Integrated Professional Skills in Digital Age
VerifiedAdded on 2023/06/10
|13
|3790
|207
AI Summary
This report discusses the importance of integrated professional skills in the digital age, including collaboration tools used during the pandemic, cloud storage and computing, privacy and security challenges, and measures to overcome them. It also covers the benefits and limitations of local networks. The report emphasizes the significance of data privacy and security in business organizations and suggests measures to overcome the challenges.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated Professional
Skills in Digital Age
Skills in Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
Introduction.................................................................................................................................................3
Explain two collaboration tool which are used by the organization during pandemic to reduce the
physical contact.......................................................................................................................................3
Explain the cloud storage and cloud computing with their advantages and disadvantages in business....5
Identify the privacy and security challenges and explain what possible measure could be taken............7
Benefit and limitation of the local network..............................................................................................9
CONCLUSION.........................................................................................................................................10
Reference...................................................................................................................................................11
Introduction.................................................................................................................................................3
Explain two collaboration tool which are used by the organization during pandemic to reduce the
physical contact.......................................................................................................................................3
Explain the cloud storage and cloud computing with their advantages and disadvantages in business....5
Identify the privacy and security challenges and explain what possible measure could be taken............7
Benefit and limitation of the local network..............................................................................................9
CONCLUSION.........................................................................................................................................10
Reference...................................................................................................................................................11
Introduction
The integrated professional skill in digital age is significantly required for the
organizational growth as well as individual’s development. Digital age skill refers to the ability
of an organization or person to create a new knowledge and information according to the 21st
century skills. All these skill are essentially needed in order to communicate this world. There
are various professional skill that required in this digital age- with a basic communication skill
an individual or organization should have also need to increase their skill of social media
communication (Alkubaisy and et. al., 2021). An organization must have ability to learn the
advanced technology and new, methods to conduct their operational activities. In order to build
an unbreakable trust, responsibility and ethics are essentially required. Teamwork, critical
thinking, originality, reflection, problem solving, personal resilience are certain major thinking
ability and most significant for the growth of an enterprise. Therefore, this report will be based
on the collaboration toll that support the organization during pandemic without any physical
contact, advantage and disadvantage of eth cloud computing and cloud storage along with their
suitability and application at workplace. This report will also include the importance of privacy
and security for the business and measure to overcome from these barriers. At last there will be a
discussion on the benefits and demerits of using the local network within a nation.
Explain two collaboration tool which are used by the organization during pandemic to reduce the
physical contact
Collaboration toll are also knows as the team collaboration software- is a term, used for
defining various type of the software and other online services available to enterprise and people
that enable the, feasibly wok together for a common project. Pandemic has not only changed
where people work, but it also had a significant effect on how people work, and various software
organizations have noticed. During pandemic, organization had used various collaboration tools
that help them to conduct their business activities without a physical contact certain of these
tools are mentioned below:
Zoom- It is that cloud based video conferencing software solution which allows the business in
educational, health care, government sector and financial industry to conduct a virtual meeting
The integrated professional skill in digital age is significantly required for the
organizational growth as well as individual’s development. Digital age skill refers to the ability
of an organization or person to create a new knowledge and information according to the 21st
century skills. All these skill are essentially needed in order to communicate this world. There
are various professional skill that required in this digital age- with a basic communication skill
an individual or organization should have also need to increase their skill of social media
communication (Alkubaisy and et. al., 2021). An organization must have ability to learn the
advanced technology and new, methods to conduct their operational activities. In order to build
an unbreakable trust, responsibility and ethics are essentially required. Teamwork, critical
thinking, originality, reflection, problem solving, personal resilience are certain major thinking
ability and most significant for the growth of an enterprise. Therefore, this report will be based
on the collaboration toll that support the organization during pandemic without any physical
contact, advantage and disadvantage of eth cloud computing and cloud storage along with their
suitability and application at workplace. This report will also include the importance of privacy
and security for the business and measure to overcome from these barriers. At last there will be a
discussion on the benefits and demerits of using the local network within a nation.
Explain two collaboration tool which are used by the organization during pandemic to reduce the
physical contact
Collaboration toll are also knows as the team collaboration software- is a term, used for
defining various type of the software and other online services available to enterprise and people
that enable the, feasibly wok together for a common project. Pandemic has not only changed
where people work, but it also had a significant effect on how people work, and various software
organizations have noticed. During pandemic, organization had used various collaboration tools
that help them to conduct their business activities without a physical contact certain of these
tools are mentioned below:
Zoom- It is that cloud based video conferencing software solution which allows the business in
educational, health care, government sector and financial industry to conduct a virtual meeting
and also collaborate in e real time using an integrated communication tool. With the Zoom
meeting’s build in a collaboration instrument, workers can interact and share their screen during
the online meetings (Awasthy and et. al., 2018). Video conferencing platform in Zoom allow its
users to host the unlimited meeting by using a free plan. User can use the HD video and audio in
order to communicate virtually with their meeting participants in a video call. The feature
include unlimited video conferencing, voice, messaging, virtual workspaces, video webinars
screen sharing and many more.
Advantages
Easy to use and deploy- This tool is very easy to use- just download, click on it, then set
it up, after that person are off and running. It is so easiest pieces of the video
conferencing alternative that organization could every deploy
Interoperability- People can connect to the virtual meeting through laptop,. Mobile
device and desktop like seamlessly. In organization, Zoom conferencing tool is
compatible with the every device which is used within business to date.
Disadvantages
Cyber attack can shrink number of the users- If the Zoom security risk is not taken
care timely, then developing organization may face the economic backlash by losing a
big amount of the users simultaneously (Yu and et. al., 2021).
Lack of the comment control- A big part of the online event is the ability for individual
to comment and message with others in live chat. While the Zoom has various
customizations in that department, this does lack one very significant feature: ability to
delete a wrong comment on fly.
Microsoft 365- The Microsoft office may not be first platform people think of when it si about
collaboration tool, but now it run at heart of Microsoft 365 cloud based office suite. It is essential
because the Microsoft office remains most used and therefore significant office suite out there,
and while there are competitors like Google workspace, Open office they still have nit caught up
the same level in context of functionality and easy use. Microsoft 365 adopting sky rocked at the
time of pandemic or COVID 19 (Berger, 2022). Microsoft has rebranded its famous office 365
productivity suited as Microsoft 365 during March 2020. It is a cloud based subscription model
meeting’s build in a collaboration instrument, workers can interact and share their screen during
the online meetings (Awasthy and et. al., 2018). Video conferencing platform in Zoom allow its
users to host the unlimited meeting by using a free plan. User can use the HD video and audio in
order to communicate virtually with their meeting participants in a video call. The feature
include unlimited video conferencing, voice, messaging, virtual workspaces, video webinars
screen sharing and many more.
Advantages
Easy to use and deploy- This tool is very easy to use- just download, click on it, then set
it up, after that person are off and running. It is so easiest pieces of the video
conferencing alternative that organization could every deploy
Interoperability- People can connect to the virtual meeting through laptop,. Mobile
device and desktop like seamlessly. In organization, Zoom conferencing tool is
compatible with the every device which is used within business to date.
Disadvantages
Cyber attack can shrink number of the users- If the Zoom security risk is not taken
care timely, then developing organization may face the economic backlash by losing a
big amount of the users simultaneously (Yu and et. al., 2021).
Lack of the comment control- A big part of the online event is the ability for individual
to comment and message with others in live chat. While the Zoom has various
customizations in that department, this does lack one very significant feature: ability to
delete a wrong comment on fly.
Microsoft 365- The Microsoft office may not be first platform people think of when it si about
collaboration tool, but now it run at heart of Microsoft 365 cloud based office suite. It is essential
because the Microsoft office remains most used and therefore significant office suite out there,
and while there are competitors like Google workspace, Open office they still have nit caught up
the same level in context of functionality and easy use. Microsoft 365 adopting sky rocked at the
time of pandemic or COVID 19 (Berger, 2022). Microsoft has rebranded its famous office 365
productivity suited as Microsoft 365 during March 2020. It is a cloud based subscription model
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
which indicates same core applications and the traditional office version, as well as array of the
new artificial intelligence- and cloud powered app such as Yammer, Microsoft teams and one
drive.
Advantages
Enhance productivity- This tool with an extensive suite of the business tool
undoubtedly improves the overall productivity of the organization. When remote
employee can access the office 365 from their home, then they no longer need to worry
for coming into office in order to get their work done.
User- friendly- Microsoft collaboration tool is a little compatible with the touch screen
and mobile device. This can be exploited from any device through an internet connection.
It also helps the business to build a global team with the real time collaborative tools.
Disadvantages
Constant update with constant changes- Microsoft 365 rolls out features and updates
regularly. It is great for the tech- savvy workers who are utilized to mastering the tech
quickly. But if organization has a staff which is slow to adopt the changes, then Microsoft
365 might create certain problems.
Compatibility issues with the bespoke system- If people uses the bespoke application
in house, they struggle for keeping up with the office 365. This update very tome and
often that breaks integration or compatibility (Chatterjee and et. al., 2021).
Explain the cloud storage and cloud computing with their advantages and disadvantages in
business
Cloud Computing- The cloud computing means that storing and access the data over the
internet. The cloud computing doesn’t store the data on organisational computer’s hard disk, but
people can access the data from a remote server. It helps businesses or organizations to allow
users to download and upload the data through file storage system
Advantages
Cost Savings - The cost or money saving for the organisation is one of biggest cloud
computing benefits. It does not need any hardware investment but it save capital cost.
new artificial intelligence- and cloud powered app such as Yammer, Microsoft teams and one
drive.
Advantages
Enhance productivity- This tool with an extensive suite of the business tool
undoubtedly improves the overall productivity of the organization. When remote
employee can access the office 365 from their home, then they no longer need to worry
for coming into office in order to get their work done.
User- friendly- Microsoft collaboration tool is a little compatible with the touch screen
and mobile device. This can be exploited from any device through an internet connection.
It also helps the business to build a global team with the real time collaborative tools.
Disadvantages
Constant update with constant changes- Microsoft 365 rolls out features and updates
regularly. It is great for the tech- savvy workers who are utilized to mastering the tech
quickly. But if organization has a staff which is slow to adopt the changes, then Microsoft
365 might create certain problems.
Compatibility issues with the bespoke system- If people uses the bespoke application
in house, they struggle for keeping up with the office 365. This update very tome and
often that breaks integration or compatibility (Chatterjee and et. al., 2021).
Explain the cloud storage and cloud computing with their advantages and disadvantages in
business
Cloud Computing- The cloud computing means that storing and access the data over the
internet. The cloud computing doesn’t store the data on organisational computer’s hard disk, but
people can access the data from a remote server. It helps businesses or organizations to allow
users to download and upload the data through file storage system
Advantages
Cost Savings - The cost or money saving for the organisation is one of biggest cloud
computing benefits. It does not need any hardware investment but it save capital cost.
High Speed - The cloud computing allows the organisation a very high speed that
business surf very quickly in few clicks.
Back-up and Restore Data - If the data is stored in the cloud than it is easier to get the
recovery of data which is lost. Otherwise, it is very time taking process (Diaconescu,
Giuca and Lala, 2019).
Disadvantages
Performance may vary- While organisations are working on Cloud Computing,
business application or site is running on other server which may cause to provide
business data to others business or organisation.
Technical issues- In Cloud computing there is always an system outage or any other
technical issue. Even also the best cloud computing service provider companies may face
this type of issues.
Suitability- Major suitability of the cloud computing for small and medium enterprise include
easy deployment process, cost advantages, communication technologies, scalability, automatic
updates, easier access to the latest information, flexibility, automatic upgrades and improved
disaster recovery or back up capabilities.
Application- Cloud computing or service provider provides several applications in the field of
business, art, education, backup services and data storage, social networking, entertainment and
management. It allows a large number of the user to connect with others by using a social
networking application like Twitter, LinkedIn, Face book etc.
Cloud Storage- The cloud storage means that it is saving the data via third party site
storage system. It is a service model in which the company or organisation are used to data
transmitted and stored on remote desktop systems. There are several business or companies
benefits includes security, scalability, accessibility and cost efficiency and also employee can
work from anywhere. It is most important usely after Covid-19 pandemic.
Advantages
business surf very quickly in few clicks.
Back-up and Restore Data - If the data is stored in the cloud than it is easier to get the
recovery of data which is lost. Otherwise, it is very time taking process (Diaconescu,
Giuca and Lala, 2019).
Disadvantages
Performance may vary- While organisations are working on Cloud Computing,
business application or site is running on other server which may cause to provide
business data to others business or organisation.
Technical issues- In Cloud computing there is always an system outage or any other
technical issue. Even also the best cloud computing service provider companies may face
this type of issues.
Suitability- Major suitability of the cloud computing for small and medium enterprise include
easy deployment process, cost advantages, communication technologies, scalability, automatic
updates, easier access to the latest information, flexibility, automatic upgrades and improved
disaster recovery or back up capabilities.
Application- Cloud computing or service provider provides several applications in the field of
business, art, education, backup services and data storage, social networking, entertainment and
management. It allows a large number of the user to connect with others by using a social
networking application like Twitter, LinkedIn, Face book etc.
Cloud Storage- The cloud storage means that it is saving the data via third party site
storage system. It is a service model in which the company or organisation are used to data
transmitted and stored on remote desktop systems. There are several business or companies
benefits includes security, scalability, accessibility and cost efficiency and also employee can
work from anywhere. It is most important usely after Covid-19 pandemic.
Advantages
Cost effective online storage solution - Using traditional method to back up or store the
data is not cost effective. In other, the purchase items that are costly like hard disk, local
servers etc (Gritzalis and et. al., 2020).
Maximize Accessibility - It is another important advantage that helps of using cloud
storage in that organisation can access organisational account from anywhere with an
internet connection.
Disadvantages
Internet Dependency - The cloud storage depends always on the internet. If
organisations are outside or in some area where internet connections very low than
company will not work.
Privacy - In this organisations are depending on the provider, by which their security
data can become a concern, it may lose if business provide leaks their data security and
privacy fields.
Suitability- It is s right choice for the application development and testing. With a low
operational cost and zero capital cost, cloud can aid the organizations of any type and anysize
with a faster prototyping, deployment and development (Markandey and et. al., 2018).
Application- Cloud storage has variety of the applications including data sharing, resources
services and data backup. It also provides a standardized interface for the other network services.
Self developed B- cloud system is an example of the cloud storage technologies and applications.
Identify the privacy and security challenges and explain what possible measure could be taken
Data privacy- It is distinction between the data in a computer which can be shared with
the third party, and information cannot be shared with a third party. Data protection and
accessing control are two main aspects to enforcing the data privacy.
Data security- It is a process to protect organsiational data and preventing the information
loss through any unauthorized access. It includes protecting an individual’s or organizational
data from an attack which can encrypt or damage the data (Nakhodchi, Dehghantanha and
Karimipour, 2020).
data is not cost effective. In other, the purchase items that are costly like hard disk, local
servers etc (Gritzalis and et. al., 2020).
Maximize Accessibility - It is another important advantage that helps of using cloud
storage in that organisation can access organisational account from anywhere with an
internet connection.
Disadvantages
Internet Dependency - The cloud storage depends always on the internet. If
organisations are outside or in some area where internet connections very low than
company will not work.
Privacy - In this organisations are depending on the provider, by which their security
data can become a concern, it may lose if business provide leaks their data security and
privacy fields.
Suitability- It is s right choice for the application development and testing. With a low
operational cost and zero capital cost, cloud can aid the organizations of any type and anysize
with a faster prototyping, deployment and development (Markandey and et. al., 2018).
Application- Cloud storage has variety of the applications including data sharing, resources
services and data backup. It also provides a standardized interface for the other network services.
Self developed B- cloud system is an example of the cloud storage technologies and applications.
Identify the privacy and security challenges and explain what possible measure could be taken
Data privacy- It is distinction between the data in a computer which can be shared with
the third party, and information cannot be shared with a third party. Data protection and
accessing control are two main aspects to enforcing the data privacy.
Data security- It is a process to protect organsiational data and preventing the information
loss through any unauthorized access. It includes protecting an individual’s or organizational
data from an attack which can encrypt or damage the data (Nakhodchi, Dehghantanha and
Karimipour, 2020).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
During pandemic cyber attackers pounced. As business store their data in reliable software
but there are various privacy and security challenges that organizations faces. Certain of these
challenges are mentioned below:
Embedding privacy- Unluckily, various business organizations only have the data
privacy tacked onto their information technology and disaster recovery plan. But it is not
effective enough as data privacy touches on various parts of the organizations. Business
or people can not afford to treat the privacy as afterthought. It requires to be baked into
heart of organizational data strategy along with staff training.
Increasing maintenance costs- Preventing the information or data privacy and keeping
organizational system secure issues at an enterprise eleven may be costly. But cost of
data breach is so essential; people need to bullet or invest properly.
Difficult to access the control- Data privacy breaches are frequently caused by a poorly
managed access in the organizations. Process and people matter as much as the
technology. Humans are considering a weakest link in chain of the security and privacy.
Nevertheless, as distributed working proliferates it is difficult to manage the user access
and secure the organization or individual data (Verhezen, 2020).
Bad data culture- Nowadays, keep the data for its own sake broadens the attack surface
for the data theft that increase risk of the breaching various data privacy law. The forward
thinking information technology teams should balance the value of gathering storing and
processing a large volume of the data against pressing the requirements for security,
privacy and compliance.
Measure to overcome form the challenges or threats of privacy and security
Secure the Io T network- In order to avoid an interceptions form a rogue device and
other potentially harmful cyber attacks, company need to secure and protect the network
which is connecting different Io T devices. It is most straightforward on list as it only
touches on the security measure which everyone hopefully already follow online.
Traditional endpoint privacy and security business use must include the Antivirus,
Firewalls and Anti- malware.
Use Io T data encryption- If organization seriously against protecting the security and
privacy of the user and preventing information or data breaches, they need to encrypt the
but there are various privacy and security challenges that organizations faces. Certain of these
challenges are mentioned below:
Embedding privacy- Unluckily, various business organizations only have the data
privacy tacked onto their information technology and disaster recovery plan. But it is not
effective enough as data privacy touches on various parts of the organizations. Business
or people can not afford to treat the privacy as afterthought. It requires to be baked into
heart of organizational data strategy along with staff training.
Increasing maintenance costs- Preventing the information or data privacy and keeping
organizational system secure issues at an enterprise eleven may be costly. But cost of
data breach is so essential; people need to bullet or invest properly.
Difficult to access the control- Data privacy breaches are frequently caused by a poorly
managed access in the organizations. Process and people matter as much as the
technology. Humans are considering a weakest link in chain of the security and privacy.
Nevertheless, as distributed working proliferates it is difficult to manage the user access
and secure the organization or individual data (Verhezen, 2020).
Bad data culture- Nowadays, keep the data for its own sake broadens the attack surface
for the data theft that increase risk of the breaching various data privacy law. The forward
thinking information technology teams should balance the value of gathering storing and
processing a large volume of the data against pressing the requirements for security,
privacy and compliance.
Measure to overcome form the challenges or threats of privacy and security
Secure the Io T network- In order to avoid an interceptions form a rogue device and
other potentially harmful cyber attacks, company need to secure and protect the network
which is connecting different Io T devices. It is most straightforward on list as it only
touches on the security measure which everyone hopefully already follow online.
Traditional endpoint privacy and security business use must include the Antivirus,
Firewalls and Anti- malware.
Use Io T data encryption- If organization seriously against protecting the security and
privacy of the user and preventing information or data breaches, they need to encrypt the
essential data at both rest and i- transit between the Io T devices. It can be done by
undertaking Io T encryption algorithms. Whether the organization uses are symmetric
and asymmetric (Pitchai and et. al., 2019).
Authenticate Io T devices- Organization should allow the user to authenticate Io T
devices. It can be done by introducing certain multiple user management characteristic or
feature for the devices and after it implementing the mechanisms including Digital
certificate, two factor authentication and Biometrics.
Importance of the privacy and security in business organization
Significant for brand- As organization are associated with other many multinational
providers. Hence, they must have to think about their data security or privacy. In
business, data privacy is merely not any clause in organizational condition and terms.
This is embedded in each and every interaction with their client’s or customer. Security
and privacy of information or data can vastly impact their brand image. It may also
disrupt the customer’s experience as well as hurt the business reputation.
Customers cares about their privacy- Customer are becoming very smarten with time.
They are researching before using the online product and other things. They think that
organizations are stealing their personal information and worried about their personal
online privacy. Hence, they think that about their security and privacy when using any
application. It will help the organization to create loyal customer base or use base, thus
business can ultimately build a positive and strong brand image (Timonen, 2018).
Show business commitments to data privacy- Business organizations can take certain
steps so that they can protect the customer’s data. Firstly, company should start to
implement the data privacy in their product. They should implement such things which
are written in their privacy policy. Thus customer will think that organizations are taking
the privacy seriously.
Benefit and limitation of the local network
As Russia has planned to attempt something no other nation has tried before. Russia is
going to test whether they can disconnect from rest of this universe electronically when keeping
internet running for their citizens, that means respective country have to reroute all their data
undertaking Io T encryption algorithms. Whether the organization uses are symmetric
and asymmetric (Pitchai and et. al., 2019).
Authenticate Io T devices- Organization should allow the user to authenticate Io T
devices. It can be done by introducing certain multiple user management characteristic or
feature for the devices and after it implementing the mechanisms including Digital
certificate, two factor authentication and Biometrics.
Importance of the privacy and security in business organization
Significant for brand- As organization are associated with other many multinational
providers. Hence, they must have to think about their data security or privacy. In
business, data privacy is merely not any clause in organizational condition and terms.
This is embedded in each and every interaction with their client’s or customer. Security
and privacy of information or data can vastly impact their brand image. It may also
disrupt the customer’s experience as well as hurt the business reputation.
Customers cares about their privacy- Customer are becoming very smarten with time.
They are researching before using the online product and other things. They think that
organizations are stealing their personal information and worried about their personal
online privacy. Hence, they think that about their security and privacy when using any
application. It will help the organization to create loyal customer base or use base, thus
business can ultimately build a positive and strong brand image (Timonen, 2018).
Show business commitments to data privacy- Business organizations can take certain
steps so that they can protect the customer’s data. Firstly, company should start to
implement the data privacy in their product. They should implement such things which
are written in their privacy policy. Thus customer will think that organizations are taking
the privacy seriously.
Benefit and limitation of the local network
As Russia has planned to attempt something no other nation has tried before. Russia is
going to test whether they can disconnect from rest of this universe electronically when keeping
internet running for their citizens, that means respective country have to reroute all their data
internally rather than relying on the server abroad. Therefore, there are certain advantages and
disadvantages of the local network which are mentioned below:
Advantages
Simple and relatively inexpensive - The first and primary benefit of LAN (Local Area
Network) is that this is very quick or simple way to set up at reasonable price which
everyone can afford. If the Russian government intends to build the LAN at a low price
with flexibility for the people.
Collaboration of Resources - Since every expensive component such as printers,
scanners and accessories cannot be linked or installed to every desktop. But the Local
area network needs only one printer and scanners or accessories. So that everyone can
linked to that printer and scanners. There is cost saving for the government (Zhang and
et. al., 2019).
Disadvantages
Information Security that arises - The unknown user can also use the data or retrieve
the data if the network equipment is not working correctly or there is some technical
issue.
Long Distance major limitation - The LAN are often used or divided with a apartment
or building or complex and cannot be reached to the bigger or vast area.
Data Sharing via Outside sources - There is another limitation or drawback of Local
area network is that it is very difficult and time taking to send files or data from outside
network or third party network such as transportable gadgets like pen drives and CD.
(Zhou and et. al., 2018).
disadvantages of the local network which are mentioned below:
Advantages
Simple and relatively inexpensive - The first and primary benefit of LAN (Local Area
Network) is that this is very quick or simple way to set up at reasonable price which
everyone can afford. If the Russian government intends to build the LAN at a low price
with flexibility for the people.
Collaboration of Resources - Since every expensive component such as printers,
scanners and accessories cannot be linked or installed to every desktop. But the Local
area network needs only one printer and scanners or accessories. So that everyone can
linked to that printer and scanners. There is cost saving for the government (Zhang and
et. al., 2019).
Disadvantages
Information Security that arises - The unknown user can also use the data or retrieve
the data if the network equipment is not working correctly or there is some technical
issue.
Long Distance major limitation - The LAN are often used or divided with a apartment
or building or complex and cannot be reached to the bigger or vast area.
Data Sharing via Outside sources - There is another limitation or drawback of Local
area network is that it is very difficult and time taking to send files or data from outside
network or third party network such as transportable gadgets like pen drives and CD.
(Zhou and et. al., 2018).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONCLUSION
From the above report it is concluded that COVID 19 had changed the way of doing
business. Pandemic has changed various things within organization. For instance, nowadays,
companies have started to use the collaboration toll for the virtual meeting and any other task
within business environment. People do not need to spread over the wide geographical are to
exploit these tools or instruments. In house team also can execute the project better, attain higher
level of the transparency, and optimize resources and unparalleled collaboration from use of all
such tools. The cloud storage and cloud computing have gained mush popularity in within
software industry and not every biggest tech. Organization has their own cloud services. In
organizations. Data privacy or security is becoming mist significant thinks in 21st century. Now
customers are worried for their data privacy. So organizations need to follow the strict
regulations like CCPA and GDPR. These compliance are protecting customer’s privacy
efficiently. This report has also discussed about the benefits and limitation for using the local
network in a nation like Russia. Therefore, it is suggested that government of respective country
should take initiate after analyzing its positive and negative impact on the citizens as well as the
economy. It helps the government to take an effective and efficient decision.
Reference
Alkubaisy, D. and et. al., 2021, April. A Framework for Privacy and Security Requirements
Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-
From the above report it is concluded that COVID 19 had changed the way of doing
business. Pandemic has changed various things within organization. For instance, nowadays,
companies have started to use the collaboration toll for the virtual meeting and any other task
within business environment. People do not need to spread over the wide geographical are to
exploit these tools or instruments. In house team also can execute the project better, attain higher
level of the transparency, and optimize resources and unparalleled collaboration from use of all
such tools. The cloud storage and cloud computing have gained mush popularity in within
software industry and not every biggest tech. Organization has their own cloud services. In
organizations. Data privacy or security is becoming mist significant thinks in 21st century. Now
customers are worried for their data privacy. So organizations need to follow the strict
regulations like CCPA and GDPR. These compliance are protecting customer’s privacy
efficiently. This report has also discussed about the benefits and limitation for using the local
network in a nation like Russia. Therefore, it is suggested that government of respective country
should take initiate after analyzing its positive and negative impact on the citizens as well as the
economy. It helps the government to take an effective and efficient decision.
Reference
Alkubaisy, D. and et. al., 2021, April. A Framework for Privacy and Security Requirements
Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-
by-Design. In International Conference on Evaluation of Novel Approaches to Software
Engineering (pp. 67-87). Springer, Cham.
Awasthy, R. and et. al., 2018, June. Uicmm: A maturity model for university-industry
collaboration. In 2018 IEEE International Conference on Engineering, Technology and
Innovation (ICE/ITMC) (pp. 1-8). IEEE.
Berger, C.W., 2022. Privacy Law for Business Decision-Makers in the United States. In Ethics of
Data and Analytics (pp. 129-137). Auerbach Publications.
Chatterjee, S. and et. al., 2021. Enterprise social network for knowledge sharing in MNCs:
examining the role of knowledge contributors and knowledge seekers for cross-country
collaboration. Journal of International Management, 27(1), p.100827.
Diaconescu, A., Giuca, O. and Lala, I.R., 2019, October. Improving Workflows Through Digital
Collaboration in Software Development Projects. In International Symposium in
Management Innovation for Sustainable Management and Entrepreneurship (pp. 661-
677). Springer, Cham.
Gritzalis, S. and et. al., 2020. Trust, Privacy and Security in Digital Business: 17th International
Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020,
Proceedings (Vol. 12395). Springer Nature.
Markandey, A. and et. al., 2018, September. Data access security in cloud computing: A review.
In 2018 International Conference on Computing, Power and Communication
Technologies (GUCON) (pp. 633-636). IEEE.
Nakhodchi, S., Dehghantanha, A. and Karimipour, H., 2020. Privacy and security in smart and
precision farming: A bibliometric analysis. In Handbook of Big Data Privacy (pp. 305-
318). Springer, Cham.
Pitchai, R. and et. al., 2019. Prediction of availability and integrity of cloud data using soft
computing technique. Soft Computing, 23(18), pp.8555-8562.
Timonen, L., 2018. U2B collaboration promoting quality and relevance of education-case ERDI.
In Сотрудничество университетов и работодателей с целью обеспечения
качества и актуальности образования (pp. 67-68).
Verhezen, P., 2020. What to Expect From Artificial Intelligence in Business: How Wise Board
Members Can and Should Facilitate Human-AI Collaboration. In Challenges and
Opportunities of Corporate Governance Transformation in the Digital Era (pp. 61-90).
IGI Global.
Yu, J. and et. al., 2021. Building social media-based knowledge ecosystems for enhancing
business resilience through mass collaboration. International Journal of Organizational
Analysis.
Zhang, L. and et. al., 2019. Cryptographic solutions for cloud storage: Challenges and research
opportunities. IEEE Transactions on Services Computing.
Engineering (pp. 67-87). Springer, Cham.
Awasthy, R. and et. al., 2018, June. Uicmm: A maturity model for university-industry
collaboration. In 2018 IEEE International Conference on Engineering, Technology and
Innovation (ICE/ITMC) (pp. 1-8). IEEE.
Berger, C.W., 2022. Privacy Law for Business Decision-Makers in the United States. In Ethics of
Data and Analytics (pp. 129-137). Auerbach Publications.
Chatterjee, S. and et. al., 2021. Enterprise social network for knowledge sharing in MNCs:
examining the role of knowledge contributors and knowledge seekers for cross-country
collaboration. Journal of International Management, 27(1), p.100827.
Diaconescu, A., Giuca, O. and Lala, I.R., 2019, October. Improving Workflows Through Digital
Collaboration in Software Development Projects. In International Symposium in
Management Innovation for Sustainable Management and Entrepreneurship (pp. 661-
677). Springer, Cham.
Gritzalis, S. and et. al., 2020. Trust, Privacy and Security in Digital Business: 17th International
Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020,
Proceedings (Vol. 12395). Springer Nature.
Markandey, A. and et. al., 2018, September. Data access security in cloud computing: A review.
In 2018 International Conference on Computing, Power and Communication
Technologies (GUCON) (pp. 633-636). IEEE.
Nakhodchi, S., Dehghantanha, A. and Karimipour, H., 2020. Privacy and security in smart and
precision farming: A bibliometric analysis. In Handbook of Big Data Privacy (pp. 305-
318). Springer, Cham.
Pitchai, R. and et. al., 2019. Prediction of availability and integrity of cloud data using soft
computing technique. Soft Computing, 23(18), pp.8555-8562.
Timonen, L., 2018. U2B collaboration promoting quality and relevance of education-case ERDI.
In Сотрудничество университетов и работодателей с целью обеспечения
качества и актуальности образования (pp. 67-68).
Verhezen, P., 2020. What to Expect From Artificial Intelligence in Business: How Wise Board
Members Can and Should Facilitate Human-AI Collaboration. In Challenges and
Opportunities of Corporate Governance Transformation in the Digital Era (pp. 61-90).
IGI Global.
Yu, J. and et. al., 2021. Building social media-based knowledge ecosystems for enhancing
business resilience through mass collaboration. International Journal of Organizational
Analysis.
Zhang, L. and et. al., 2019. Cryptographic solutions for cloud storage: Challenges and research
opportunities. IEEE Transactions on Services Computing.
Zhou, J. and et. al., 2018, July. I/O characteristics discovery in cloud storage systems. In 2018
IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 170-177).
IEEE.
IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 170-177).
IEEE.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.