This document discusses the positive and negative usage of internet to society and businesses, the threats faced while using internet, and provides measures to be taken while using internet applications online. It also compares two unified communications providers - Vodafone and EE Limited.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated Professional Skills in the Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................1 MAIN BODY..................................................................................................................................1 1. Comparison and contrast among positive along with negative usage of internet to society and businesses..............................................................................................................................1 2.Threats organisations and society faces while using internet. Measures to be taken while using internet applications online................................................................................................5 3. Two unified communications providers..................................................................................6 CONCLUSION..............................................................................................................................10 REFERENCES..............................................................................................................................11
INTRODUCTION Digital age is stated to the time period starting in mid 19 century with launching of personal computers having subsequent technology to transfer information quickly addition to freely (Barrett and et. al., 2015). As digital technology is increasing rapidly so to use it effective skillsaswellaspropereducationaboutchangingtechnologiesisbecomingessential. Professional skills are termed to competencies that are acquired with proper coursework in order to develop future career. The skills like project management, leadership, conflict resolution and mentoring are part of professional skills that adds value for achieving success. The professional knowledge and skills in the digital age are updated with the help of various technologies. The report covers positive and negative usage of internetto society and businesses. It further discusses threats that organisations and society faces while using Internet. In addition, measures of security as well as privacy are identified that should be taken when internet applications are used online. At last, it states two different unified communications providers with comparisons of their features, applications as well as their suitability for businesses. MAIN BODY 1. Comparison and contrast among positive along with negative usage of internet to society and businesses. Internet is said to global inter linked network which primarily provides worldwide services, daily updates and wireless interactive communication. Various protocol suites are used byInternetforlinkingdistinctdevicesglobally.Initially,in1960sfederalgovernment association of United States and after that it has rapidly expanded in various parts of Europe as well as Australia till 1980s and after that became essential part for development of all economies. It is considered as guiding technology for the digital age. It is widely used by all individuals, business concerns as well as society. Comparison among positive addition to negative uses of internet for society and business are as follows: Basisof comparison BusinessesSociety PositiveusesofBusinessesaresaidtoanSocietyissaid to aggregationof 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
internetorganisation in which people work together for attaining more margins of revenues. Business concerns are using internet with the aim to propel the entity towards next level (Baym, 2015). The positive uses of Internet at businesses are as described: Gauging customer interest: Internetisbasicallyusedat businesses so to monitor customer interestadditiontopurchasing trends.Inordertodiscoverthe thinking of market audiences about specificcommodity,ownersof businesses visits social networking sites together with online message boards. For instance, car accessory businesses visits various car forums tosearchthewantsofcar enthusiastic. In addition, businesses usesinternetformakingpositive connectionsalongwith communicatingwiththepotential customers by using online websites. Advertising:Indigitalera, Internet is also used by businesses to search new clients with online advertising. Banner ads addition to offeringtextonwebsitesand informationalpieces,allows businessownerstoreachtarget individualslivingtogetherin ordered community. Internet is one of the decisive technology within digitalagethatisalsousedby society.Fewpositiveusesof Internetatsocietyareunder beneath: Education: By using internet, membersofsocietycanbrowse information to get educated. Society makes positive use of internet for educationpurposeasitiscost effective,providesaffordable educationandsuggestsvarious learningtools.Therearevarious educational websites that exists on Internet and using them effectively canhelpsocietytogather informationaswellasconduct research along with add knowledge aboutnumeroussubjects.Within society, internet is used as per the needsandininterestofsociety members. Job searching: Internet now a days has become a recruiting tool forsociety members. Various job search options as well as tools are providedbyInternettosociety members so that they can perform comprehensivejobsearch 2
marketquicklyaswellas efficiently. Advertisement types like pay per click, video ads, display and nativeadvertisinghelpsin distributinginformationabout organisational products on internet searchengineswhichallows managers to reach customers sitting atdistantplacesbyusingsearch terms concerned with business. Buying and selling: The another usage of Internet by businesses is sellcommoditiestodistant locations. Businesses makes account on various E- commerce websites forsellingproductsthroughcell phone contracts. Online selling put anendtoneedofmaintaining tangiblestoresandvarioustime, holding inventory is also not needed (Ellawayandet.al.,2015). Similarly, internet can also be used bybusinessesforpurchasing purposealsosuchasprinted materials addition to buying office supplies in bulk quantity. (BiancarosaandGriffiths,2012.) For example, job search engines can be used for looking for superiors and employers, job search websites forsearchingjobs,using professional association websites to lookforworkopportunitiesand many more. As diverse job search resources addition to services are available on Internet, Society uses them for searching jobs as per the interest of members. Current update: Internet provides informationabouthappeningson currentdurationadditionto daily updates instantly. It is considered as realtimehubfortheupdates concernedwithentertainment, business,politics,scienceand sports.Associetyismajorly concerned with what is happening at distant places, they uses internet togaindeepknowledgeabout situationsoccurringatanother locations or in many fields. Negativeusesof internet Internethasmadeexecutionof business operations in easy manner butvariousbusinessusesitfor wrong purposes. The negative uses ofinternetbybusinessesareas Few of the negative Internet usage by society are as described: Using inappropriate material: societyusesinternettowatch inappropriatematerialofthe 3
described: Delivering wrong products:As by using internet, businesses makes fastercommunicationbutdueto lackoffacetofaceconnections various time businesses in order to emptythestockdeliverswrong product that was not expected by customer. Posting wrong information: Toattractwidecustomerbase, businessesusesInternet.Many times,wronginformationabout products,prices,attributesand quality are posted on social media sites. These informations generally staysforeveraswellasarenot deletedwhichmakesconsumer attracted and hence used in negative ways. material that is only for adults. As childrenwithinsocietybecomes active users on internet it enhances possibilities as well as probabilities thattheywillwatchsomething inappropriate content that depends ontheactivitiestheydowhile remaining online (Flewitt, Messer and Kucirkova, 2015). Hacking accounts: In society, various people live and they uses Internet to hack accounts of other people for spurious activities that includes stealing confidential data additiontobankinginformation. Internetisnegativelyusedby variouspeopletogenerateprofit throughusinginappropriateways like stealing private information and withdrawingmoneyfromothers accountsorresellingconfidential information on internet. Despite of differences of usage of Internet by business and society, there are some similarities also. Business and society both uses internet to gain productive information about domestic, national or international market (Fraillon and et. al., 2014). Other then this, internet is used by both to transfer data, performing banking transactions, executing market research and playing interactive games. 4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2. Threats organisations and society faces while using internet. Measures to be taken while using internet applications online. Threat are said to risks that results in danger. Internet threat is type of threat concerned with information technology (Threats that organisation and society faces when using internet. 2017). Some of the common threats that are faced by organisation and society are as follows: Botnet: The aggregation of internet devices that are connected with each other and are running with the help of various bots are said to botnet. In addition, botnets are collection of software bots that breaches security and is controlled by third party. In present duration, Botnets are considered as biggest threats for security systems. These are the robot networks that exists for committing cyber crimes. They steals data, sends span as well as maliciously attacks whole network within which organisation is performing activities. In addition, terrorists also uses botnet for illegal purposes so to disrupt society without making any announcements. Thus, it is common threat for society and organisation as it leads towards enhancement of criminal activities. Hacking: The word that states actions taken by individuals for gaining unauthorised access of others computer (Hracs, 2015). It involves procedures that identifies weaknesses within network systems so to exploit as well as make wrong utilisation of other data or information. For example, cracking password algorithms in order to gain illegal authorisation of computer system to conduct some malicious activity as well as accomplishing illegal objectives are done through hacking. When network or accounts are hacked by someone else, there the privacy or security gets hacked that provides access to hacker for thieving confidential or sensitive information about organisation or society. Hacking is threat for organisation along with society as it discloses confidential information that can further create various issues. Virus: These are malicious computer programs which are sent with email attachments as well as gets download with purpose to infect personal computer as well as others computer too that are within the contact list that further results in malicious actions. While programs are running, various viruses are attached with them that infiltrate the hard drive as well as spread USB keys along with external hard drives. It slows down networking speed and freezes the system that results in diverse threats for business and society. Measures of security and privacy that are to be adopted while using internet applications online. 5
There are various facilities as well as service that Internet provides but at same duration there are possibilities of enhancement of cyber crimes together with other issues such as hacking of confidential data. Various security and privacy measures are made by software developers and when these are implemented while using internet application online can safeguard all type of informations from getting hacked addition to eliminates other treats also. Some measures are: Antivirus: A software that is installed within computers or networking systems and are designed for detecting along with destructing computer viruses. Antivirus protects systems form phishing attacks, malware addition to viruses by detecting, neutralising as well as eradicating malware software that are not identical as well as destroys computer viruses too. Examples of Antivirus are Norton, Avast and Aviro that are installed while using internal applications by all organisations and personal computers of society members for privacy and security concerns (Huda and et. al., 2017.). Using strong password:A password is a secret word that is used for verifying user identity during authentication procedures. The password must be only known to the user which will allow them to gain access of their devices. While using any type of internet service as well as application, it is necessary for organisations to use strong password as it will reduce wide chances of hackings. Strong password will help in maintaining privacy as well as secured records of huge information. Encryption: Encryptions are sole province that are primarily used for converting a message into code language which is only understandable by authorised parties and is done to secure the data from getting leaked. It securely protects content of the folders, tax information along with chats on emails from getting stolen. Thus, with the measure all the information are provided security as well as privacy to while data while using various types of Internet Applications. 3. Two unified communications providers. Communicationserviceproviderswhichtransportsinformationthroughelectronic means. It is used by all companies such as Internet, satellite, telecom as well as managed service businesses. Unified communication is said to service model that caters as well as delivers distinct communicationsoftware,servicesalongwithapplicationsglobally.Thetwounified communication service providers are as discussed beneath: 6
Vodafone: It is one of the multinational telecommunication conglomerate which has its headquarters at various locations of United Kingdom. In addition, it also operates activities within the regions of Europe, Oceania and Asia. The provider is also ranked on 4thposition for having diverse mobile customers (Larson and Miller, 2011). The company operates its networks in more than 20 countries and has made partnership agreements about networking with 47 further nations. EE Limited: the another mobile networking operator that provides internet services across United kingdom. The headquarters of the communication provider are located at Hatfield and its main offices are at Bristol, Doxford, Leeds, Darlington, North Tyneside and many other cities of United Kingdom. It is popular as largest network operator within United Kingdom. Similarities among Vodafone and EE Limited: Vodafone as well as EE Limited both uses best security applications that protect data along with confidential information of all customers.Both entities uses updated technology in order to reduce traffic problem on networking systems. Comparisons among EE Limited with Vodafone The comparison among both the entities is based on their features, applications a s well as suitability to businesses. The comparison is as follows: Basis of ComparisonVodafoneEE Limited FeaturesThe company Vodafone has following features: Itisatelecommunication companyhavingbasewithin UnitedKingdomaswellas interestinEurope.Itwas originatedaspartofBritish radar, Racal that was electronic firm.Thecompanyhas approximate640million customers(AboutVodafone. 2019). The company EE limited has following features: EELimitedismobile network operator which is a parent company of BT Group. It has more than32million customers. EELimited consolidates all type of communicationaspects addition to uses updated 7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Thecompanyhasbetter administratorswhoprovides intelligentroutesalongwith controls traffic on networks by usingdistinctnetworking software. Theentityalsodelivers facilities concerned with cloud storageinordertoprotect addition to store information of potentialcustomersforlong durations. Vodafonemanagersuses strongdataencryptionsfor protectingdatawhenitis transmitted to others. With use offirewallprotection,secure fibreadditiontopacket filteringbest telecommunication services are delivered to all customers as and when demanded. togetherwith modernisedcontact centres so to remain in contactwithdiverse customer base. The entity also provides distinct services such as track caller interactions, managinghighcall volumes and so on for other callers (Littlejohn, BeethamandMcGill, 2012). EELimitedmanagers providessecurityto safeguardthe informationofwide customhouse. Byusingfirewall protectionsand antivirussoftware, administratorsofEE limitedprotecttheir data as well as data of others from hacking. ApplicationsThe team of Vodafone uses efficient applicationstoprovideexpertise services so to remain connected with largecustomersanddeliveringbest servicesforensuringprogress. Followingaretheapplicationsof EELimitedhasteamwhich makesoptimumutilisationof newtechnologiestodeliver wide services to large customer base. Some of the applications orproductsprovidedbyEE 8
Vodafone: Unifiedcommunication application:Withthis application, Vodafone provides bestmixtureoftechnologies thataddressesallneedsof customerorganisations (Schmidt and Cohen,2013). Throughthisapplication, Vodafonedeliversbest interlinkingamongservices, clods,networksandpeople around the globe. Collaborationapplication: With this application software, multiple users are allowed to get engage in single file along withversionsarecontrolled. Theapplicationallows individual user to make parallel modifications to a file at the timealsopreservesallthe saved file that are edited by each users as various files. Limited are as follows: Broadbandinternet: EELimitedprovides broadbandinternet servicestowide customers.Internet accessissaidtothe ability of organisations as well as individuals to connectto Internetby utilisingcomputer terminalsandother devices.EElimited provides the access of broadband internet to its customers. Mobiletelephony:EE Limitedestablishes connectionswith users through mobile phones by providing access to publicswitched telephonenetworks. Thecompanyuses cellularnetwork architecturesothat userscansendtext messages and performs connectivities through E -mails. SuitabilityThe suitability of Vodafone is that theThe suitability of EE Limited is 9
entity takes advantages of pertaining competitionwithinbusiness environment as well as delivers best servicestocustomersthatbecomes easy to communicate with others. In addition,thebusinessusesvoice connectivitythatbenefitsinopting bestphonelinesalongwithvoice servicesthatsuitsallneedsofthe business. thatthecompanyexecutes activities in such manner that it staysconnectedwithdiverse clients without any hurdles in communicationsystems (Twiningandet.al.,2013). Moreover,widetypeof servicesareprovidedto customersbelongingfrom small, mid or large sizes that suits for EE limited. CONCLUSION As per the above discussion it can be concluded that the presence of professional skills are crucial while using internet successfully so that no barriers or hurdles are faced while usage. The positive uses of internet are advertising, gauging customer interest, education, job searching, buying and selling as well as getting current update. As digital era is improving, internet is used for negative purposes such as delivering wrong products, using inappropriate material, posting wrong information and hacking accounts. The common threats faced while security and privacy are virus, botnet and hacking. Measures to be adopted for protecting security and privacy while usinginternetapplicationsonlineareantivirus,usingstrongpasswordandencryption. Communication network service providers are Vodafone and EE limited. 10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES Books and Journals: Barrett, M. and et. al., 2015. Service innovation in the digital age: key contributions and future directions.MIS quarterly.39(1). pp.135-154. Baym, N. K., 2015.Personal connections in the digital age. John Wiley & Sons. Biancarosa, G. and Griffiths, G. G., 2012. Technology tools to support reading in the digital age. The Future of Children.22(2). pp.139-160. Ellaway, R. H. and et. al., 2015. Exploring digital professionalism.Medical teacher.37(9). pp.844-849. Flewitt, R., Messer, D. and Kucirkova, N., 2015. New directions for early literacy in a digital age: The iPad.Journal of Early Childhood Literacy.15(3). pp.289-310. Fraillon, J. and et. al., 2014.Preparing for life in a digital age: The IEA International Computer and Information Literacy Study international report. Springer Open. Hracs, B. J., 2015. Cultural intermediaries in the digital age: The case of independent musicians and managers in Toronto.Regional Studies.49(3). pp.461-475. Huda, M. and et. al., 2017. Empowering children with adaptive technology skills: Careful engagementinthedigitalınformationage.InternationalElectronicJournalof Elementary Education.9(3). pp.693-708. Huda, M. and Teh, K. S. M., 2018. Empowering professional and ethical competence on reflectiveteachingpracticeindigitalera.InMentorshipStrategiesinTeacher Education.(pp. 136-152). IGI Global. Larson, L. C. and Miller, T. N., 2011. 21st century skills: Prepare students for the future.Kappa Delta Pi Record.47(3). pp.121-123. Littlejohn, A., Beetham, H. and McGill, L., 2012. Learning at the digital frontier: a review of digital literacies in theory and practice.Journal of computer assisted learning.28(6). pp.547-556. Mattison, M., 2012. Social work practice in the digital age: Therapeutic e-mail as a direct practice methodology.Social work.57(3). pp.249-258. Ormond-Parker, L. and Sloggett, R., 2012. Local archives and community collecting in the digital age.Archival Science.12(2). pp.191-212. Schmidt, E. and Cohen, J., 2013.The new digital age: Reshaping the future of people, nations and business. Hachette UK. Tømte, C. and et. al., 2015. Educating online student teachers to master professional digital competence: The TPACK-framework goes online.Computers & Education.84.pp.26- 35. Twining, P. and et. al., 2013. Moving education into the digital age: The contribution of teachers' professional development.Journal of computer assisted learning.29(5). pp.426-437. Online: Threats that organisation and society faces when using internet. 2017. [Online]. Available through: < lhttps://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx> About Vodafone. 2019. [Online]. Availabe through: <https://www.vodafone.com/about> 11