ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Integrated Professional Skills in Digital Age

Verified

Added on  2023/06/08

|13
|3868
|283
AI Summary
This report discusses the use of collaborative tools, cloud computing, privacy and security challenges, and potential measures to protect digital assets in the digital age. It includes examples of companies such as Deliveroo and Boohoo Group Plc, and covers topics such as phishing attacks, weak passwords, and insider threats. The report also provides potential measures that can be taken by individuals and establishments to protect themselves from cyber attacks. Course code, course name, and college/university are not mentioned.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Professional Skills in
Digital Age

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
INTRODUCTION ..........................................................................................................................1
MAIN BODY...................................................................................................................................1
Identification of collaborative tools and discussion of how they have helped companies at the
time of global pandemic ..............................................................................................................1
Discussion of advantages, disadvantages, suitability and applications in regards with cloud
computing in improvised digitalised processes ..........................................................................3
Identification of privacy and security challenges as well as potential measures that can be
taken by individuals and establishments for protecting their digital assets ................................5
Discussion of bubble bursting procedure of cryptocurrency with proper justification...............7
CONCLUSION................................................................................................................................8
REFERENCES................................................................................................................................9
Document Page
Document Page
INTRODUCTION
Information and communication technology can be described as infrastructures as well as
components which aid organisations in enabling modern computing procedures (Beynon-Davies,
2019). It is essentially used for tackling communicational processes such as broadcast media,
telecommunication transmission system and many more. It also enables use of innovative
practices in businesses for creating value to customers in an effective manner. It encompasses of
all digital technology which assist business organisations in organising and assimilating their
information in an effective manner. In order to have a better understanding about information
and communication technology, varied examples are taken into consideration.
This project report demonstrates an understanding of use of collaborative tools at workplace.
This also encompasses of knowledge regarding implication and benefits of cloud computing as
well as e-commerce at modern workplace. It also covers privacy concerns and security threats
for business organisations while using internet. It also illustrates about bubble bursting procedure
in respect to cryptocurrency in market.
MAIN BODY
Identification of collaborative tools and discussion of how they have helped companies at the
time of global pandemic
Collaborative tools can be understood as a form of application software which permit
employees to work together as well as share their knowledge with others on a virtual basis
(Mandviwalla, 2020). These collaborative tools aid employees in performing their
organisational tasks from anywhere on a remote basis. It enables to store important document in
cloud which can be accessible by any team member or personnel while working from anywhere.
These collaborative tools are considered as vital as it help employees in reducing their downtime
as well as increase their productivity. With the use of virtual collaborative tools, communication
channels can be improvised in an effective manner. Even at the time of global pandemic as well
as subsequent lockdowns, numerous organisations have chosen to adopt virtual collaborative
software which makes them to connect with their employees in a strategic manner. Two
collaborative tools that can be used at workplace in regards with examples of Deliveroo and
Boohoo Group Plc are mentioned below:
1

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Slack can be described as workplace communication tool which is an instant messaging
system. It provides two methods through which employees can communicate with each other and
their superiors in a formal setting (Lim and Et. Al., 2020). It can organise organisational
conversations into channels whereby personnel can come at one place for sharing their ideas as
well as make decisions in an better manner. It has been built for helping team members in
concentrating as well as establishing a culture which can enhance their productivity in a strategic
manner. For example, Deliveroo which is an UK based food delivery service use slack for
keeping their remote as well as distributed workforce connected throughout their businesses
processes (Powering productivity in the workplace, 2020). Slack offers numerous application
software which helps in integrating the workforce on a remote basis effectively. Another
example of using Slack Connect is Airbnb whereby it help the managers in integrating with
external third parties in a strategic manner. Slack Huddles can be act as an alternative for video
calls as it provides great experience to organisational managers while interacting with their
employees as well as external clients.
Webex provides numerous features at one time such as audio, video as well as content
sharing which deliver excellent experiences to organisational managers while engaging in
meetings (Prentice, Imperial and Brudney, 2019). It also provides seamless experience to users
which help teams to perform their activities effectively. Through this teams can connect and
collaborate in a fast manner which aid them in enhancing their productivity. This allows
companies to make improvisations in their communication as well as strengthening the business
relationships in an effective manner. Numerous establishments are using this collaborative tool
as it is easy to use and help them to meet their employees as well as desired clients on a
scheduled time. It also help managers in file transferring as well as removing unwanted attendees
from meeting on a instant basis. Apart from this, Webex also offers features such as screen
sharing, cloud recording as well as storage. It also provides features like digital whiteboarding
which help organisational managers in presenting their presentations while working on a remote
basis. For example, managers of Boohoo Group Plc use Webex in order to organise meetings for
discussing their designs and other related aspects. This has also helped them in an effective
manner at the time of global lockdown when they have to work on a remote basis.
2
Document Page
Discussion of advantages, disadvantages, suitability and applications in regards with cloud
computing in improvised digitalised processes
Cloud computing can be understood as a practice which is used by business organisations
for hosting different servers in order to manage as well as assimilate the large data sets in an
effective manner (Sehgal and Bhatt, 2018). Cloud computing is considered as significant for
establishments in protecting their data as well as systems from any cyber theft which is
considered helpful for continuous planning. It is considered as vital as it aid in assessing the data
sets again in a quick manner which allows them to conduct their business operations with
minimizing downtime and enhance productivity. It also allow employees to be flexible in their
workings as it helps them in connecting with virtual workplace in an effective manner.
Whereas, cloud storage can be understood as a computing model which is used for
stockpiling the information in a strategic manner (Wang and Et. Al., 2017). Through this, users
can upload, store as well as retrieve their data sets as and when necessary. Evaluation of benefits,
limitations, suitability and application for cloud computing as well as storage are mentioned
below:
Basis of Difference Cloud Computing Cloud Storage
Meaning Cloud computing is concerned with
providing differential services from the
internet such as servers, networking
and software (Li and Et. Al., 2020).
Cloud storage is a sub-part of
cloud computing which helps
in storing the data for future
use.
Benefits Cloud computing is considered as
beneficial for as it aid organisations in
updating their software and system
through an automatic process. For
example, e-commerce system of
Boohoo Group Plc is updated on a
continuous basis. It also helps in
working with collaborative practices
which aid in enhancing communication
channels in an establishment.
It has varied benefits which are
needed to be considered by
organisational managers for
effective working. It help in
updating the data on a remote
basis as well as sync them
effectively. For example,
managers of Deliveroo share
the information of their clients
as well as necessary
3
Document Page
documents through cloud
strategically.
Limitations It has some disadvantages also which
needs to be undertaken by
organisational managers such as data
loss, account hijack and technological
vulnerabilities. For example, Deliveroo
has faced issues of loosing their
customer's information while saving it
on the cloud through a cyber attack.
This has come with some
limitations too such as security
and privacy concerns in
regards with some providers.
In some software, there is a
need of constant internet
connectivity while storing
information in a strategic
manner. For example,
Deliveroo face issues with
security and maintaining
personal information of their
customers.
Suitability This cloud computing is considered as
essential for organisations as it aid
them in storing vast information in
regards with their employees and
customers in an organised manner. For
example, managers of Deliveroo store
and assimilate the information of their
customers in an effective manner.
This software is considered as
suitable as Deliveroo is large
food online business whereby
it is needed to manage
tremendous data sets for
performing their business
operations in an effective
manner.
Application With the aid of cloud computing,
organisational managers offer use of
infrastructure for their clients for
hosting services in an effective manner.
For example, at Deliveroo, this cloud
computing is applied in a strategic
manner through using varied software.
This cloud storage should be
adopted in organisational
setting for storing the data for
longer period of time or
lifetime. For example, this has
been implemented in strategic
manner at Deliveroo for
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
storing their information.
Identification of privacy and security challenges as well as potential measures that can be taken
by individuals and establishments for protecting their digital assets
Internet is considered as helpful as it aids in creating a vibrant marketplace for varied
transactions for buying and selling in an effective manner (Qiu and Et. Al., 2019). Apart from
this, internet is used for varied unique features such as entertainment platforms, keeping
informed about the dynamic changes in world any many more. However, it also poses varied
challenges in respect to businesses and individuals. Through this, cyber criminals can attack the
system of organisations and steal their confidential information. Privacy and security challenges
in regards with individuals are as follows:
Individuals are asked to create an account on varied websites even if they seem it
unnecessary. Their personal information has been taken and used for formulating their promotion
plans. Sometimes, this process become so frustrated as individuals are asked for login and
registration every time they visit that. Another issue which is faced by individuals is they have to
reach customer service for the process of forgot password. Due to this they have started to use
simple and easy passwords in order to remember that for long time. Data privacy is an another
concern for them as their personal information is leaking due to signing up for varied websites.
Privacy and security challenges in context to businesses are mentioned below:
Phishing attacks- This is considered as a practice whereby cyber attackers send
fraudulent information by using a reputable source (Padyab and Ståhlbröst, 2018). Phishing
attacks can impact the business operations in a negative manner which encompasses of loss of
money, confidential information, intellectual property and creation of disruptions in operational
activities. Many companies over the globe are suffering from data breaches which is streamlined
through phishing attacks. However, this phishing attack can be done by employees also apart
from phishers as they are aware about their their workings and passwords. For example, official
website of British Airways have been diverted into a fraudulent site by phishers. Through this,
personal information of their 50,000 customers was harvested by the attackers (British Airways
faces record £183m fine for data breach, 2019).
This phishing attack is performed in varied scenario such as e-mail, clone phishing and
domain spoofing. As per the e-mail phishing, attackers can get access of personal information of
5
Document Page
customers of an establishment. By using clone phishing, attackers create a digital clone of actual
e-mail message and replace it with malicious one in a strategic manner. In case of domain
spoofing, attacker can spoof the name of the specified organisations whereby it seems that an
individual gets the messages from a legitimate company.
Weak passwords- This is also considered as a big threat for organisations as this practice
can invite the cyber criminals to attack on their system and steal their confidential information
(Anic, Škare and Milaković, 2019). It is becoming problematic to rely on passwords for
maintaining their security. It has become easy for devising and remembering differential
passwords for varied accounts with the help of virtual aspects. Weak and simple passwords poses
as a threat for data breaches, account take overs as well as other related aspects of cyber attacks.
For example, Deliveroo can face this type of cyber attacks while doing their operations. Through
this, their confidential information can be stole and used for wrong practices.
Insider threats is considered as a security risk which initiates inside the organisation.
These threats can be come from current or former employees, business associates and many
more. For example, an employee can stole confidential information in regards with trade secrets.
Numerous companies has suffered from insider threat which led them to lose customer trust and
ruined business reputation in a significant manner. For instance, Marriott Hotels have face this
issue when they were attacked by cyber criminals and lost their approximately 5.2 million record
of their guests (5 Real-Life Data Breaches Caused by Insider Threats, 2022) This act was
performed by attackers by entering into a deal with employees of Marriott.
Potential measures which are undertaken by businesses and individuals for protecting
themselves from varied issues are as follows:
Train staff members in an effective manner- Most common manner through which
cyber criminals can access information of company are from its employees (Arora and Et. Al.,
2019). It is imperative for organisational managers to train their staff in a strategic manner in
order to avoid cyber attacks as well as data breaches. It is desirable to use their common sense
before clicking any malicious link. For example, employees of British Airways should be given
proper training for avoiding data breaches practices in respect to their operations.
Keep software updated- Certainly, cyber criminals are are tend to discover the weakness
of companies in case of not updating of their software on a timely basis. It is imperative for
organisational managers to update their software for protecting their system to be attacked.
6
Document Page
Backup of data- In case of cyber attack, data should be backed up with prior move which help in
avoiding serious downtime as well as financial loss. For example, managers of Deliveroo keep
backup of their data in a strategic manner which help them to avoid loss of their relevant
information in case of cyber attacks.
Individuals should take care while entering into any online transaction. They ought to be
develop their passwords in such a way which can be saved in a digital manner. It is imperative
for them to use common sense while clicking on any link which they thought to be legitimate. As
one wrong click can stole their personal information as well can stole their bank details.
Discussion of bubble bursting procedure of cryptocurrency with proper justification
Cryptocurrency can be understood as a virtual currency which is used as an alternative
form of payment (Bouri, Shahzad and Roubaud, 2019). It is created through using encryption
algorithms. This encryption technologies enable that cryptocurrencies should work as a currency
as well as digital accounting system. These are not regulated by any statutory body rather than it
uses decentralised system for recording the transactions.
In financial parlance, bubble can be termed as a state whereby an asset remain stable for a
longer period of time and then growing continuously when it price skyrockets over the roof.
However, burst can be explained as a term when the price of the asset drop quickly as compared
to its rise. Cause of this bubble burst as cryptocurrencies are considered as riskiest investment
source for investors as business houses are slow on the processes of adopting blockchain
procedures. Even governments of varied countries do not want to allow cryptocurrencies as
standard payment system as these are riskiest sources and can lend a nation's economy to the
verge.
Tether which is the multibillion dollar stable coin which was considered as largest bank
in regards with cryptocurrency economy has withdrawal their cash in May due to crash of crypto
market. It is the clear case of bubble bursting whereby cryptocurrencies are led to drastically
decrease in their prices due to market crash. It is clear with this example of Tether that
cryptocurrencies are perform in an approach of bubble bursting. It has been seen that other
cryptocurrencies like Bitcoin, Ethereum and other are facing downtime from the starting of May.
For example, Bitcoin has fell down below $26,000 in last 16 months for the first time (Bitcoin
crash: Market anomaly or bubble burst, 2022). Even exchange platforms which helps in
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
mediating transactions as well as portals which are used for recording valuations has put their
market performance in trough.
Stable coins are considered as sure source in relation to crypto world which covers a
large percentage for trading volumes of digital assets (Alexander and Dakos, 2020). Tokens are
considered as prime medium to be used for exchanging for payments, lending and other related
activities which are typically based on block chain technology.
Ethereum is considered as most dominating cryptocurrency in crypto market which can
be a verge of exploding and bubble bursting in a strategic manner. This virtual currency is
considered as highly volatile and keep the investment of investors at high risk.
However, market analyst has supposed that rise and fall in Bitcoin and Ethereum prices
are not considered as bubble bursting as these remain at the verge of inflation hedge. Bitcoin is
tagged as safe by them as its adoption has been increasing in a significant manner. Ethereum
does not exist a fixed supply although coin burning has kept this asset scarce.
CONCLUSION
From the above mentioned information, it has been concluded that information and
communication technology plays a significant role in transforming the business operations into a
virtual one. Collaborative tools are considered as significant as it aid organisational managers in
solving complex problem and assist them in working on a remote basis. Two collaborative tools
which are commonly undertaken by organisation are Slack and Webex. Internet provides varied
unique features by providing entertainment, access to large data sets and many more. However, it
also become cause of varied security and privacy issues for business organisations such as
phishing attacks, weak passwords and insider threats. Cyber attack is considered as deliberate
exploitation of system as well as networks. Cloud computing is concerned with providing
differential servers and networks to organisations for assimilating their information. Cloud
storage is considered as vital for organisations for keeping back up of their data in a strategic
manner. Cryptocurrencies are considered as riskiest market where investments have to be done
through critical evaluation in an effective manner.
8
Document Page
REFERENCES
Books and Journals:
Alexander, C. and Dakos, M., 2020. A critical investigation of cryptocurrency data and
analysis. Quantitative Finance. 20(2). pp.173-188.
Anic, I. D., Škare, V. and Milaković, I. K., 2019. The determinants and effects of online privacy
concerns in the context of e-commerce. Electronic Commerce Research and
Applications. 36. p.100868.
Arora, A. and Et. Al., 2019, July. Security concerns and future trends of internet of things.
In 2019 2nd international conference on intelligent computing, instrumentation and
control technologies (ICICICT) (Vol. 1, pp. 891-896). IEEE.
Beynon-Davies, P., 2019. Business information systems. Red Globe Press.
Bouri, E., Shahzad, S. J. H. and Roubaud, D., 2019. Co-explosivity in the cryptocurrency
market. Finance Research Letters. 29. pp.178-183.
Li, J. and Et. Al., 2020. Blockchain-based public auditing for big data in cloud
storage. Information Processing & Management. 57(6). p.102382.
Lim, C. L. and Et. Al., 2020. Assisting Peer Learning Performance Using Online Collaborative
Tools in Virtual Learning Environments. In Preparing 21st Century Teachers for Teach
Less, Learn More (TLLM) Pedagogies (pp. 108-124). IGI Global.
Mandviwalla, M., 2020. The world view of collaborative tools. In Computers, communication
and mental models (pp. 57-66). CRC Press.
Padyab, A. and Ståhlbröst, A., 2018. Exploring the dimensions of individual privacy concerns in
relation to the Internet of Things use situations. Digital Policy, Regulation and
Governance.
Prentice, C. R., Imperial, M. T. and Brudney, J. L., 2019. Conceptualizing the collaborative
toolbox: a dimensional approach to collaboration. The American Review of Public
Administration. 49(7). pp.792-809.
Qiu, H. and Et. Al., 2019. A user-centric data protection method for cloud storage based on
invertible DWT. IEEE Transactions on Cloud Computing. 9(4). pp.1293-1304.
Sehgal, N. K. and Bhatt, P. C., 2018. Cloud computing. Heidelberg: Springer.
Wang, L. and Et. Al., 2017. Cloud computing: methodology, systems, and applications. CRC
Press.
Online:
British Airways faces record £183m fine for data breach. 2019. [Online]. Available through:
<https://www.bbc.com/news/business-48905907>
Johnson. L., 2020. Powering productivity in the workplace.[Online] Available through:
<https://slack.com/intl/en-in/blog/productivity/powering-productivity-
workplace#:~:text=their%20best%20work.-,Slack%20lets%20teammates%20manage
%20their%20focus%20so%20they%20can%20do,that's%20most%20relevant%20to
%20them.>
9
Document Page
5 Real-Life Data Breaches Caused by Insider Threats. 2022. [Online]. Available through:
<https://www.ekransystem.com/en/blog/real-life-examples-insider-threat-caused-
breaches>
Rarymond A., 2022. Bitcoin crash: Market anomaly or bubble burst.[Online]. Available
through: <https://www.deseret.com/u-s-world/2022/5/12/23068686/crypto-crash-
market-anomaly-or-bubble-burst-bitcoin-ethereum-stablecoin-cryptocurrency>
10
1 out of 13
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]