Human Resource Management.

Verified

Added on  2022/12/19

|11
|3070
|1
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Human Resource
Management
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Technologies used by businesses and its features, application, suitability, advantages and
disadvantages..........................................................................................................................1
Advantages and Disadvantages, suitability and application of cloud storage and computing1
Discuss the challenges and measures of security and privacy that businesses and users would
take.........................................................................................................................................1
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
2
Document Page
INTRODUCTION
Information and communication technology refers to the the technology that is used to
share the information to the other person within the last time. most of the organisation now
preparing a different technology in order to run their business after covid-19. It may be easy
operations with the help of seven technology(Yang and et, al, 2018). This report will cover the
the uses of different technology that is widely used by different business after covid-19.
Moreover this report will covered the importance of cloud storage and computing in order to to
acquire maintain the own business by offering online services. It will cover that challenges faced
by a businesses and the measure that will be taken by organisation in order to protect and secure
their business.
MAIN BODY
Technologies used by businesses and its features, application, suitability, advantages and
disadvantages.
There are 7 technology which can be used by the business for their own benefits and it
includes Microsoft team, Zoom, Team viewer etc. Is there is a mutual fact of covid-19 on several
industry thua the need of these technologies Are high so that every business can run these
various operations in an easy manner. This help in achieving the long-term sustainability in the
competitive market. Various type of technology that can be used by the business are explained as
phone:
Zoom
It is the application that assess the user to place free video call with many people at a
point of time. the main target of this application is to bring people at a point of time with the
consideration of conducting a professional business or meeting. Provide clear and audible
visibility for the user to connect with the different location. The prime customer for this app are
Acosta, Delta, Popsockets etc.
Features
App provide the best wood video and audio transfer with the instant sharing tool.
3
Document Page
It offers the customer background pictures and search option for the convenience of
customer in their chats.
It helps the user to avail the various features like messages, contacts and channels on top.
This this app also alpen recording the video in audio of the meeting and events and that
can be uploaded to blackboard aur YouTube.
Advantages
It gives more flexibility on working.
It is easy to use as just to connect with the desktop or the mobile application.
This application is quite pocket friendly and can help the small business startup apart
from other conferencing app.(Bassano and et. al., 2019).
Participant in the video call can communicate and anything through the life chats in
between the conversation.
This application can easily run on windows, Linux and Android operating system.
Disadvantages
The hacker corrupt the password is zoom that matters great concern for it users.
Server company of this app is supported it's linking network in China by which the
personal data is not secured in this app.
The customer service department field to give the the suggested solution within the time
limit.
Cyber attacks have results in losing the business which impact in the economy and its
various sector.
An individual can join the meeting is the Zoom app is not properly used.
Microsoft Teams
It is the messaging app that help an individual or an organisation to stay connected at one
place with the help of meetings, video conferencing app and file sharing. It is integrated with its
365 online officers that refers to connected with the other services such as excel and word.
During the pandemic time, this app has been higher revenue and profitability as it gives is the
individual to stay connected at a point of time.
Features
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The unique feature of this app is that anyone can join online meeting and have audio
conference at a point of time.
It allows for fully telephone option which easily replace the current phone system.
Video calling and online screen sharing to client an employee is a great feature that is
collaborated with it.
Microsoft team of a chat function that take place between team groups or individual.
Advantages
it is not limited to hardware and software air and can be accessed anywhere.
It helps in enhancing the team productivity by collaboration online meeting, shared files,
conversation that is available in one single app.
The notification mention the highlighted activity on the top of the screen.
currently the company is focusing on increasing the productivity by placing the right
individual on the table so that high collaboration can be seen.
With the Microsoft team, 1 existing appointment can be synced with other individuals.
Disadvantages
It confused its user by having a complex structure of files.
the fault of shin-chan helps in unnecessary setting up of teams which results in mobile or
system more consumption storage.
There is a restrict number in this application that up to 200 public and 30 private channel
can be made and it turn to big problem for large organisation.
It consume unnecessary storage by creating a team in an organisation.
Advantages and Disadvantages, suitability and application of cloud storage and computing
Cloud storage
It is a technology that allows the user to save files and that access those file through
clouds. It is a computing model that operates and manage the data storage as a service and it is
available in public private and hybrid clouds.
Advantages
Cost saving: cloud storage does not required much expenditure as it operating cost of a
business and does not depend on internet party store information remotely and provide a
wide platform for storage.
5
Document Page
Assessibility: the files which are stored in the cloud can be accessed from anywhere at
any time within the internet connection it helps the organisation we are a large sum of
employees are presidency in a rural location.
Convenient: it is easy to use as it does not required hard disk for try to access the data it
required device to download the data of file in a device.
Diaster recovery: cloud storage work as a backup plan and when the system formats for
the printer get corrupted then all the necessary information can we get from the cloud
storage and act as a disaster recovery.
Disadvantages
Insecurity: there is a possibility of losing a confidential data from the hackers as the
business information is provided to the third party.
Network connection dependency: Dependency on internet connection due to transfer of
file data to cloud it required internet connection and this is quite tough to transfer the file
in the remote service as sometimes the internet connection face technical issues or
troubles. If backups are running during the business hour of the performance is suffers
the speed of internet.
Data management: it can be a problem to manager Data in a cloud as cloud storage
system have their own structure and management system of their business can always not
comply with the cloud vendors system.
Suitability and Applications
it helps in building a physical dead database that can be added advantage for a cloud
scandal resources to maintain their virtual data.
it takes is the more space with less money and give the the accessibility to the user to
store large amount of data at a point of time.
it is integrated with the variety of application like data sharing, resource services, backup
and also provide standard interface for other networks.
Example of firms that are acess the cloud storage are IBM, Dell EMC, Intel etc.
Cloud Computing
It is a delivery of different services with the help of internet. The services includes
networking, software, database, service, analytics and intelligence.
6
Document Page
Advantages
cloud computing a append reducing the cost of maintaining the IT system and managing
its various aspects. it reduce the overall operating cost as the company to not need to pay
the basis for expert staff and the energy consumption it tends to decrease(Yu and et. al.,
2021).

Cloud application in the collaboration of the people by atah rising diverse group in
virtually meeting so that they can exchange their information with the help of shared
storage. This capability alben improving a customer service and product development by
reducing the marketing time.
It gives flexibility of work practices as the data can be accessed from offside or can
connected to the virtual office in quick and easy manner.
Helps in backup and recovery of the data which is store in the clouds that is having
unlimited storage capacity.
Disadvantages
This is highly dependent on the internet connection and it create a big problem in the
remote area where the net connection is supposed to be slow and will increase the disc of
attached and down off the server. the big does of a public cloud is where everyone access
the same server in particular area.
As the cloud computing system his own online platform and expanded to the its wide
range that open the fortunately for attack on data activities that is stored in a server.
All the clouds to do not create equally as they provide limited storage to store files.
Suitability and Application
Business application: these are the application which are based on cloud service
provider that ensure 24*7 available to users. This computing includes sales force, PayPal,
QuickBooks, chatter, chimp etc.
Education application: in the field of education it offers the various online distance
learning of platforms in which student access their portals and the commonly used
application are chromebooks for education Google apps and AWS in education.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Data storage and backup application: this is basically used to store the information like
images audio video and files on cloud and access this information by using internet such
as Google Gsuite, Mozy, Box.com etc.
Art application: it is the art application which access the user to quickly design the
attractive cards images and booklets commonly used application are Vista print, Adobe
creative clouds(Neumann, 2018).
Examples of some companies taht is using cloud computing are Adobe, Dropbox,
egnyte, red hat and server space.
Discuss the challenges and measures of security and privacy that businesses and users would
take.
Online privacy is the subset of data privacy and the fundamental human rights that is
mainly that refers to the personal privacy to which individual is responsible when displaying
providing and storing the information about itself on the internet there are various challenges
related to the privacy and security which the business and the individual faces when they go
online and uses a different services are explained as follows:
Span: One of the most medium which is highly used for spamming is email that is the
strongest medium for increasing the sale also. The open invitation to the the hacker
during the contact or the comment on a block given to an opportunity to spammer to put
the infected link so that it can harm the overall site or the business. Corrupted site not
only harm the security of the website was also damage the overall speed of the website.
So it is advisable to the the business to use the other medium for increasing their saying
so that their site cannot be corrupted by the hacker.
Financial frauds: In this, hacker make the unauthorised transaction and then swipe up all
the trail costing business that result in huge loss in various business organisation. This
has been in inflicted the online business since the inception of them. Refund fraud is a
common fraud among the business where the business refund the illegal product for
damaged goods.
Phishing: it is the most common threat of security in the E-Commerce in which the
hacker masquerade as the legtimate firm and then send email to the individual in order to
to convince them their wife forcing them to reveal their personal information by showing
8
Document Page
a fake ID of their website aur anything by which they make believe in customer that they
are from the real business enterprises(García-Castilla and et. al., 2019).
Solutions to overcome the variou challenges of privacy and security
Secure servers and admin panels: There are many E-Commerce platform which are
having a default password that is easy to guess by anyone and if the password is not
changed then there are more chances chances to expose the the confidential data of an
organisation and can hack the operation system of an organisation. So it is recommended
to use complex password or username so that it cannot be changed by anyone.
Employ multilayer security: the security can be fortified various layers of security and
the business can use cdn to protect the site against Dados attacks malevolent incoming
traffic. internet security can be done by effective utilisation of the machine learning in
order to filter out the malicious traffic from the site. This enables the individual to access
service when their username and password is at risk as it is the combination of password
and the extra code which is sent to then email or the SMS who provide the contact
number(Ransom, 2020).
Payment gateway security: when the individual is making a payment and saving their
credit card details. It is the open invitation for the hacker to use their details in order to
hack the card. The business must ensure that the payment gateway security is not at risk
so that they can have a secure payment gateway.
Switch to HHTP: The outdated version of HTTP protocol make it easy for the hackers to attack.
In this the green lock sign display and se secure next to URL on computer of individuals. This
also pop up on the screen that the website is not secure and won the individual to have a direct
focus on their site in order to save their data. This not only save the sensitive data but also secure
the user data(McEnnis, 2020).

CONCLUSION
It is concluded from the above report that information technology have made a
significant place in each sector after the huge impact of covid-19. As it gives the various
platform like Zoom, Microsoft team etc. by which an individual or the organisation can have a
9
Document Page
audio videoconferencing in order to run their business and having effective meetings. This
technology have play a significant role in conducting a several business activity in a tough time
of pandemic in an easy approach. Cloud storage is a technology that allow the user to store large
pool of data and access them from anywhere. There are various challenges of security and
privacy that is faced by a business are are financial frauds, spam and phishing. Corrective
measures in order to overcome from the challenges are secure service and admin panel, payment
gateway security and switch to HTTPS.
10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Books and Journals
McEnnis, S., 2020. Toy department within the toy department? Online sports journalists and
professional legitimacy. Journalism, 21(10), pp.1415-1431.
Wang, H.Y., Sigerson, L. and Cheng, C., 2019. Digital nativity and information technology
addiction: Age cohort versus individual difference approaches. Computers in Human
Behavior, 90, pp.1-9.
Ransom, T.M., 2020. The Relationship between Soft Skills and Work Self-Efficacy among
Nonlicensed Legal Professionals (Doctoral dissertation, Capella University).
García-Peñalvo, F.J., García-Holgado, A. and Ramírez-Montoya, M.S., 2019, October. Track 16:
TEEM 2019 Doctoral Consortium. In Proceedings of the Seventh International
Conference on Technological Ecosystems for Enhancing Multiculturality (pp. 920-924).
García-Castilla, F.J. and et. al., 2019. Educational potential of e-social work: social work training
in Spain. European Journal of Social Work, 22(6), pp.897-907.
Neumann, M.M., 2018. Using tablets and apps to enhance emergent literacy skills in young
children. Early Childhood Research Quarterly, 42, pp.239-246.
Yu, W. and et. al., 2021. Role of big data analytics capability in developing integrated hospital
supply chains and operational flexibility: An organizational information processing
theory perspective. Technological Forecasting and Social Change, 163, p.120417.
Yang, X. and et, al, 2018. A critical examination of the relationship among research, theory, and
practice: Technology and reading instruction. Computers & Education, 125, pp.62-73.
Bassano, C. and et. al., 2019. Storytelling about places: Tourism marketing in the digital
age. Cities, 87, pp.10-20.
11
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]