This paper analyzes the role of ICT in pandemic situations, collaboration tools like Microsoft Teams, Trello, Slack, cloud storage, cloud computing, privacy, and security challenges faced by businesses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated Professional Skills in Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract This paper analyses about the information communication technology (ICT) , its roles and requirement in the pandemic situation. This will basically provides the general information regarding the collaboration toolssuch as, Microsoft teams, trello, slack, air table, web-ex meetings etc. which have played a great role in connecting people , providing informations, and spreading general awareness also. With great uses, comes disadvantages too, which are also analysed below. Moving further, this report contains the term cloud storage, its uses, suitability and other features. It is the most effective tool used to store files in. cloud computing and privacy and security is also highlighted in this report. As privacy is the basic requirement for every business organisation, its importance is also discussed over here. As threats are the common issue faced by the networking sites and the business organisations, some protective measures are also provided by this report, including this, the challenges and benefits of the private internet local to a specific country are debated over here. And at last, a brief conclusion is provided, so as to make the research more specific and clear.
Table of Contents Abstract.................................................................................................................................................2 INTRODUCTION................................................................................................................................4 MAIN BODY.......................................................................................................................................4 LITERATURE REVIEW OF COLLABORATION TOOLS..........................................................4 Analysis and Discussion..................................................................................................................6 Privacy and security during pandemics..........................................................................................7 Private VS Public internet...............................................................................................................7 Conclusion............................................................................................................................................8 References...........................................................................................................................................9
INTRODUCTION Information and communication technology is a type oof instrument which is used to create, store, transfer and exchange of information. It plays an important role in operating a business- helps in creating smooth connects among the employees, workers, suppliers and customers, useful to maintain the inventory in the organisation, to manage the organisation's information system, important for ensuring good customer relationship management(Magerakis and Habib, 2021).It is helpful for taking various business decisions related to the finance of the company, sales, trends in market, etc. During COVID 19, ICT helps business to keep connected, provide distributed services, helps in fulfilling business needs and helps in conducting virtual education system. This report will also discuss various elements related to modern business technologies which are being rapidly integrated into companies nowadays such as cloud computing and cloud storage which are seeing widespread adoption rates recently. Key discussion will also be held in regards to the various privacy and security challenges that businesses face such as hacking and phishing along with the threat of sensitive data leaks and there will also be discussion held on the drawbacks and benefits of private and public networks. MAIN BODY LITERATURE REVIEW OF COLLABORATION TOOLS Collaboration tools are instruments like apps or software programmes which used by business teams and groups to connect with each other for their business objectives. They could be technological like zoom and Skype and non- technological like newspapers, whiteboards, etc. These tools are like whiteboards present in the conference room where employees sit around for meetings. These are helpful in increasing the the efficiency and effectiveness, it also boosts productivity and satisfaction of employees. According to the opinion of Lauren Reed, 2020 these tools are very helpful in connecting to people as it is easy to create an account and schedule meeting(10 Benefits of Zoom for Small Businesses, According to This CTO, 2022).The benefits of connecting through these platforms is that you can easily share your ideas and helps in connecting large groups without physical office space, it also helps in keeping business organised, they mostly they ask for permission before sharing your files other people. Collaboration tools helps in keeping information secure and safe by providing safety policies. They are easy and affordable and people use collaboration tool as a troubleshooting, as it also allows you to switch your calls into video calls. Time is an important factor for a business, it helps in attaining our goals timely. When employees connect with each other they are working for saving the time in organisation, so that the organisational goal can easily and efficiently get achieve. They also have feature of virtual background and has strong administrative dashboard which is helpful to analyse issues that may occurs during meetings and also gives better understanding that how users are holding meetings. No technical advice is required in order to use these tools, it is very easy to operate. It allows users to connect virtually through video conferencing, audio conferencing, webinars, meeting recordings, live chats. So, using collaboration tools is important for smooth working of the organisation. Cloud storage is a service which allows you to save and backup your data on internet, now you do not need to purchase any server, external hard drives, or memory sticks to carry your data from one place to another. The three basic use of cloud storage is to store all types of information and can access on it through computer or mobile phone with an internet connection. You can also share files with many people at the same time and if your computer ever is lost, stolen or get damaged you can get it back as cloud storage is also allows you to back up your data. Aleksandar Kochovaski, 2022 states that cloud storage makes sharing of files easy and keep them encrypted. Files remain stored in cloud storage for life time and can backup up your data, if you lose it(The Risks and Benefits of Cloud Storage in 2022, 2022).But you can store data in it to certain limit, after that payment is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
required for the storage and you may also face issues related to security and privacy with some providers. It has feature of sync, to use it you need to download a cloud app called client sync and log in. If the app is installed on multiple devices, the files will sync immediately across all device, which means you don't have to download or upload files manually and you can also easily share files by finding files in your cloud account and share it. But there are some disadvantages of using cloud storage, they are dependent on internet connections and also have extra costs for uploading and downloading files. Cloud storage does not have best support, mostly when you are using a free version of cloud provide, they provide knowledge base. Your data is also not on your physical storage while using cloud provider. In accordance with Steve Ranger, 2022, cloud computing is related to the delivery of computing services which includes servers, storage, databases, networking, software, analytics, and intelligence on the internet(What is cloud computing? Everything you need to know about the cloud explained, 2022).It can be of two type public and and private. It is famous option for the people who are engaged in a business due to several reasonslike for cost saving increasing productivity, speed,efficiency,performanceandsafety.Firmscanavoiditsupfrontcostsandlengthy procurements by using cloud computing as it only have to pay for resources they will consume and also the maintenance of their own IT structure is not necessary, it just have to pay for what they are usingandwhentheyareusing.Ithelpsinensuringbusinesscontinuity,speeddigital transformation, improve defence attitude, decrease expenses related to IT.It also reduces the costs of purchasing hardware and software and setting up and they provide self service and o demand large amount of resources can be provisioned in a minute. It provides you the benefit of ability to scale elasticity which means delivering right amount of IT sources for example more or less computing power, storage, bandwidth when it is needed and from the right geographic location. Some providers offer a wide set of policies, technologies and control which helps in saving your data. Cloud computing is used in day to day online activities like sending mails, editing documents, watching movies and televisions, listening to music, playing games or saving photos and other important files. It is likely that cloud computing is making it all possible behind the scenes. It is suitable for development of application and testing, desktop clouds and productivity are better off with the clouds. The applications of cloud computing are art, business, data storage and back up, education, entertainment, management, social (Vartholomatou, Pendaraki and Tsagkanos, 2021). Thecontroloverthepersonalinformationisknownasprivacyandtosecurethat information is known as security. But there is a risk related to privacy as hacking is increasing nowadays, some business have little technological defences, they are less aware about the threats and also have less time and sources to incur in cyber safety. The difference between data privacy and data security comes down to who and what your data is being protected from, security can be definedasprotectingdatafrommaliciousthreat,whileprivacyismoreaboutusingdata responsibility. This make them easier target for hackers in comparison to the big business. Joel Witts, 2022 has discussed regarding the cyber security threat, he mentioned that some major challenges like phishing attacks, it is related to the attempts made by the hackers to steal the customer's money or their identity by getting them to bring out their personal information as lot of personal information is stored online and in company's database(Privacy vs. Security: What’s the Difference?, 2022).There are various things by the privacy and security of a business get affected and hackers can easily get accessed to it like malware attack, ransomware, weak password, insider threat which allows hackers to attack the privacy of the customers. For a business it is important to maintain the safety and keep privacy of their customer as it ensures the firms goodwill in the eyes of the customers. If organisation does not values their customer's privacy then there will be risk of losing the valuable relationship between two. Organisation which offers customer's privacy as their utmost priority improves their brand value. Company needs maintain the privacy of their customer's personal information for supporting personal ethics and loyalty.There are requirements that state organizations that fail to comply with laws and regulations regarding data privacy may face
monetary fines and violation of these laws can result in punishment. Analysis and Discussion Collaboration tools Skype-Skypelaunchedin2003anditisthesoftwarewhichenablestheworld's conversationwith millions of people and businesses and they areusingthisapp for connecting with new people. Theyprovide variety of services to their users like 'personal needs and offers premiumplan with additional features and alsoimprovethe feature which is based onbusiness solution. This is a free app – based communication tool and it has the internet telephony services provider which offer free services(Noonan, 2012). Features of Skype Skype translate-This featureshelp to doing conversation with different peoplein different language to communicate each other. Screen sharing-It means Share the desktop screen to other device to share the information which helps in productivity and training. End- to-end encryption-Chat and meet with other people without worrying about unwanted disturbance in call . In pandemic thousands of peoples are isolated they want ' to keep in touch' with people ' so they have to turn in social networking sites such as Facebook , Instagram, Skype, Zoom etc. This collaboration tools help the people to interact with others and also company take advantage of these situation for exampleMicrosoft teams also grab this opportunity and try to attract the millions of new users for hoping to keep connected with colleagues, friends and family while working from home the companydemand also increase in pandemic 40 million people are using Skype app the company said it's seen a 220% increasing in Skype- to- Skypecalls(Nami, Marandi and Sotoudehnama, 2018). Zoom –It is a cloud- based video conferencing services which can use to virtually meet with othersby doingvideo callsandthey conducting live chatsand recording featuresalso to view later.500 companies reportedly used Zoom in 2019 and during 2020 it hit and increase greater height the racking up 227 per cent growth over the year. Features of Zoom One-on-one meetings-In this featurepeople can host theunlimited meetings which are free of cost which makes zoom an economical option for business communication. Recording-This feature is very helpful for students and teachers in pandemic because they can record their secessions or events in advance . Screen sharing –If we meet the large groups and share any information to all user' so we have a option to share the screen with them so they can see. Group video conformances-This feature help the user tohost the andadd themultiple participant in one video conferencing up to 40 minutes and 100 participant in free of cost. In pandemic inCOVID-19 situationforced many small business far away to their work ' Zoom and other web conferencing are providing an opportunity for small business to explore new ways of operation and growing. The pandemic improve the way of small business in positive ways.
Zoom and other technologies try to provide ways to small business to stay connected to their clients and co- workers during the pandemic. Privacy and security during pandemics The biggest cyber security threats that small business and companiesfacein pandemics. They need to be aware of the threats and try to protect themselves against them. Phishing Attacks-This the biggest and most damaging threat whichfacing by small businesses . This is a type of social engineering attack which used to steal user data, personal details and credit card numbers. “The most common phishing attack is fake emails”' thisphishing mails might ask the user to open an attachment or call a fake customer care number, and these mails include a sense of urgency after this they steal your personal data(Amin, 2012). Malware Attacks-This is the second biggest threatfacing by businesses and company and they have variety of cyber threats are trojans and viruses. This is a term of code that the hacker create to gain access to networks, destroy data on phone or computer and steal data. It usually comes from malicious website downland or spam emails which connected to other devices. This attacks are particularly damaging for small business the reason is lack of device protection, lack of knowledge. Weak passwords-Many small business are using week password in multiple cloud and which is based on services which require different accounts. These services contain personal data and financial information. ,this cause help thehackertoknow the password and stole the personal data. The measures that businesses must use to protect or prevent their business from cyber crime are listed below. Create Secure networks-The firm has to create a system security plan which helps to keep their data secure. Update password –The firms must ensure that their passwords are updated at all times and are complex enough to not let hackers enter their system easily. Having strong passwords which are enforced through multiple encryptions are necessary for the purpose of having a secure digital and information system. Educate employees-The company need to focus of their employees and educate them to learn cyber- securityand provide proper training to protect the company against the cyber crime. Identify the risk –Firstly the company need to identify the risk then create the list and understand the problem then try to solve them and ensure that technology of the company is latest versions of application, web browser andoperating system . This help to give more protection and privacy to the company(Herrera-Joancomartí and Pérez-Solà, 2016). Private VS Public internet Private internet-This network is based on that network that uses in private address space of IP addresses . These address are commonly used for office, small business, enterprise. This network is used within a private network to connect securely to other device with the same network and each device with the same network has a unique private IP address. Benefits of private network-There are the factors of private network are listed blow.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Security-The internet have a full of great content , but it also contains fair and nasty applications and user wants to protect their data. Theprivate network is that not being connected to external networks theyhelp to protect their data safe and secure because this is based on IP address they provide proper security and privacy to their users(Wagner, 2013). Self- containment-This networkare not beingconnected to external networks ' so they are not facing any technical difficulties if they face any problem in the network with internally spread viruses ' they can easily addressed the virus by serving the network and protect them. Challenges of private network-There are the factors of private network are listed blow: Isolation- while the isolation the private network is increased security and it face difficulty to go Heigh Maintenance costs, coverage limitations and low customization. Public network –It implies that every one has the access to use this network it is a global system of interconnected computer networks that helps to interchange the data for example – internet it is a large scale public network which include thousands of devices and websites. Benefits of public internet-There are the factors of Public network are listed blow Convenience-This network allow to connect multiple users through the same network and its easy to use and convenient for the users. Mobility-It helps to carry out the work from any where and easily connectwith the mobile devises' Challenges of public network –Factors of Public network are listed blow Security –Due to this network it has heigh chances of being hacked easily and leak personal data. Speed-This connection is more slower than wired connection because it allow to connect multiple devise in the same network(Gattiker, Perlusz and Bohmann, 2000). Conclusion The above report went to detail regarding the meaning and significance of ICT business and its roles which is based on during pandemics in details. It includes various information about collaborations tools, uses and their advantages and disadvantages. There was discussion held on key topics such as Cloud storage, Cloud Computing, Privacy and security in pandemics and difference between private and public internet and their benefits and challenges. It has been concluded from this report that addressing privacy and security issues is important for any company to survive. References Book and journals
Amin, S.M., 2012, July. Smart grid security, privacy, and resilient architectures: Opportunities and challenges. In2012 IEEE Power and Energy Society General Meeting(pp. 1-2). IEEE. Gattiker, U.E., Perlusz, S. and Bohmann, K., 2000. Using the Internet for B2B activities: a review and future directions for research.Internet Research. Herrera-Joancomartí, J. and Pérez-Solà, C., 2016, September. Privacy in bitcoin transactions: new challenges from blockchain scalability solutions. InInternational Conference on Modeling Decisions for Artificial Intelligence(pp. 26-44). Springer, Cham. Magerakis, E. and Habib, A., 2021. Business strategy and environmental inefficiency. Journal of Cleaner Production, 302, p.127014. Nami, F., Marandi, S.S. and Sotoudehnama, E., 2018. Interaction in a discussion list: An exploration of cognitive, social, and teaching presence in teachers’ online collaborations.ReCALL,30(3), pp.375-398. Noonan, M., 2012. Managing manipulation: tools and challenges in creative collaborations with intellectually-disabled people.Disability & Society,27(7), pp.997-1009. Vartholomatou, K., Pendaraki, K. and Tsagkanos, A., 2021. Corporate bonds, exchange rates and business strategy. International Journal of Banking, Accounting and Finance, 12(2), pp.97- 117. Wagner, B., 2013. Governing internet expression: How public and private regulation shape expression governance.Journal of Information Technology & Politics,10(4), pp.389-403. Online referencing What is cloud computing? Everything you need to know about the cloud explained, 2022 [online] available through <https://www.zdnet.com/article/what-is-cloud-computing-everything- you-need-to-know-about-the-cloud/> The Risks and Benefits of Cloud Storage in 2022, 2022[online] available through <https://www.cloudwards.net/the-risks-and-benefits-of-cloud-storage/> 10 Benefits of Zoom for Small Businesses, According to This CTO, 2022[online] available through <https://blog.zoom.us/10-benefits-of-zoom-for-small-businesses-according-to-this-cto/> Privacy vs. Security: What’s the Difference?, 2022[online] available through < https://www.howtogeek.com/765272/privacy-vs-security-whats-the-difference/#:~:text=Privacy %20refers%20to%20the%20control,protected%20your%20personal%20information%20is.>