This report discusses collaborative tools, cloud storage, privacy and security challenges in the digital age. It identifies potential privacy and security challenges and measures to protect digital assets. Advantages and disadvantages of cloud computing and storage are also discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated Professional Skills in Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................1 MAIN BODY...................................................................................................................................1 Identification of collaborative tools along with discussion about how they can help companies during the global pandemic....................................................................................................1 Discussing advantages along with disadvantages and suitability along with application of cloud storage with computing improved digitalisation..........................................................3 Identification of privacy along with security challenges through measuring potential which should in consider by the individual along with establishment that can protect digital assets5 Discussing bubble bursting procedure about cryptocurrency along with its justification......8 CONCLUSION................................................................................................................................8 REFERENCES................................................................................................................................9
INTRODUCTION Information and communication technology broaden for information technology (IT) sector. ICT is also used for the digital convergence of audiovisual with the telephonic network with a single cable connection. It provides all communication technologies which includes wireless network, internet, telephones, computers and laptops. Through these platform people can connect with each other from different countries. Video conferencing, social networking and media application gives many opportunities to people by which they can use it in better way. It’s necessary to use and understanding different information in better way that can help to improve the information and communication technology with consideration. In this report, there is discussion about understanding about the collaborative tools at the workplace(Verma and Sheel, 2022). There is also discussion about the cloud computing along with e-commerce at the modern workplace. There is also discussion about privacy concern along with security threats which include the business organisation through using internet. There is also discussion about the bubble bursting procedure including cryptocurrency in market. MAIN BODY Identification of collaborative tools along with discussion about how they can help companies during the global pandemic Collaborative tool can be effective and allow to provide better and effective response about effective user with the purpose of supporting group of individuals to achieve the common goals. This can include the form of application software that allows their employee to work collaboratively with sharing their knowledge with other individual on virtual basis. These are the collaborative tools that can allow to perform the organisational tasks from anywhere on a remote basis. It can also help to store different document in cloud that can allow to get access from anywhere. These are the collaborative tools that can be effective and allow to provide better impact on employee through reducing their downtime and allow to enhance their productivity(Kiedrowicz and Stanik, 2018). Through using this virtual collaborative tool, it can allow to improve the communication channels and improvised it effectively. during the global pandemic and during the lockdown, there were many organisations who like to use this virtual collaborative software which enable to connect with their employees with strategic manner. There are two collaborative 1
tools which are effective and allow to be used in the workplace that can allow to get better connect with regards with better examples of Boohoo Group Plc along with Deliveroo that are going to be discussed further. Slackrefers to a workplace communication tool that includes the instant messaging system andhavethepotentialtoprovidetwodifferentmethodsthatcanallowemployeesto communicate with each other along with their superiors within the formal settings. It helps to organise the organisational conversation in the better manner through sharing employee ideas to making better decision. It can help team members to perform well and concentrate on their culture that can allow to enhance their working performance and enable them in increasing the organisational productivity. For example, Deliveroo is food delivery service organisation which uses the slack to effectively control and organise their business operation in better way with distributing their workforce effectively. Here, slack provides numerous application software that allow to integrate with the workforce remotely. Slack is also used in the Airbnb which allow manager to get connect with their third parties in better and strategic manner. Slack huddles can also provide alternative for the video calls which provide great experience to organisational manager to effectively interacting with staff members or their employees along with their external clients. Webexis another collaborative tools which have different features like video, audio along with content sharing opportunity to their user. This can help to provide better experience to their user which can allow organisation members to get engage in their meetings. It also offers seamless experience to their user which can enable to use in better manner and allow to perform their activities more effectively. It allows the team member to collaborate with each other in more effective way and allow to provide better experience and enhance their productivity. It can help organisation to establish better relationship with each other even from the remote area and effectively strengthen the business relationships(Neumayr and et. al., 2018). There are number of organisation that are perform well through using these collaborative tools and allow to schedule their meeting in better manner. It also enables manger to perform well and allow to perform in better way. This can also help them to transfer files with other and remove unwanted attendees in instant basis. Moreover, Webex also allow in screen sharing and cloud recording with storage. It also helps to perform well and enable to use different features like digital white boarding that can 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
help manger to share their presentation from the remote area. For example, Boohoo Group Plc uses Webex to organise their meeting for discussion their designs and other business aspects. Webex has performed well and allow different business organisation to run their business even in the pandemic where there was the situation of lockdown. It allows to maintain business operation even from the remote area. Discussing advantages along with disadvantages and suitability along with application of cloud storage with computing improved digitalisation Clound computing refers to the general term which include the delivering hosted services through the internet. It can understand as the practices that are used by the business organisation for hosting different servers for managing their large data in better and effective manner. This can help in significant establishments for protecting their data along with system from any type of cyber theft and can be considered effective in the continuous planning. It is vital and should be considered in the assessing the vital signs that can help to minimise downtime along with enhancing the productivity. It also enables employees to get flexible with their working that can help in getting connected with the virtual workplace in better and effective manner. Whereas, cloud storage can be considering as the computing model which are effective and enable to stockpiling different information in strategic manner. Here, user can store and upload along with retrieve their data set when necessary. Evaluation of limitation, benefits, application and suitability for cloud computing and storage are discussed further. Basis of differenceCloud computingCloud storage MeaningCloud computing provide different servicefrominternetlike networking,serversalongwith software(KühnandSchlegel, 2018). Cloud storage offer for the storage and allow to store data for the future usewhich also a part of the cloud computing. BenefitsCloudcomputingcanbe consideringasbeneficialwhich also include in the aid organisation which allow to update the system andsoftwarethroughautomatic process.Forexample,Boohoo It include diffenret benefits which shouldbeconsideredbythe managers of the organisation for the effectiveworking.Itallowto update the data on the remote basis along with providing synching. For 3
GroupPlchavethee-commerce systemwhichupdatedonthe regular basis. It allows to work in collaborative manner for enhancing the communication channels within establishment. example, Deliveroo manger are able to share thier information to their clientssomedocumentthrough usingthecloudcomputing strategically(Andersson and Mutlu, 2020). LimitationThere are some disadvantages that needs to be undertaken through the managers of the organisation like account hijack, data loss along with technologicalvulnerabilities.For examples,Deliveroohas experiencedthelossoftheir customer information during saving that information on cloud through cyber-attack. Cloud storage have also some of the limitationswhichincludethe security along with privacy concern withsomeproviders.Thereare some of the software which requires constantconnectivityofinternet during storing information on cloud in better and effective manner. For example, Deliveroo also face some issuesinmaintaininginformation alongwithsecurityfortheir customers. SuitabilityCloud computing is also effective andcanbeessentialforthe organisationwhichcaninclude sorting of vast information towards their employees and customers in organisedway.Forexample, Deliveroo mangers store along with assimilatetheircustomer information effectively(Van Twist and et. al., 2022). Clound storage is suitable for the Deliveroo which provide better and largeonlinefood businesswhich includetremendousdatasetto perform the business operations in betterway.Thiscanallowto managethosebusinessmore effectively. ApplicationCloud computing can be effective and allow to provide better offer to theorganisationmanagersto Here,cloudstoragecanbe effectivelyadoptedwithinthe organisationforstoringdataand 4
perform well and help in getting better use of infrastructure for their clientwhichcanalsohelpin hosting services more effectively. Forexample,Deliveroousesthe cloudcomputingwhichapplies thesestrategicallywithusing various software. information for the longer duration or lifetime. For example- Deliveroo usesthissoftwareinbetterand effectivemannerwhichare associated with taking care of the business interest. Identification of privacy along with security challenges through measuring potential which should in consider by the individual along with establishment that can protect digital assets Internet can be considering as helpful which can help in creating vibrant marketplace that include different transactions for selling and buying in better manner. Moreover, internet is also used for different unique features which include the entertainment platforms along with keeping informed about the dynamic changes within the world. It also faces different challenges in respect of individual and businesses. There are various cyber criminals that can attack the organisational system and may steal the confidential information where privacy along with security challenges are measure concern and are discussed further. Here, individual may get ask to make their account even it is not necessary. Here, personal information is asked by the account which can be used for formulating promotion plans. There are many time when these are the process gets frustrating for the individual need to login every when they like to get access to use those(Dvojmoč, 2019). There is another issues which are generally faced by any individual is that they need to reach the customer services due to forget their password. This create the burden for them which lead to make and use of simple password to easily remember it. Here, data privacy refers as another concern where personal information is leaked due to signing up on different websites. Privacy along with security challenges in context to business Phishing attacks-This refers to the cybersecurity attack where malicious actors send some messages which treated as the trusted person or entity and lead to create some negative impact. This is the practice in which one individual cyber attackers send fraud information through using different reputed sources(Andrzejewski, 2020). This can be phishing attacks 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
which can impact business operations in negative way and lead to loss of money, intellectual property, confidential information and many more. It also leads to create disruption towards the operational activities. There are various companies over the globe who suffers from such type of data breach which can lead to create disruption through the phishing attack. There can also some cases in which employees conduct this data breach that can relates with the phishing attack that are done by the employees and are apart from the phisher due to they are having all the information about it along with having login id and password. For example, there was a case in which official website of British Airways were diverted towards the fraudulent site through phishers. Having personal information of their 50,000 customers which was also high impact their life. There are various ways through which phishing attack are done that may include clone phishing, e-mail along with domain spoofing. Through using the e-mail phishing, attackers are able to get individual personal information which are generally used to conduct any crime or any customers related establishment harm. This can lead to impact the business operation and their outcomes(Shah and Sengupta, 2020). Cloning phishing can also refer as the digital attack which conclude cloning of actual e-mail message and are replaced it by malicious one through using the strategic manner. This can lead to create stealing of personal information about the business that impact the business operation and related activities. Domain spoofing include the spoofing of the specified organisation which are effective and may lead to create impact on the specified organisation which include the individual messages through legitimate company. Weak password- It is necessary to use better password which create difficulty for people or fraudster to get and provide high level of security to deliver better and effective response towards the care of personal information or data. Here, it creates difficulty in dealing with better and effective information where weak password is easy to identity and create high risk of cyber- attack(Rahim and et. al., 2020). This can allow to easily steal their confidential data or information. This also enhance individual about getting better security to maintain the data and security. Weak or simple password allow to breach easily and provide better aspect for cyber attacker to conduct crime through stealing data or information. For example- Deliveroo may face such type of attack during performing their business operations. This can also create difficulty in providing better security to data or information which not beneficial for the company. 6
Insider threat- This is the one which create security risk to the organisation and may create threat for company from their own employees or former employees, business associated or other(Kamal and et. al., 2020). For example, any employee can steel confidential information about the company and share it with other competitors which may lead to create business loss to the organisation. Here, many companies have already suffered such type of insider threat which lead to lose their customer trust along with company reputation effectively. Here is a case of Marriott Hotels in which they have faced such type of attack by cyber criminals where about 5.2 million record of guest were stolen. Potential measure that can take by businesses or individual to protect them from different issues. Train staff members effectively-Employee are one of the main target or vehicle through which cyber attacker attack to any organisation or company(Patil and et. al., 2022). In this, criminal target any employee who are highly effective in the organisation and have high authority to access to different data or information which are required by the cyber criminals. Here, every individual should use their common sense before getting clicking to any link which are not normal. This can help to avoid any risk which are associated with any breach. Here, employees of British Airways should have provided proper training that could have helped to avoid such type of data breaching within their company. Keep software updated- With time cybercriminal find some ways to breach the software. To avoid such type of case each and every company should take care of their performanceandshouldincludebetterpracticestowardpropersafetytotheirdataand information by updating their software on regular basis. This can be effective for the organisation to ensure about their data protection through updating their system(Wang and et. al., 2018). Data backup- Getting backup of data can be highly effective that can help to secrure that data and should avoid the risk of downtime loss. This can also help to save from financial loss alongwithseriousdowntime.Forexample,Deliveroomanagerskeeptheirdatabackup strategically which help to avoid any risk of loss with relevant information which are also associated with cyber-attacks. Every individual should also take care about the online transaction through ensuring about the secure password. It is also need to ensure about clicking on any link without get ensure 7
about the safety that can lead to cyber-attack. One wrong click can lead to loss of data or information which may lead to high financial loss(Liu and et. al., 2021). Discussing bubble bursting procedure about cryptocurrency along with its justification Cryptocurrency is one of the form of virtual currency that can be used for the payment. It was created through using the encryption algorithms. Using this encryption technology allow to use those as the digital accounting system which are highly effective and allow to provide better payment option. In finance meaning, bubble can be defined as the state in which asset remains stable for longer time period with continuous growth. Here, price get higher as the skyrockets. Whereas, burst may have explained as that assets price get drop quickly in comparison to their rise. Due to this combination or bubble burst lead to create high risk to use the cryptocurrency which is also a standard payment system and lead to riskiest sources for the national company towards the verge. For example, Bitcoin get fell down within few months which lead to create the bubble burst. Here, stable coins lead to consider as sure source with include crypto world which lead to cover the large percentage of trading volumes toward the digital assets. Moreover, token is also used for the exchange process which include the payments and other relevant activities that are typically based on the block chain technology. Market analysis also include the rise along with fall in the Ethereum and Bitcoins prices which doesn’t considered as the bubble bursting and have verge of inflation hedge(Paul and et. al., 2022). CONCLUSION From the above discussion, it can have concluded that information and communication technology plays an important role in performing business operation which can lead to create high impact on the business operations. Here, collaborative tools tool should be included by the organisational managers that can help to solve the complex problem and help employee to work from remote area. This collaborative tool includes Slack along with Webex. There is discussion about the security along with privacy issues like weak password, phishing attack along with insider threats. There is also discussion about the cloud computing along with cloud storage. There is also discussion about the cryptocurrencies which is riskiest market investment and should be done through critical evaluation effectively. 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES Books and Journals Andersson, H. and Mutlu, A., 2020. Digital collaboration tools-What types of frustrations do managers experience?. Andrzejewski, K., 2020.Security Management Information System(No. 2641). EasyChair. Dvojmoč, M., 2019. Corporate intelligence as the new reality: The necessity of corporate security in modern global business.Journal of Criminal Justice and Security, (2), pp.205- 223. Kamal, A.H.A., Yen, C.C.Y., Ping, M.H. and Zahra, F., 2020. Cybersecurity Issues and Challenges during Covid-19 Pandemic. Kiedrowicz, M. and Stanik, J., 2018. An information system risk model for the risk management system of an organisation processing sensitive data.Zarządzanie i Finanse,16(3). Kühn, R. and Schlegel, T., 2018, September. Mixed-focus collaboration activities for designing mobile interactions. InProceedings of the 20th International Conference on Human- Computer Interaction with Mobile Devices and Services Adjunct(pp. 71-78). Liu, X., Barenji, A.V., Li, Z., Montreuil, B. and Huang, G.Q., 2021. Blockchain-based smart trackingandtracingplatformfordrugsupplychain.Computers&Industrial Engineering,161, p.107669. Neumayr, T., Jetter, H.C., Augstein, M., Friedl, J. and Luger, T., 2018. Domino: A descriptive frameworkforhybridcollaborationandcouplingstylesinpartiallydistributed teams.Proceedings of the ACM on Human-Computer Interaction,2(CSCW), pp.1-24. Patil, R.R., Kaur, G., Jain, H., Tiwari, A., Joshi, S., Rao, K. and Sharma, A., 2022. Machine learning approach for phishing website detection: A literature survey.Journal of Discrete Mathematical Sciences and Cryptography,25(3), pp.817-827. Paul, T., Islam, N., Mondal, S. and Rakshit, S., 2022. RFID-integrated blockchain-driven circular supplychainmanagement:AsystemarchitectureforB2Bteaindustry.Industrial Marketing Management,101, pp.238-257. Rahim,R.,Murugan,S.,Mostafa,R.R.,Dubey,A.K.,Regin,R.,Kulkarni,V.and Dhanalakshmi, K.S., 2020. Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords.Webology,17(2). Shah, Y. and Sengupta, S., 2020, October. A survey on Classification of Cyber-attacks on IoT and IIoT devices. In2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)(pp. 0406-0413). IEEE. Van Twist, A., Melenhorst, M., Veenstra, M., Ruijer, E., Kolk, M. and Meijer, A., 2022, January. Designing Guidelines for Smart City Collaboration Tools. InProceedings of the 55th Hawaii International Conference on System Sciences. Verma, S. and Sheel, A., 2022. Blockchain for government organizations: past, present and future.Journal of Global Operations and Strategic Sourcing. Wang, H., Wang, Y., Cao, Z., Li, Z. and Xiong, G., 2018, August. An overview of blockchain security analysis. InChina Cyber Security Annual Conference(pp. 55-72). Springer, Singapore. 9