This report discusses the positive and negative use of the internet in society and business, as well as the threats faced by organizations and society. It also explores the security and privacy measures while using internet applications. Additionally, it compares two unified communication providers.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated Professional Skills in the Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION.......................................................................................................................3 TASK 1.......................................................................................................................................3 Compare and contrast the positive and negative use of the internet to the society and business...................................................................................................................................3 TASK 2.......................................................................................................................................5 Discuss threats faced by organization and society and also identify the security and privacy while using the internet applications.......................................................................................5 TASK 3........................................................................................................................................6 Compare between the two unified communication providers.................................................6 CONCLUSION............................................................................................................................9 REFERENCES............................................................................................................................9
INTRODUCTION Organization and society is using the internet and are also aware about the impact of the interment on their lifestyle. Digitization is increasing and the people are facing the various other problems which relating to their security and privacy of the data which is provided to them. The pert is discussing the threats which are faced by the organization on the large scale and the society as well. The positive and negative use of the internet is provided in the report. Two different unified communication provided are discussed in the report and the report would provide the knowledge to the students regarding the use of the internet. TASK 1 Compare and contrast the positive and negative use of the internet to the society and business Positive use of Internet society and business are using the internet on the large scale. Life of the business man and people are covered with the internet. Life of the people is revolving around the Internet without the help of the internet people are not able to complete their single task(Blaschke 2018). Improving the communicationamong the people by the way of the application like the social media and the whatsapp as well. People are using the social media and would be easily communicating with the other people all over the world. Employees and customers would be easily communicating with the other people and business are using the social media for marketing of the products and the for increasing the business. Marketing of productsand increasing the business is the best way to improve the business. Nowadays people are buying the products online, and they would be using the online application which would solve their problems. People are also giving the feed back forms and the reviews regarding the products on the application. The businessmen and people do not have the time to visit the store and buy the product but in the case of the online shopping people are buying the products online and the also products could be exchanged if the products is not appropriate as per the customers(Bridgstock 2016). Easy advertisementcould be effectively done on the internet. Advertising is done on the social media like the what's app and the twitter and Instagram as well. These would have the have resulted in the increase in the use of the internet and these social media platforms has increased the business and also search engine optimization would be used by the people and
the businessmen. Any type of the information is provided on the search engine and these would result in the easy advertisement for the products. Increase in the researchon projects and these would have resulted to gain any type of the information from the internet at the large scale. Research work is done by the students which are completing the projects and for that they need to have done the research on internet. Internet is easily accessible for the employees also, and they also could easily complete the project on the given time(Casale Caplan and Fioravanti 2016). Negative use of internet Increase in the competitionbecause people do not have the time to visit the stores and bu the products. So people are using the online application for shopping and the products would be easily delivered on the time. So these have increased the competition in market and these would have resulted that the products are sold in the online market at the low cost. Business do have the option because they do not have to bear the cost for selling the online, and they have to bear the heavy losses for selling the products at the stores. Securityis must for every one and people are using the internet at the large scale and these online application would have all the data regarding the product. Internet hackers could hack the software and use the accounts and password details. All the sensitive information would be provided to the hackers by the way of the giving the detail on the online application. Quick destruction of the company imagebecause it would spread the news rapidly and these would occur the destruction on the large scale. Quick destruction would spoil the image of the company rapidly, and they would not have the time to look after the reason and try to solve problems which would affect the company image(Gretter and Yadav, 2016). Poor Impersonalitywould result in the poor impersonality among the employees whichareusingtheonlineapplicationsandthesewouldhaveresultedinthepoor impersonality among the people which are working in the effective way. These would also result in the miscommunication among people and these would create the problems. Face to face communication would make the people communicate in the effective way. People would be able to communicate with the confidence and try to convince the person which is in front of them. Employees would be productive and the communication would result in the productive way.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TASK 2 Discuss threats faced by organization and society and also identify the security and privacy while using the internet applications Threats faced by organisation There are various threats which are faced by the organisation which would include the ransomware attacks and the phishing attacks as well. In some cases employees are using the internet for research work and there are chances of breaching of the data which is stored in the computers. The sensitive content and confidential information would lead to the leak the information of the company(Huda, and et.al., 2017). Ransom ware attacks are the problems for the companies because the data would be carried and company would be able to achieve the targets. Ransom ware attacks would include encrypt files which would contain the various and the data in the computers would be encrypted. In the report the attacker would demand the ransom from the company for restoring the data and for utilizing the data which is encrypted. Phishing is the type of the social engineering attack which would steal the information of the computers and laptops. The data stole while the phishing attacks is the credit card numbers and the password and many more sensitive data. The attacker is sending the messages to email which would stole the data and it would also sue the data in the effective way. Cyber crime is increasing and the cyber attack is done by the way of the internet. These would use the data f use and try to analyse the data which is store din the mobile applications (Huda, and et.al., 2017). Threats faced by the society there are various threats which would affect the life of people. people would affect the problems regarding the spams. Spams are the emails which would contain the junk mails and the details well. These junk data would include the spam emails and these would also include the virus in the link which would hack the data of the computers. The spam would be the direct threat for the people which would affect the society. Trojan would leave the computer unprotected and these would affect the data of the unprotected as well. Trojan would steal the data from the computer systems as well. It would harm the computer program and without being detected by user. These would affect the data
and people would use the computer without detecting any of the problems(Huda, and et.al., 2017). Adware is the software which would affect the display and the stole which would contain the data of the computers. These would include the adverting websites and the marketing type of the data would be used by the user for promoting the data of the computers. Adware is entering the computers by the way of the free download websites and many more. Security and privacy measures while using the internet People would use the internet application which would also include the sensitive details and the personal details of the customers which would affect the life of people. These personal details would be hacked by the way of the hack software and so people have to maintain the privacy and security measures while using the internet application. The people would set the strong passwords for the security of the accounts. These passwords must contain the symbols and the strong alphabets which would not be analyzed by anyone in the company. While using the internet applications details would be provided but the privacy of the accounts would be maintained by the way of the checking the social privacy of the accounts which are used on the social media. People must keep the email and the phone number private and track the orders and the messages which are in the phone. People must review the policy and the permissions which are given by the people which have approved the permissions. If the permissions have been approved they would be analyzed and if the permission is not needed for the running the application. The permission must be not be approved by the use which is using the application(Jaeger and Bertot 2016). TASK 3 Compare between the two unified communication providers Unified communication providers are the business and the making of the products which would include the communication services as well. It would provide the facilities and the instant messaging and the presence of information. Mobile features and these applications would increase the business and provide the effective services for communicating to each other in the any corner of the world. BasisOracleCisco FeaturesOracle is providing the software for theCiscoisdealinginthehigh
whichwouldincludethedatabase systems which would store the data in the computersin the effectiveway. Therearevarietyofthedatabase which is formed by the company and also these data base are upgraded as soonaspossiblebecausethe technology is increasing rapidly. The databasewouldincludetheweb technologyand thejavaaswell.It would include the stored procedures which need to be followed by the user for storing the data. For running the data in the effective way it would need the licensing of the database and it needs to be upgraded by then use for using the new features. technologysoftwareandthehigh technology products as well. Cisco is providing the products like the voice overipandhostedcollaborations solutionswhichwouldbeusedby userforcommunicatinginthe effective way. These services would includethecableservicelikethe wireless and the cordless products. In thehostedcollaborationsolutionit wouldincludetheunified communication system. It would also include the delivery solution of the Ciscocommunication(Marino,and et.al., 2018). ApplicationsThe software of oracle would include the business applications which would perform the functions of the financial and manufacturing the and it would store the data of the every department of company in the effective way. It would contain the oracle retail industry which would cover the details of the retailindustryandtheprice managementaswell.Oraclefusion applicationsisandoraclesocial engagement monitoring systems would letthebusinesscapturethebrand considerations and it would rive the Cisco is providing the application like theapplicationsecurity.These securities would include the security oftheapplicationwhichwould include the security of the data which is stored in the application. Cisco ans solutions would include the security of the application and the oracle as well. This application would contain the solution of the oracle software and the network of the Cisco as well. In the digital media delivery application itwouldincludethevideo applicationswhichisusedbythe
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
detailtothepersonwhichwould include the social and the Customer channels(Place Smith and Lee 2016). employersinthebranchoffices. Theseapplicationswouldhelpthe employees to store the data and look aftersolutionsofthefacedwhile working in the company. Suitability for business Due to these applications and the new feature of the application company is gaining the profits and the company wouldgaintheprofitsatthelarge scale. Oracle has build the brand image in the field of the which is making the software for storing the data. There are manyofthecompetitorsinmarket which are striving hard to survive in market. These applications would run the business but these applications are only used by the companies it cannot be used by the individuals. It would store the data and these type of the data is generated in the companies and the individualpersonodesnothaveso many data for storing the data in the data base. Byeffectiveworkingofthe application the company would gain the profits and the company is running the successful in the market because ofthecommunicationservicesand products which are provided by the company.Companyhasbuildthe brandimageofworkinginthe effective way. Company products are not only used by the business but it wouldalsousebytheindividual people and society as well. Cisco is sellingthetelecommunication productsaswellandthishas increasedtargetedcustomerswhich would buy the products. Company has increased the productivity by the way oftheseapplications(Villagonzalo, and et.al., 2018). CONCLUSION From the above report it would be concluded that the society and the business man are using the internet and these would affect the life of the people. The organization and society is facing the threat like the ransomware and the spam mail which would stole the data which is stored on the computers. The peoplehaveto maintain the security and privacy measures while
using the internet applications. These security measures would help the employees to work in the effective way and complete the work accordingly. The unified communication providers are analysed and compared as well. These would have launched the applications for protecting the data and for storing the information of the computers.
REFERENCES Books and journals Blaschke,L.M.,2018. Self-determinedlearning(heutagogy)and digitalmediacreating integrated educational environments for developing lifelong learning skills. InThe Digital Turn in Higher Education (pp. 129-140). Springer VS, Wiesbaden. Bridgstock, R., 2016. Educating for digital futures: what the learning strategies of digital mediaprofessionalscanteachhighereducation.Innovationsineducationand teaching international. 53(3). pp.306-315. Casale, S., Caplan, S.E. and Fioravanti, G., 2016. Positive metacognitions about Internet use: Themediatingroleintherelationshipbetweenemotionaldysregulationand problematic use. Addictive behaviors. 59. pp.84-88. Gretter, S. and Yadav, A., 2016. Computational thinking and media & information literacy: An integrated approach to teaching twenty-first century skills. TechTrends. 60(5). pp.510-516. Huda,andet.al.,2017.Empoweringchildrenwithadaptivetechnologyskills:Careful engagementinthedigitalınformationage.InternationalElectronicJournalof Elementary Education. 9(3). pp.693-708. Huda, and et.al., 2017. Strengthening interaction from direct to virtual basis: insights from ethical and professional empowerment. International Journal of Applied Engineering Research. 12(17). pp.6901-6909. Huda,andet.al.,2017.Fromliveinteractiontovirtualinteraction:addressingmoral engagement in the digital era. Journal of Theoretical and Applied Information Technology. 95(19). pp.4964-4972. Jaeger, P.T. and Bertot, J.C., 2016. Government information librarians: New skills and training for the digital age. In Government Information Management in the 21st Century (pp. 21-34). Routledge. Marino, and et.al., 2018. Positive mental health as a predictor of problematic internet and Facebook use in adolescents and young adults.Journal of Happiness Studies. 19(7). pp.2009-2022.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Place, K.R., Smith, B.G. and Lee, H., 2016. Integrated Influence? Exploring public relations power in integrated marketing communication. Public Relations Journal. 10(1). pp.1- 35. Villagonzalo,andet.al.,2018.F208.COGNITION,POSITIVESYMPTOMS,AND INTERNET USE FOR MENTAL HEALTH IN PEOPLE WITH PSYCHOSIS. Schizophrenia bulletin. 44(Suppl 1). p.S302.