virtual workplace in better and effective manner.
Whereas, cloud storage can be considering as the computing model which are effective and
enable to stockpiling different information in strategic manner. Here, user can store and upload
along with retrieve their data set when necessary. Evaluation of limitation, benefits, application
and suitability for cloud computing and storage are discussed further.
Basis of difference Cloud computing Cloud storage
Meaning Cloud computing provide different
service from internet like
networking, servers along with
software (Kühn and Schlegel,
2018).
Cloud storage offer for the storage
and allow to store data for the future
use which also a part of the cloud
computing.
Benefits Cloud computing can be
considering as beneficial which
also include in the aid organisation
which allow to update the system
and software through automatic
process. For example, Boohoo
It include diffenret benefits which
should be considered by the
managers of the organisation for the
effective working. It allow to
update the data on the remote basis
along with providing synching. For
3
uses Webex to organise their meeting for discussion their designs and other business aspects.
Webex has performed well and allow different business organisation to run their business even in
the pandemic where there was the situation of lockdown. It allows to maintain business operation
even from the remote area.
Discussing advantages along with disadvantages and suitability along with application of cloud
storage with computing improved digitalisation
Clound computing refers to the general term which include the delivering hosted services
through the internet. It can understand as the practices that are used by the business organisation
for hosting different servers for managing their large data in better and effective manner. This
can help in significant establishments for protecting their data along with system from any type
of cyber theft and can be considered effective in the continuous planning. It is vital and should be
considered in the assessing the vital signs that can help to minimise downtime along with
enhancing the productivity. It also enables employees to get flexible with their working that can
help in getting connected with the virtual workplace in better and effective manner.
Whereas, cloud storage can be considering as the computing model which are effective and
enable to stockpiling different information in strategic manner. Here, user can store and upload
along with retrieve their data set when necessary. Evaluation of limitation, benefits, application
and suitability for cloud computing and storage are discussed further.
Basis of difference Cloud computing Cloud storage
Meaning Cloud computing provide different
service from internet like
networking, servers along with
software (Kühn and Schlegel,
2018).
Cloud storage offer for the storage
and allow to store data for the future
use which also a part of the cloud
computing.
Benefits Cloud computing can be
considering as beneficial which
also include in the aid organisation
which allow to update the system
and software through automatic
process. For example, Boohoo
It include diffenret benefits which
should be considered by the
managers of the organisation for the
effective working. It allow to
update the data on the remote basis
along with providing synching. For
3
Group Plc have the e-commerce
system which updated on the
regular basis. It allows to work in
collaborative manner for enhancing
the communication channels within
establishment.
example, Deliveroo manger are able
to share thier information to their
clients some document through
using the cloud computing
strategically (Andersson and Mutlu,
2020).
Limitation There are some disadvantages that
needs to be undertaken through the
managers of the organisation like
account hijack, data loss along with
technological vulnerabilities. For
examples, Deliveroo has
experienced the loss of their
customer information during saving
that information on cloud through
cyber-attack.
Cloud storage have also some of the
limitations which include the
security along with privacy concern
with some providers. There are
some of the software which requires
constant connectivity of internet
during storing information on cloud
in better and effective manner. For
example, Deliveroo also face some
issues in maintaining information
along with security for their
customers.
Suitability Cloud computing is also effective
and can be essential for the
organisation which can include
sorting of vast information towards
their employees and customers in
organised way. For example,
Deliveroo mangers store along with
assimilate their customer
information effectively (Van Twist
and et. al., 2022).
Clound storage is suitable for the
Deliveroo which provide better and
large online food business which
include tremendous data set to
perform the business operations in
better way. This can allow to
manage those business more
effectively.
Application Cloud computing can be effective
and allow to provide better offer to
the organisation managers to
Here, cloud storage can be
effectively adopted within the
organisation for storing data and
4
system which updated on the
regular basis. It allows to work in
collaborative manner for enhancing
the communication channels within
establishment.
example, Deliveroo manger are able
to share thier information to their
clients some document through
using the cloud computing
strategically (Andersson and Mutlu,
2020).
Limitation There are some disadvantages that
needs to be undertaken through the
managers of the organisation like
account hijack, data loss along with
technological vulnerabilities. For
examples, Deliveroo has
experienced the loss of their
customer information during saving
that information on cloud through
cyber-attack.
Cloud storage have also some of the
limitations which include the
security along with privacy concern
with some providers. There are
some of the software which requires
constant connectivity of internet
during storing information on cloud
in better and effective manner. For
example, Deliveroo also face some
issues in maintaining information
along with security for their
customers.
Suitability Cloud computing is also effective
and can be essential for the
organisation which can include
sorting of vast information towards
their employees and customers in
organised way. For example,
Deliveroo mangers store along with
assimilate their customer
information effectively (Van Twist
and et. al., 2022).
Clound storage is suitable for the
Deliveroo which provide better and
large online food business which
include tremendous data set to
perform the business operations in
better way. This can allow to
manage those business more
effectively.
Application Cloud computing can be effective
and allow to provide better offer to
the organisation managers to
Here, cloud storage can be
effectively adopted within the
organisation for storing data and
4
perform well and help in getting
better use of infrastructure for their
client which can also help in
hosting services more effectively.
For example, Deliveroo uses the
cloud computing which applies
these strategically with using
various software.
information for the longer duration
or lifetime. For example- Deliveroo
uses this software in better and
effective manner which are
associated with taking care of the
business interest.
Identification of privacy along with security challenges through measuring potential which
should in consider by the individual along with establishment that can protect digital assets
Internet can be considering as helpful which can help in creating vibrant marketplace that include
different transactions for selling and buying in better manner. Moreover, internet is also used for
different unique features which include the entertainment platforms along with keeping informed
about the dynamic changes within the world. It also faces different challenges in respect of
individual and businesses. There are various cyber criminals that can attack the organisational
system and may steal the confidential information where privacy along with security challenges
are measure concern and are discussed further.
Here, individual may get ask to make their account even it is not necessary. Here,
personal information is asked by the account which can be used for formulating promotion plans.
There are many time when these are the process gets frustrating for the individual need to login
every when they like to get access to use those (Dvojmoč, 2019). There is another issues which
are generally faced by any individual is that they need to reach the customer services due to
forget their password. This create the burden for them which lead to make and use of simple
password to easily remember it. Here, data privacy refers as another concern where personal
information is leaked due to signing up on different websites.
Privacy along with security challenges in context to business
Phishing attacks- This refers to the cybersecurity attack where malicious actors send
some messages which treated as the trusted person or entity and lead to create some negative
impact. This is the practice in which one individual cyber attackers send fraud information
through using different reputed sources (Andrzejewski, 2020). This can be phishing attacks
5
better use of infrastructure for their
client which can also help in
hosting services more effectively.
For example, Deliveroo uses the
cloud computing which applies
these strategically with using
various software.
information for the longer duration
or lifetime. For example- Deliveroo
uses this software in better and
effective manner which are
associated with taking care of the
business interest.
Identification of privacy along with security challenges through measuring potential which
should in consider by the individual along with establishment that can protect digital assets
Internet can be considering as helpful which can help in creating vibrant marketplace that include
different transactions for selling and buying in better manner. Moreover, internet is also used for
different unique features which include the entertainment platforms along with keeping informed
about the dynamic changes within the world. It also faces different challenges in respect of
individual and businesses. There are various cyber criminals that can attack the organisational
system and may steal the confidential information where privacy along with security challenges
are measure concern and are discussed further.
Here, individual may get ask to make their account even it is not necessary. Here,
personal information is asked by the account which can be used for formulating promotion plans.
There are many time when these are the process gets frustrating for the individual need to login
every when they like to get access to use those (Dvojmoč, 2019). There is another issues which
are generally faced by any individual is that they need to reach the customer services due to
forget their password. This create the burden for them which lead to make and use of simple
password to easily remember it. Here, data privacy refers as another concern where personal
information is leaked due to signing up on different websites.
Privacy along with security challenges in context to business
Phishing attacks- This refers to the cybersecurity attack where malicious actors send
some messages which treated as the trusted person or entity and lead to create some negative
impact. This is the practice in which one individual cyber attackers send fraud information
through using different reputed sources (Andrzejewski, 2020). This can be phishing attacks
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
which can impact business operations in negative way and lead to loss of money, intellectual
property, confidential information and many more. It also leads to create disruption towards the
operational activities. There are various companies over the globe who suffers from such type of
data breach which can lead to create disruption through the phishing attack. There can also some
cases in which employees conduct this data breach that can relates with the phishing attack that
are done by the employees and are apart from the phisher due to they are having all the
information about it along with having login id and password. For example, there was a case in
which official website of British Airways were diverted towards the fraudulent site through
phishers. Having personal information of their 50,000 customers which was also high impact
their life.
There are various ways through which phishing attack are done that may include clone
phishing, e-mail along with domain spoofing. Through using the e-mail phishing, attackers are
able to get individual personal information which are generally used to conduct any crime or any
customers related establishment harm. This can lead to impact the business operation and their
outcomes (Shah and Sengupta, 2020). Cloning phishing can also refer as the digital attack which
conclude cloning of actual e-mail message and are replaced it by malicious one through using the
strategic manner. This can lead to create stealing of personal information about the business that
impact the business operation and related activities. Domain spoofing include the spoofing of the
specified organisation which are effective and may lead to create impact on the specified
organisation which include the individual messages through legitimate company.
Weak password- It is necessary to use better password which create difficulty for people
or fraudster to get and provide high level of security to deliver better and effective response
towards the care of personal information or data. Here, it creates difficulty in dealing with better
and effective information where weak password is easy to identity and create high risk of cyber-
attack (Rahim and et. al., 2020). This can allow to easily steal their confidential data or
information. This also enhance individual about getting better security to maintain the data and
security. Weak or simple password allow to breach easily and provide better aspect for cyber
attacker to conduct crime through stealing data or information. For example- Deliveroo may face
such type of attack during performing their business operations. This can also create difficulty in
providing better security to data or information which not beneficial for the company.
6
property, confidential information and many more. It also leads to create disruption towards the
operational activities. There are various companies over the globe who suffers from such type of
data breach which can lead to create disruption through the phishing attack. There can also some
cases in which employees conduct this data breach that can relates with the phishing attack that
are done by the employees and are apart from the phisher due to they are having all the
information about it along with having login id and password. For example, there was a case in
which official website of British Airways were diverted towards the fraudulent site through
phishers. Having personal information of their 50,000 customers which was also high impact
their life.
There are various ways through which phishing attack are done that may include clone
phishing, e-mail along with domain spoofing. Through using the e-mail phishing, attackers are
able to get individual personal information which are generally used to conduct any crime or any
customers related establishment harm. This can lead to impact the business operation and their
outcomes (Shah and Sengupta, 2020). Cloning phishing can also refer as the digital attack which
conclude cloning of actual e-mail message and are replaced it by malicious one through using the
strategic manner. This can lead to create stealing of personal information about the business that
impact the business operation and related activities. Domain spoofing include the spoofing of the
specified organisation which are effective and may lead to create impact on the specified
organisation which include the individual messages through legitimate company.
Weak password- It is necessary to use better password which create difficulty for people
or fraudster to get and provide high level of security to deliver better and effective response
towards the care of personal information or data. Here, it creates difficulty in dealing with better
and effective information where weak password is easy to identity and create high risk of cyber-
attack (Rahim and et. al., 2020). This can allow to easily steal their confidential data or
information. This also enhance individual about getting better security to maintain the data and
security. Weak or simple password allow to breach easily and provide better aspect for cyber
attacker to conduct crime through stealing data or information. For example- Deliveroo may face
such type of attack during performing their business operations. This can also create difficulty in
providing better security to data or information which not beneficial for the company.
6
Insider threat- This is the one which create security risk to the organisation and may
create threat for company from their own employees or former employees, business associated or
other (Kamal and et. al., 2020). For example, any employee can steel confidential information
about the company and share it with other competitors which may lead to create business loss to
the organisation. Here, many companies have already suffered such type of insider threat which
lead to lose their customer trust along with company reputation effectively. Here is a case of
Marriott Hotels in which they have faced such type of attack by cyber criminals where about 5.2
million record of guest were stolen.
Potential measure that can take by businesses or individual to protect them from
different issues.
Train staff members effectively- Employee are one of the main target or vehicle
through which cyber attacker attack to any organisation or company (Patil and et. al., 2022). In
this, criminal target any employee who are highly effective in the organisation and have high
authority to access to different data or information which are required by the cyber criminals.
Here, every individual should use their common sense before getting clicking to any link which
are not normal. This can help to avoid any risk which are associated with any breach. Here,
employees of British Airways should have provided proper training that could have helped to
avoid such type of data breaching within their company.
Keep software updated- With time cybercriminal find some ways to breach the
software. To avoid such type of case each and every company should take care of their
performance and should include better practices toward proper safety to their data and
information by updating their software on regular basis. This can be effective for the organisation
to ensure about their data protection through updating their system (Wang and et. al., 2018).
Data backup- Getting backup of data can be highly effective that can help to secrure that
data and should avoid the risk of downtime loss. This can also help to save from financial loss
along with serious downtime. For example, Deliveroo managers keep their data backup
strategically which help to avoid any risk of loss with relevant information which are also
associated with cyber-attacks.
Every individual should also take care about the online transaction through ensuring
about the secure password. It is also need to ensure about clicking on any link without get ensure
7
create threat for company from their own employees or former employees, business associated or
other (Kamal and et. al., 2020). For example, any employee can steel confidential information
about the company and share it with other competitors which may lead to create business loss to
the organisation. Here, many companies have already suffered such type of insider threat which
lead to lose their customer trust along with company reputation effectively. Here is a case of
Marriott Hotels in which they have faced such type of attack by cyber criminals where about 5.2
million record of guest were stolen.
Potential measure that can take by businesses or individual to protect them from
different issues.
Train staff members effectively- Employee are one of the main target or vehicle
through which cyber attacker attack to any organisation or company (Patil and et. al., 2022). In
this, criminal target any employee who are highly effective in the organisation and have high
authority to access to different data or information which are required by the cyber criminals.
Here, every individual should use their common sense before getting clicking to any link which
are not normal. This can help to avoid any risk which are associated with any breach. Here,
employees of British Airways should have provided proper training that could have helped to
avoid such type of data breaching within their company.
Keep software updated- With time cybercriminal find some ways to breach the
software. To avoid such type of case each and every company should take care of their
performance and should include better practices toward proper safety to their data and
information by updating their software on regular basis. This can be effective for the organisation
to ensure about their data protection through updating their system (Wang and et. al., 2018).
Data backup- Getting backup of data can be highly effective that can help to secrure that
data and should avoid the risk of downtime loss. This can also help to save from financial loss
along with serious downtime. For example, Deliveroo managers keep their data backup
strategically which help to avoid any risk of loss with relevant information which are also
associated with cyber-attacks.
Every individual should also take care about the online transaction through ensuring
about the secure password. It is also need to ensure about clicking on any link without get ensure
7
about the safety that can lead to cyber-attack. One wrong click can lead to loss of data or
information which may lead to high financial loss (Liu and et. al., 2021).
Discussing bubble bursting procedure about cryptocurrency along with its justification
Cryptocurrency is one of the form of virtual currency that can be used for the payment. It
was created through using the encryption algorithms. Using this encryption technology allow to
use those as the digital accounting system which are highly effective and allow to provide better
payment option.
In finance meaning, bubble can be defined as the state in which asset remains stable for
longer time period with continuous growth. Here, price get higher as the skyrockets. Whereas,
burst may have explained as that assets price get drop quickly in comparison to their rise. Due to
this combination or bubble burst lead to create high risk to use the cryptocurrency which is also a
standard payment system and lead to riskiest sources for the national company towards the verge.
For example, Bitcoin get fell down within few months which lead to create the bubble burst.
Here, stable coins lead to consider as sure source with include crypto world which lead to cover
the large percentage of trading volumes toward the digital assets. Moreover, token is also used
for the exchange process which include the payments and other relevant activities that are
typically based on the block chain technology. Market analysis also include the rise along with
fall in the Ethereum and Bitcoins prices which doesn’t considered as the bubble bursting and
have verge of inflation hedge (Paul and et. al., 2022).
CONCLUSION
From the above discussion, it can have concluded that information and communication
technology plays an important role in performing business operation which can lead to create
high impact on the business operations. Here, collaborative tools tool should be included by the
organisational managers that can help to solve the complex problem and help employee to work
from remote area. This collaborative tool includes Slack along with Webex. There is discussion
about the security along with privacy issues like weak password, phishing attack along with
insider threats. There is also discussion about the cloud computing along with cloud storage.
There is also discussion about the cryptocurrencies which is riskiest market investment and
should be done through critical evaluation effectively.
8
information which may lead to high financial loss (Liu and et. al., 2021).
Discussing bubble bursting procedure about cryptocurrency along with its justification
Cryptocurrency is one of the form of virtual currency that can be used for the payment. It
was created through using the encryption algorithms. Using this encryption technology allow to
use those as the digital accounting system which are highly effective and allow to provide better
payment option.
In finance meaning, bubble can be defined as the state in which asset remains stable for
longer time period with continuous growth. Here, price get higher as the skyrockets. Whereas,
burst may have explained as that assets price get drop quickly in comparison to their rise. Due to
this combination or bubble burst lead to create high risk to use the cryptocurrency which is also a
standard payment system and lead to riskiest sources for the national company towards the verge.
For example, Bitcoin get fell down within few months which lead to create the bubble burst.
Here, stable coins lead to consider as sure source with include crypto world which lead to cover
the large percentage of trading volumes toward the digital assets. Moreover, token is also used
for the exchange process which include the payments and other relevant activities that are
typically based on the block chain technology. Market analysis also include the rise along with
fall in the Ethereum and Bitcoins prices which doesn’t considered as the bubble bursting and
have verge of inflation hedge (Paul and et. al., 2022).
CONCLUSION
From the above discussion, it can have concluded that information and communication
technology plays an important role in performing business operation which can lead to create
high impact on the business operations. Here, collaborative tools tool should be included by the
organisational managers that can help to solve the complex problem and help employee to work
from remote area. This collaborative tool includes Slack along with Webex. There is discussion
about the security along with privacy issues like weak password, phishing attack along with
insider threats. There is also discussion about the cloud computing along with cloud storage.
There is also discussion about the cryptocurrencies which is riskiest market investment and
should be done through critical evaluation effectively.
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES
Books and Journals
Andersson, H. and Mutlu, A., 2020. Digital collaboration tools-What types of frustrations do
managers experience?.
Andrzejewski, K., 2020. Security Management Information System (No. 2641). EasyChair.
Dvojmoč, M., 2019. Corporate intelligence as the new reality: The necessity of corporate
security in modern global business. Journal of Criminal Justice and Security, (2), pp.205-
223.
Kamal, A.H.A., Yen, C.C.Y., Ping, M.H. and Zahra, F., 2020. Cybersecurity Issues and
Challenges during Covid-19 Pandemic.
Kiedrowicz, M. and Stanik, J., 2018. An information system risk model for the risk management
system of an organisation processing sensitive data. Zarządzanie i Finanse, 16(3).
Kühn, R. and Schlegel, T., 2018, September. Mixed-focus collaboration activities for designing
mobile interactions. In Proceedings of the 20th International Conference on Human-
Computer Interaction with Mobile Devices and Services Adjunct (pp. 71-78).
Liu, X., Barenji, A.V., Li, Z., Montreuil, B. and Huang, G.Q., 2021. Blockchain-based smart
tracking and tracing platform for drug supply chain. Computers & Industrial
Engineering, 161, p.107669.
Neumayr, T., Jetter, H.C., Augstein, M., Friedl, J. and Luger, T., 2018. Domino: A descriptive
framework for hybrid collaboration and coupling styles in partially distributed
teams. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), pp.1-24.
Patil, R.R., Kaur, G., Jain, H., Tiwari, A., Joshi, S., Rao, K. and Sharma, A., 2022. Machine
learning approach for phishing website detection: A literature survey. Journal of Discrete
Mathematical Sciences and Cryptography, 25(3), pp.817-827.
Paul, T., Islam, N., Mondal, S. and Rakshit, S., 2022. RFID-integrated blockchain-driven circular
supply chain management: A system architecture for B2B tea industry. Industrial
Marketing Management, 101, pp.238-257.
Rahim, R., Murugan, S., Mostafa, R.R., Dubey, A.K., Regin, R., Kulkarni, V. and
Dhanalakshmi, K.S., 2020. Detecting the Phishing Attack Using Collaborative Approach
and Secure Login through Dynamic Virtual Passwords. Webology, 17(2).
Shah, Y. and Sengupta, S., 2020, October. A survey on Classification of Cyber-attacks on IoT
and IIoT devices. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics &
Mobile Communication Conference (UEMCON) (pp. 0406-0413). IEEE.
Van Twist, A., Melenhorst, M., Veenstra, M., Ruijer, E., Kolk, M. and Meijer, A., 2022, January.
Designing Guidelines for Smart City Collaboration Tools. In Proceedings of the 55th
Hawaii International Conference on System Sciences.
Verma, S. and Sheel, A., 2022. Blockchain for government organizations: past, present and
future. Journal of Global Operations and Strategic Sourcing.
Wang, H., Wang, Y., Cao, Z., Li, Z. and Xiong, G., 2018, August. An overview of blockchain
security analysis. In China Cyber Security Annual Conference (pp. 55-72). Springer,
Singapore.
9
Books and Journals
Andersson, H. and Mutlu, A., 2020. Digital collaboration tools-What types of frustrations do
managers experience?.
Andrzejewski, K., 2020. Security Management Information System (No. 2641). EasyChair.
Dvojmoč, M., 2019. Corporate intelligence as the new reality: The necessity of corporate
security in modern global business. Journal of Criminal Justice and Security, (2), pp.205-
223.
Kamal, A.H.A., Yen, C.C.Y., Ping, M.H. and Zahra, F., 2020. Cybersecurity Issues and
Challenges during Covid-19 Pandemic.
Kiedrowicz, M. and Stanik, J., 2018. An information system risk model for the risk management
system of an organisation processing sensitive data. Zarządzanie i Finanse, 16(3).
Kühn, R. and Schlegel, T., 2018, September. Mixed-focus collaboration activities for designing
mobile interactions. In Proceedings of the 20th International Conference on Human-
Computer Interaction with Mobile Devices and Services Adjunct (pp. 71-78).
Liu, X., Barenji, A.V., Li, Z., Montreuil, B. and Huang, G.Q., 2021. Blockchain-based smart
tracking and tracing platform for drug supply chain. Computers & Industrial
Engineering, 161, p.107669.
Neumayr, T., Jetter, H.C., Augstein, M., Friedl, J. and Luger, T., 2018. Domino: A descriptive
framework for hybrid collaboration and coupling styles in partially distributed
teams. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), pp.1-24.
Patil, R.R., Kaur, G., Jain, H., Tiwari, A., Joshi, S., Rao, K. and Sharma, A., 2022. Machine
learning approach for phishing website detection: A literature survey. Journal of Discrete
Mathematical Sciences and Cryptography, 25(3), pp.817-827.
Paul, T., Islam, N., Mondal, S. and Rakshit, S., 2022. RFID-integrated blockchain-driven circular
supply chain management: A system architecture for B2B tea industry. Industrial
Marketing Management, 101, pp.238-257.
Rahim, R., Murugan, S., Mostafa, R.R., Dubey, A.K., Regin, R., Kulkarni, V. and
Dhanalakshmi, K.S., 2020. Detecting the Phishing Attack Using Collaborative Approach
and Secure Login through Dynamic Virtual Passwords. Webology, 17(2).
Shah, Y. and Sengupta, S., 2020, October. A survey on Classification of Cyber-attacks on IoT
and IIoT devices. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics &
Mobile Communication Conference (UEMCON) (pp. 0406-0413). IEEE.
Van Twist, A., Melenhorst, M., Veenstra, M., Ruijer, E., Kolk, M. and Meijer, A., 2022, January.
Designing Guidelines for Smart City Collaboration Tools. In Proceedings of the 55th
Hawaii International Conference on System Sciences.
Verma, S. and Sheel, A., 2022. Blockchain for government organizations: past, present and
future. Journal of Global Operations and Strategic Sourcing.
Wang, H., Wang, Y., Cao, Z., Li, Z. and Xiong, G., 2018, August. An overview of blockchain
security analysis. In China Cyber Security Annual Conference (pp. 55-72). Springer,
Singapore.
9
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.