ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Impact of Internet on Society and Businesses: Challenges and Measures for Privacy and Security

Verified

Added on  2023/06/05

|14
|4555
|139
AI Summary
This study examines the impact of the internet on society and businesses, including the benefits and drawbacks of using the internet for business and society. It also discusses the challenges and measures for privacy and security when moving online. The study emphasizes the importance of privacy and security precautions that companies using online services should take. The study also compares and contrasts two different types of unified communication providers for businesses.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Integrated Professional
Skills in Digital Age

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
Impact of using internet on society and businesses....................................................................3
Challenges and overcoming measures regarding privacy and security at the time of moving
online...........................................................................................................................................6
Two different unified communication providers........................................................................9
CONCLUSION..............................................................................................................................12
REFERENCES .............................................................................................................................13
Document Page
INTRODUCTION
In the 21st century, there has been a quick transition with the information age, which has
brought different opportunities as well as problems for organisations. The digital age is also
known as the information age, which may be described as the time period that began when
personal computers were introduced (Dadwal, Jahankhani and Hassan, 2022). To effectively use
the digital tools at the disposal of organisations, it is crucial to have the capacity to acquire new
skills, knowledge, critical thinking, creativity, and problem-solving abilities. The current study
examines the benefits and drawbacks of using the internet for business and society, as well as the
dangers that organisations and society face when using the internet. Additionally, the current
research emphasises the privacy and security precautions that companies using online services
should take. Additionally, the suitability of two alternative types of unified communication
providers for businesses is contrasted and compared in this paper.
MAIN BODY
Impact of using internet on society and businesses
The internet is incredibly useful and can improve quality of individuals life. The internet
provides a variety of chances for society and industry to achieve their aims. Internet facilitates
consumer connections for businesses. The use of the internet is widespread in business
administration, marketing, production, buying, selling, all accounting and tax management, as
well as many other activities. Internet is considered as the most important and significant sources
of business models. In order to improve the operations as well as productivity of the businesses,
now a days entrepreneurs are involved in making investment in technological tools such as
digital marketing, E- commerce, online collaboration tools and so on (Sousa and Wilks, 2018).
As a result, the internet has an impact on politics, the environment, corporations, societies,
employment, and education. Online marketing, is also known as web advertising or internet
marketing, which can be operated by the use of digital platforms such as email, social media
websites and search engines for spreading commercial information to customers. Online
marketing offers better data collecting and personalisation than conventional marketing does.
Businesses may provide millions of customers with a variety of goods and services based on
their individual preferences thanks to this benefit of internet marketing. People can advance in
nearly all aspects of life by using the internet. Its ability to connect individuals from all over the
3
Document Page
world and create communities comes from its status as a worldwide computer networking based
organisations. It's an appropriate manner for sharing and obtaining knowledge, also it is possible
to access it anywhere. E-commerce has altered both consumers' shopping habits and retailers'
sales methods in the contemporary world. In this study, this will be concentrating on the
advantages that online shops and e-commerce sites have over traditional brick-and-mortar stores
when it comes to selling electronic goods. There will have found certain research holes in this
study, and the research as a whole will be defocused around those deficiencies. This study will
be quantitative, and it will analyse the purchasing patterns of consumers who are willing to
purchase electronic goods from both online and offline retailers. This will focus in particular on
the factors that have caused these consumers' purchasing patterns to change.
Positive impact on businesses by using internet
Digital marketing – The business units can make use of websites, email marketing,
social media platforms and search engine optimisation in order to make promotion of
products and services produced by them. Digital marketing enables businesses to promote
their products and services on social media and search engines at cost effective prices
(DiRomualdo, El-Khoury and Girimonte, 2018).
Opportunities of Online business - Online business development is greatly facilitated
by the internet. With the help internet an individual can avail lot of technological
facilities such as website development, creation of content, digital & affiliate marketing
and so on, which are all driving up employment and development.
Business automation – This tool plays more significant role in highly difficult and
complex tasks. All daily business activities, tasks, and works are programmed into
software throughout this procedure so that the business may operate itself. It can decrease
human involvement in dangerous tasks and promote robotic interaction, which will boost
productivity and lower the cost of maintaining large teams.
Employee online training software - For the purpose of skill development and training
of employees a huge number of degree and online training programmes are available over
internet. Because the firm needs a skilled and capable workforce in order to innovate and
produce more (Smirnov and et. al., 2020). Business Automation- Business automation plays a crucial part in a variety of intricate
and extremely difficult scenarios. It assists in a variety of ways, such as day-to-day
4

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
business operations and tasks that may be easily implemented in business software.
Additionally, it assists in automating business processes, favours robotic user interfaces,
and decreases human mistake in labour.
Positive impact on society by using internet
Fastest medium of communication - Internet facilitates efficient interpersonal
communication. It can aid someone in developing social connections with others in
society. Numerous internet services, such Gmail and Skype, offer efficient methods of
global communication.
Opportunities of working from home- Online earning opportunities are available
thanks to the internet. Online home companies can lower costs and boost productivity by
putting adverts online (Reisdorf and Rikard, 2018). Social development- The internet is essential to society's ongoing social growth.
Through articles, infographics, and social media, diverse social workers use the internet
to reach a wider audience on environmental, social, and personal problems. For
civilizations, it can produce a variety of communication venues.
Negative impact on businesses by using internet
Today, practically all business transactions take place online. But the internet can be
detrimental to business in some circumstances or fields.
Low Productivity- Simply because employees are accessing the internet at work,
business productivity is declining. The internet is a favourite pastime for workers. They
regularly utilise Wi-Fi by connecting their computers and mobile phones to it. Due to
lack of attention to individual tasks and performance, this may have an effect on business
productivity (Palaiologou and Gray, 2019).
Security- Every corporation invested millions of dollars to safeguard corporate data.
Without protection and security, clients feel uneasy and are less likely to be comfortable
using business services, therefore this is crucial. Beyond routine transactions, major
security risks like hackers, e-crimes, and viruses for online business security add extra
costs to operations. New Competitors- The internet also brings in fresh rivals from various markets. Internet
marketing presents new problems and risks for businesses that are already in operation.
Additionally, the internet eliminates any geographical limitations.
5
Document Page
Negative impact on society by using internet
In appropriate or unlawful content is also promoted and easily available over internet.
It could be addictive and be detrimental to communication. With this, spending long
duration over screen creates a negative impact over the health of an individuals which
might include increasing in depression, anxiety, insomnia, weak eyesights and sadness.
(Lane, 2020).
Utilising the Dark Web to exchange data and stolen goods.
Use of social media can be so addictive that an individual can spend lot of time over it,
which might affect their professional as well as personal life.
The chances of online hacking and stealing the personal data and information of
customers as well as banking system is high.
The internet is also being used by the terrorism as a source for abusing to countries. Internet usage can have a detrimental effect on an organization's output. The internet can
squander an employee's time in a variety of ways, including web browsing and loading
times. Due to how simple it is to operate a business online, there are now many more
rivals in the market. It may have detrimental effects on offline businesses and encourage
them to grow their online operations (Mariani and Wamba, 2020).
Challenges and overcoming measures regarding privacy and security at the time of moving
online.
Think about starting an internet business. Someone would invest thousands of dollars to
build a feature-rich website. Engage in a costly marketing campaign to attract users to their
platform. The revenue quickly increases as they observe expanding numbers. They never take
their online company' security seriously while doing all of this (as many start-ups nowadays do).
One day, individuals are faced with a serious data breach when all of business users' personal
information is exposed. As a result, customers start to lose faith in the services and switch to a
competitor who provides a secure environment. Think about starting an internet business.
Someone would invest thousands of dollars to build a feature-rich website. Engage in a costly
marketing campaign to attract users to their platform (Urbach and Röglinger, 2019).
Challenges of security and privacy on online
6
Document Page
Malware – Malware, is an harmful software which involves viruses, spyware, worms and
ransomware. When the user unintentionally triggers the malicious link then this harmful
software is being installed and can harm security of data. As per Cisco, once launched,
malware can: Block access to crucial components of network (ransomware) (Major
privacy issues concerning online privacy, 2019)
o Installation of malicious software.
o Availing message or information secretly by transferring data through hard disc
(spyware)
o Components can be damaged,by performing the system unnecessary (Schrum and
Sumerfield, 2018).
Emotet – It is a kind of Trojan which is being spread with the help of spam emails. It is
being mostly spread on banking system, initially it gets downloaded over other banking
Trojans and then it starts harming the operations of banking system.
Denial of Service - Denial of service or DoS is a cyberattack states flooding a computer
over network with information so that it cannot respond to user requests. The same kind
of approach is being used in Distributed DoS or DDoS, the only difference was that the
attack takes place through computer networking. There are large number of methods
which can be undertaken by cybercriminals in order to conduct assaults over internet. As
per (Global Survey: 95 Percent of Healthcare Orgs Don’t Use Security Governance or
Risk Management Software, 2017) Jeff Melnick of Netwrix, a information provider
software for technology security with this, a botnet is a type of DDoS under which
millions of devices can be infected with malware and are fully controlled by the hacker.
Botnets, also considered as a zombie systems, which aims to overpowering a target's
computing power. The botnets sites varies from geographical areas, this is why its
difficult to track them (Bassano and et. al., 2019).
Man in the Middle - When the hackers involves themselves among two party
transactions, a man in the middle or MITM conflicts arises. As per Cisco, hackers can
filter and intake information or data after break off the traffic. The chances of arise in
MITM is high when the users are involved in using unprotected public Wi-Fi. The
hackers keeps a continuous look towards it and when the users uses it they set up
malware within it and are capable of accessing their personal data.
7

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Phishing - Phishing is a attack which uses fake communication ways to deliver message
such as email. The main objective of phishing attack is to avail the security data such as
credit card number or information related to login. As per Cisco, the main agenda behind
phishing attack is to make collect the information related to logins at particular platforms
and to collect information related to online payment gateways and then infect the users
computer by installing malware.
SQL Injection – In SQL injection the attack is performed by using malicious code of
SQL, for doing manipulation in the database and such information is not being displayed.
The host divulges data when also being infected through this attack. By simply typing the
malicious code into a search box over the susceptible website it could be submitted
(Huda, 2018). Password Attacks - A cyber attacker has approach though which they can access to a lot
of data using appropriate password. As per Data Insider, the social engineering is the sort
of password conflict that "relies primarily on human interaction and frequently involves
persuading users into breaching common security procedures." Accessing a password
database or blatant estimation are examples of other password assaults.
Measure of security and privacy on online
As the internet and the businesses that rely on it develop and change, cybersecurity practises
also shift. As per SecureWorks, individuals who are involved in studying cyber security are
placing more attention on two major categories which are stated below - (Hobbs, 2020).
The Internet of Things - Each device which is connected to internet or other internet
networks acts as a hacker access point. 2019 saw an increase in hacker attacks on linked
baby monitors, smart TVs, voice assistants, and mobile phones, among other IoT and
smart home devices, according to Cytelligence. In addition to their Wi-Fi login
credentials, hackers who successfully infiltrate a linked residence might also have access
to users' information, such as bank account information, medical records, and login
websites credentials.
The Explosion of Data - It is easier for internet thieves to find a point of entry through
network using a individual device, when information is being stored in devices such as
computer, laptops and cell phones. In the book of Exploding Data - Reclaiming Our
Cyber Security in the Digital Age, published on May 2019, for instance, issues a warning
8
Document Page
about the large spread aspect of people's private data, which have increased the risk of
cyberattacks (Teubner and Stockhinger, 2020).
Therefore, in order to safeguard their operations and data, businesses and government bodies
require the highest level of cyber security. For cyber security specialists, it is crucial to
comprehend how to handle the most recent, evolving cyber threats.
Two different unified communication providers.
Multiple enterprise communications transmission, involves phone, personal and team
messaging, videos, voicemail and sharing of content, were provided by and joint in unified
communications or UC products, which include hardware, software, and services. Control,
management, and integration of these channels might all fall under this category. A software that
incorporates various communication channels into a software or app is known as a unified
communications platform (often referred to as UC). Voice, video, and message are the major
components of these channels, but they can also incorporate other features like voicemail and file
sharing. Due to COVID-19 crisis the business customers, clients get the opportunity to explore
towards E- commerce sector. The customers are also being benefited by the use of E- commerce
platforms as they can get wide range of options from where they can avail services of their
choice. With this, it had made easy for them to make secure payments. The customers can even
make payments of the delivered goods after the products is being delivered to them safely.
(Rasool, Shah and Islam, 2020).
The compare and contrast between Zoom and WebEx
Zoom-
A well-known video conferencing tool called Zoom has many features that are best in
their own. Zoom offers the advance features that includes messaging on group chats, it offers to
online meeting and has option to make meeting rooms and can join webinars. These features
provides many opportunities to communicate with people through various options. This zoom
meeting is user friendly and doe not take much time in understanding the functions. It also
provides the services which has high dependability.
WebEx-
WebEx is another platform to be used in communicating, arrange meetings and creating
conferences through on line services. This application gives many features useful in
implementing events, webinars, video conferences with out any wastage of time. This software
9
Document Page
provides many opportunities to develop through Webex and facilitate business with advancement
technological factor. This application is more affordable in terms of monetary and offers various
cool features which will enhance the productivity of company.
Pricing-
While evaluating different kinds of applications to be used in organisation to arrange
meetings, conferences, cost occured in this process is major aspect to be analysed first. Large
organisation should analyse every aspect related with the cost and should chose more flexible
and affordable stratgies. The price is an excellent tiebreaker when features are close in
comparison. Zoom used to have considerably more reasonable price comparatively from other
applications for example Webex. This method of communication has developed thierfeatures and
provide free plan in accordance to zoom. While zoom only charges hosts a maximum of $19.99
month per user and has free plan for upto 100 participants, while Webex has total cost for
business is about $26.95 per month. With low costmaintainence and lower cost application zoom
provides much better and advanced features such as excellent audio and video (Pichler, 2022).
Quality of Video -
Zoom application has feature which enables HD quality of video is high among others.
Co-workers and clients don't get jerky, blurry video in result to their meetings or programme.
While Webex also provides excellent video, zoom once more has the advantage in this area.
Capacity-
The ability to accommodate users takes centre stage when discussing video conferencing
options. Zoom offers an Enterprise package that allows for 1000 users at time of video
conference or meeting sessions, compared to Webex application that is only 200 users only.
Conference features-
This feature allows management teams to take video conference process with more
quality of functions. Webex is well-known for its supporting co-browsing, allowing file transfers,
and having the option to remove attendees—tasks that Zoom Video Conferencing can also be
utilised for. In addition, Zoom has a special feature of splitting meeting in up to 50 distinct
sessions. When seeking for more improvement in application entire video conferencing
experience, they chose to develop some unique features filled with solutions and same could
match the requirement of various companies.
Security features-
10

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security is crucial, particularly during business meetings and virtual conference. Both
Webex as well as Zoom provide dependable and secure features. They have options like
encryption and has user authentication to improve the security of video conferencing. Along with
these features, both application offer security management for desktop version of software. Both
data storage, transmission and communications. HIPPA compliant security can be added for
patient-to-doctor conversations for the Zoom Telehealth system. The tools are used in direction
to provide safeguard online identity, data and other assets that combinedly known as "digital
security." Apart from these, some other features are website services, antivirus softwares,
biometrics and personal gadgets.
Meetings follow-up-
Meeting follow-ups are crucial for any type of business. This enables attendees to see and
replay recordings of past meetings whenever necessary. A special Participant Reporting tool on
Zoom verifies all attendees who gave reports during the conference and the same will not
accessible in Webex application.
Effortless designs -
This aspect of application provides feature of user friendly functions that are required to
ease crucial issues in business. Complex software is a time waster. According to customer
reviews, Zoom is easier to use than Webex. With capabilities available on all platforms, Zoom
provides easy assess to join online meetings and conference. Thus, everyone will always be able
to take advantage of all its wonderful features, regardless of the device you're using. Compared
to Zoom, Webex involves a longer registration and check-in process. Zoom allows users to start
the meeting more quickly (Christians, 2019).
Zoom has many advance features which makes this application best among others with
various user freindly aspects. Webex has improved thier application and plans of free with high
quality of fucntionality. Due to security purpose, Webex has many business users till now but
Zoom has various other options whcih are required for newly approach business in market.
Webex has decided to discontinue its feature of meeting cap can be beneficial for the application
and may provide many opportunities to grow. With Zoom, users can organise professional video
conferences and web presentations for the company at a reasonable price while also receiving
support for mobile and desktop platforms. With just one touch, anyone can hold a meeting and
11
Document Page
communicate with colleagues in various parts of the world, saving the company time, money,
and energy.
CONCLUSION
From the above report it is concluded that digital raises productivity and operational
effectiveness. This form of digital skills will provide new areas of development in professional
growth. Digital skills help in making new advance features on goods and services of business
organisation and provides new direction to company in achieving objectives. This technology
helped in improving companies structure, services, products and efficiency as well as help
management to maintain their records, contacts and manage flow of data with in organisation.
Apart from these benefits, company gets the opportunity to run their operations smoothly and
effectively which reduces the cost generations factors. Businesses' consistency, quality, and
process efficiency all benefit from digitalization. It can turn paper files or papers into digital
ones, minimising duplication and accelerating the communication process. to develop and
encourage improved information exchange.
12
Document Page
REFERENCES
Books and Journals
Bassano, C. and et. al., 2019. Storytelling about places: Tourism marketing in the digital
age. Cities, 87, pp.10-20.
Christians, C.G., 2019. Media ethics and global justice in the digital age. Cambridge University
Press.
Dadwal, S.S., Jahankhani, H. and Hassan, A., 2022. Integrated Business Models in the Digital
Age. Springer.
DiRomualdo, A., El-Khoury, D. and Girimonte, F., 2018. HR in the digital age: How digital
technology will change HR’s organization structure, processes and roles. Strategic HR
Review.
Hobbs, R., 2020. Mind over media: Propaganda education for a digital age. WW Norton &
Company.
Huda, M., 2018. Empowering application strategy in the technology adoption: insights from
professional and ethical engagement. Journal of Science and Technology Policy
Management.
Lane, M., 2020. Regulating platform work in the digital age.
Mariani, M.M. and Wamba, S.F., 2020. Exploring how consumer goods companies innovate in
the digital age: The role of big data analytics companies. Journal of Business
Research, 121, pp.338-352.
Palaiologou, I. and Gray, C., 2019. Early Learning in the digital age. Early Learning in the
Digital Age, pp.1-248.
Pichler, R., 2022. Strategize: product strategy and product roadmap practices for the digital
age (Vol. 2). Pichler Consulting.
Rasool, A., Shah, F.A. and Islam, J.U., 2020. Customer engagement in the digital age: A review
and research agenda. Current Opinion in Psychology, 36, pp.96-100.
Reisdorf, B.C. and Rikard, R.V., 2018. Digital rehabilitation: A model of reentry into the digital
age. American Behavioral Scientist, 62(9), pp.1273-1290.
Schrum, L. and Sumerfield, S., 2018. Learning supercharged: Digital age strategies and insights
from the Edtech frontier. International Society for Technology in Education.
Smirnov, D.A. and et. al., 2020. Digital jurisprudence. Revista Inclusiones: Revista de
Humanidades y Ciencias Sociales, 7(1), pp.273-283.
Sousa, M.J. and Wilks, D., 2018. Sustainable skills for the world of work in the digital
age. Systems Research and Behavioral Science, 35(4), pp.399-405.
Teubner, R.A. and Stockhinger, J., 2020. Literature review: Understanding information systems
strategy in the digital age. The Journal of Strategic Information Systems, 29(4),
p.101642.
Urbach, N. and Röglinger, M., 2019. Introduction to digitalization cases: how organizations
rethink their business for the digital age. In Digitalization cases (pp. 1-12). Springer,
Cham.
Online
Major privacy issues concerning online privacy, 2019 [Online] Available Through; <
https://securitytoday.com/articles/2019/09/03/3-major-internet-privacy-issues-and-how-
to-avoid-them.aspx>
13

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Global Survey: 95 Percent of Healthcare Orgs Don’t Use Security Governance or Risk
Management Software, 2017 [Online] Available through; <
https://www.hcinnovationgroup.com/cybersecurity/news/13028880/global-survey-95-
percent-of-healthcare-orgs-dont-use-security-governance-or-risk-management-
software>
14
1 out of 14
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]