Survey and Analysis of Emerging Trends
VerifiedAdded on 2020/10/22
|17
|5810
|257
AI Summary
This assignment involves a thorough review of recent studies and patents related to trend monitoring and analysis in various fields such as technology, cybersecurity, healthcare, and more. The documents provided cover topics like data mining, machine learning, fog computing, internet of things, and wearables. The assignment likely requires students to analyze and summarize the key findings and trends from these sources, providing a comprehensive understanding of the current state and future prospects in these areas.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Technology & Trend
Monitoring
Monitoring
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1) Executive summary
This report has described about the technological trend and analysis that is impacting on
business. Also, it is described about organisation which will help in superior growth of service
measures which will help in carrying out of services related digital technology. As the
organisation is looking after effective technological advancement, for growth and accessibility, it
can be said that it will help in proper execution of business operations in effective manner. In this
it is also explained about the digital technologies like social media marketing like website or
mobile application. All these technologies that are undertaken by an organisation to keep a check
on the operational measures. This will help in developing a suitable frame work to monitor the
operations and develop a significant strategy to monitor the operations which are undertaken by
organisation. Various media sources and technical theories are undertaken with the assessment of
literature in a significant manner. The report also includes the data triangulation and emerging
trends that are undertaken by the organisation. The flourishing technologies like 5G
communication based technologies, cyber security, internet of things, Augmented reality and
cloud computing are discussed.
In report it is also explained about how current and emerging technologies are impacting
each other. Moreover, what changes is been occurred due to integration of technology and how it
has impacted business. Thus, the focus will be on emerging technologies and its impact. Besides
this, the difficulties been faced in current technologies and what changes is been done is
discussed as well in assignment. The various trends and technologies are been described in
report. The present report discuss about challenges such as cyber security, privacy, etc of data
and information. These all are becoming major threat to organisation. Cyber security can be
termed as the securing and safeguarding of vital information and intellectual property of
organisation. The incorporation of the cyber security measures which are undertaken which will
help in support the protection of vital and significant information which are undertaken in
consideration by organisation. As the data security, privacy and preservation is becoming a
major threat for the companies all around the world. This will lead the organizations to plan their
futures and hence, will lead to development of suitable strategies and operations which are
undertaken in consideration by a business enterprise. In order to maintain the effective and
proper data security measures which are undertaken by the organisation, significant data
protection measures like installing firewalls, data security locks, biometric configurations, and
This report has described about the technological trend and analysis that is impacting on
business. Also, it is described about organisation which will help in superior growth of service
measures which will help in carrying out of services related digital technology. As the
organisation is looking after effective technological advancement, for growth and accessibility, it
can be said that it will help in proper execution of business operations in effective manner. In this
it is also explained about the digital technologies like social media marketing like website or
mobile application. All these technologies that are undertaken by an organisation to keep a check
on the operational measures. This will help in developing a suitable frame work to monitor the
operations and develop a significant strategy to monitor the operations which are undertaken by
organisation. Various media sources and technical theories are undertaken with the assessment of
literature in a significant manner. The report also includes the data triangulation and emerging
trends that are undertaken by the organisation. The flourishing technologies like 5G
communication based technologies, cyber security, internet of things, Augmented reality and
cloud computing are discussed.
In report it is also explained about how current and emerging technologies are impacting
each other. Moreover, what changes is been occurred due to integration of technology and how it
has impacted business. Thus, the focus will be on emerging technologies and its impact. Besides
this, the difficulties been faced in current technologies and what changes is been done is
discussed as well in assignment. The various trends and technologies are been described in
report. The present report discuss about challenges such as cyber security, privacy, etc of data
and information. These all are becoming major threat to organisation. Cyber security can be
termed as the securing and safeguarding of vital information and intellectual property of
organisation. The incorporation of the cyber security measures which are undertaken which will
help in support the protection of vital and significant information which are undertaken in
consideration by organisation. As the data security, privacy and preservation is becoming a
major threat for the companies all around the world. This will lead the organizations to plan their
futures and hence, will lead to development of suitable strategies and operations which are
undertaken in consideration by a business enterprise. In order to maintain the effective and
proper data security measures which are undertaken by the organisation, significant data
protection measures like installing firewalls, data security locks, biometric configurations, and
data encryption methods can be incorporated which will help in significant improvement of data
security measures which are undertaken by the organisation on a significant level.
security measures which are undertaken by the organisation on a significant level.
Table of Contents
2) Literature review .....................................................................................................................1
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation..............................................................................3
4) Critically evaluate the emerging technological trends and and identify potential challenges
for this trends...............................................................................................................................6
5) Impact analysis of existing and emerging technologies in future trends.................................9
6) Summary................................................................................................................................10
REFERENCES..............................................................................................................................12
2) Literature review .....................................................................................................................1
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation..............................................................................3
4) Critically evaluate the emerging technological trends and and identify potential challenges
for this trends...............................................................................................................................6
5) Impact analysis of existing and emerging technologies in future trends.................................9
6) Summary................................................................................................................................10
REFERENCES..............................................................................................................................12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
2) Literature review
In modern era of technological advancement, there has been high rise in security breaches. It
has resulted in huge loss both in terms of finance and data and information. According to Ena
et.al., 2016, cyber security plays a significant role in today’s digital era. This is because securing
information is one of the biggest challenge that is faced by companies. In this government and
companies have formed certain rules and regulations. Besides this, various security measures are
taken in order to protect crucial data. The leakage of data is a cyber crime. For this in many
countries' government have made laws for punishment. The major cases of cyber security are
related to social media. Generally, cyber attack occurs due to malware and virus that are sent into
network by hackers or third parties to steal data and information. The elements of cyber security
are application, network, operational, etc. (Wortmann and Flüchter, 2015). It is analysed that
traditional approach of protecting system cannot be used in current technological environment.
This is because it contains many loopholes and defects.
As stated by Buczak and Guven, 2016, securing data allows companies to gain trust of
customers. The data is stored by third parties or in servers. Now, the data is accessed through
authentication. This reduces risk of data breach. However, emerging technologies like cloud
computing, AI, etc. has forced companies to use cyber security techniques. This has enabled
them to prevent loss of data (Importance of cyber security. 2018). Apart from it, they need to
maintain security by using various resources. The main issue that is prevailing in cyber security
is upgrade of technology that is resulting in cyber crime. Due to this it has become difficult to
protect data and information. Also, they are not able to maintain efficiency of devices used in it.
There are several threats of cyber security as well such as ransom ware, malware, etc. which
affect authenticity of data.
Game theory for cyber security –
It states that in a game a person chooses actions those results in giving best possible
rewards. In this a player is an entity that makes decision and performs tasks. Similarly, in cyber
security it is necessary to protect data and info. There are two concepts in game that is rationale
and knowledge. So, in cyber security rationale refers to securing data and knowledge means
how.
1
In modern era of technological advancement, there has been high rise in security breaches. It
has resulted in huge loss both in terms of finance and data and information. According to Ena
et.al., 2016, cyber security plays a significant role in today’s digital era. This is because securing
information is one of the biggest challenge that is faced by companies. In this government and
companies have formed certain rules and regulations. Besides this, various security measures are
taken in order to protect crucial data. The leakage of data is a cyber crime. For this in many
countries' government have made laws for punishment. The major cases of cyber security are
related to social media. Generally, cyber attack occurs due to malware and virus that are sent into
network by hackers or third parties to steal data and information. The elements of cyber security
are application, network, operational, etc. (Wortmann and Flüchter, 2015). It is analysed that
traditional approach of protecting system cannot be used in current technological environment.
This is because it contains many loopholes and defects.
As stated by Buczak and Guven, 2016, securing data allows companies to gain trust of
customers. The data is stored by third parties or in servers. Now, the data is accessed through
authentication. This reduces risk of data breach. However, emerging technologies like cloud
computing, AI, etc. has forced companies to use cyber security techniques. This has enabled
them to prevent loss of data (Importance of cyber security. 2018). Apart from it, they need to
maintain security by using various resources. The main issue that is prevailing in cyber security
is upgrade of technology that is resulting in cyber crime. Due to this it has become difficult to
protect data and information. Also, they are not able to maintain efficiency of devices used in it.
There are several threats of cyber security as well such as ransom ware, malware, etc. which
affect authenticity of data.
Game theory for cyber security –
It states that in a game a person chooses actions those results in giving best possible
rewards. In this a player is an entity that makes decision and performs tasks. Similarly, in cyber
security it is necessary to protect data and info. There are two concepts in game that is rationale
and knowledge. So, in cyber security rationale refers to securing data and knowledge means
how.
1
As elucidated by Wortmann and Flüchter, 2015., cyber security is a wide concept that includes
many things. It is not only related to protecting data but also on designing process or systems
through which network is secured. So, it is necessary to manage cyber security by taking
appropriate measures. In present time, a new trend has emerged in cyber security. Homographic
encryption is a technique that is used in this. Here, an encryption occurs that allows computation
on cipher texts and generates an encrypted result. So, when decrypted it matches with plaintext
that has been performed in operations. As said by Islam et.al., 2015, now companies are using
biometrics to record and store data. Also, it is used to provide access to use of data. Alongside it,
there are many other techniques as well taken to protect data. Antivirus software are been
implemented that removes virus and worms that enters in system or network (Cyber secruity
challenges. 2016). Besides this, firewalls are installed by companies in network to access
internet. It examines each data packets and detects malware. It is necessary to monitor the way in
data is secured. This is because it helps in finding out how encryption and decryption occurs.
Recently, in cyber security system, an alarm is installed that make user aware about any
malicious activity or virus.
In view of Cherdantseva et.al., 2016, with cyber securiy, internet of things has created a
great positive impact on world. It has highly transformed the way of connecting devices. It has
allowed devices to connect with each other through internet. This has allowed people and
companies to implement this concept at large scale. Besides this, there are many applications
emerged in cyber security.. Moreover, it is also been used in securing and protecting data. There
has been a high growth in past years.
Moreover, in study done by Kumari, Mathew and Syal, 2017, it is evaluated that the use of
IOT with cyber security has supported in many ways. It has assisted in monitoring devices from
anywhere, anytime. This has led to ease in transmission of data from one place to another. Also,
it benefits business to redesign their systems in cost effective way. In many places like at airports
and railway stations IOT in cyber secuirty has eased process of verifying information. By
gathering real time data, quick decisions are taken. Alongside this, in health care it is giving real
time info to people. With help of it, they are able to protect data and informaiton.
There are many different technologies related to IOT. It has integrated smart phones with
cloud. Also, sensing technology has given people to get involved in real world. IOT have
provided safety in blocking malicious activity. Through wireless connections devices range is
2
many things. It is not only related to protecting data but also on designing process or systems
through which network is secured. So, it is necessary to manage cyber security by taking
appropriate measures. In present time, a new trend has emerged in cyber security. Homographic
encryption is a technique that is used in this. Here, an encryption occurs that allows computation
on cipher texts and generates an encrypted result. So, when decrypted it matches with plaintext
that has been performed in operations. As said by Islam et.al., 2015, now companies are using
biometrics to record and store data. Also, it is used to provide access to use of data. Alongside it,
there are many other techniques as well taken to protect data. Antivirus software are been
implemented that removes virus and worms that enters in system or network (Cyber secruity
challenges. 2016). Besides this, firewalls are installed by companies in network to access
internet. It examines each data packets and detects malware. It is necessary to monitor the way in
data is secured. This is because it helps in finding out how encryption and decryption occurs.
Recently, in cyber security system, an alarm is installed that make user aware about any
malicious activity or virus.
In view of Cherdantseva et.al., 2016, with cyber securiy, internet of things has created a
great positive impact on world. It has highly transformed the way of connecting devices. It has
allowed devices to connect with each other through internet. This has allowed people and
companies to implement this concept at large scale. Besides this, there are many applications
emerged in cyber security.. Moreover, it is also been used in securing and protecting data. There
has been a high growth in past years.
Moreover, in study done by Kumari, Mathew and Syal, 2017, it is evaluated that the use of
IOT with cyber security has supported in many ways. It has assisted in monitoring devices from
anywhere, anytime. This has led to ease in transmission of data from one place to another. Also,
it benefits business to redesign their systems in cost effective way. In many places like at airports
and railway stations IOT in cyber secuirty has eased process of verifying information. By
gathering real time data, quick decisions are taken. Alongside this, in health care it is giving real
time info to people. With help of it, they are able to protect data and informaiton.
There are many different technologies related to IOT. It has integrated smart phones with
cloud. Also, sensing technology has given people to get involved in real world. IOT have
provided safety in blocking malicious activity. Through wireless connections devices range is
2
increased. It bridges gap between communication and connectivity. But in this there is slight
difference as AI is completely automated where IOT include implementing system in network.
In the opinion of Zhang et.al., 2018, the future of IOT in caber security will bring drastic
changes in protecting data and information within business. There will be major requirements of
hardware and software in implementing network. Besides this, reliability and integrity of data
will become priority for business. There will save money and time of people. Moreover, people
will highly engage with technology. There will be development of more advance and smart
applications. It will include new features which evolve new trends in technology.
Buczak, and Guven, 2016., said that both IOT are cyber security are interrelated to each
other. This can be said because cyber security has aroused due to IOT. It is observed in IOT
company have to implement a strong cyber security system. Also, it is essential to monitor IOT
so that flow of communication is identified. This helps in finding out how devices are connected
and from where data is sent. Basically, by using cyber security applications in IOT, the data can
be protected. But in changing world, expansion of IOT is bigger risk in cyber security. In study it
is said that 70% of devices connected in IOT contains vulnerabilities. It is highly affecting the
overall network. Therefore, it is very necessary to secure IOT so that data authenticity is
maintained.
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation
The assessment of the data sources for Google Scholar and other data resources that are
undertaken for the evaluation purpose. This will help in identifying the issues and challenges that
are related to digital technology and data security measures which are undertaken within the
firm. As per the views of Wang et.al., 2016, majority of business operations are been carried out
within organisation that will help in significant rise in the security concerns that are undertaken
within the organisation. The proper assessment of the security issues and evaluation measures
which are undertaken within the organisation are followed.
For the effective establishing of the operations which are undertaken within the
organisation, the cyber security and Internet of Things (IOT) measures are taken in which
supports the proper execution of digital data assessment and evaluation measures. The cyber
security will help in evaluating the threats related to the unauthenticated risks within the
organisation. While the IOT will involve the significant automation of the operations or services
3
difference as AI is completely automated where IOT include implementing system in network.
In the opinion of Zhang et.al., 2018, the future of IOT in caber security will bring drastic
changes in protecting data and information within business. There will be major requirements of
hardware and software in implementing network. Besides this, reliability and integrity of data
will become priority for business. There will save money and time of people. Moreover, people
will highly engage with technology. There will be development of more advance and smart
applications. It will include new features which evolve new trends in technology.
Buczak, and Guven, 2016., said that both IOT are cyber security are interrelated to each
other. This can be said because cyber security has aroused due to IOT. It is observed in IOT
company have to implement a strong cyber security system. Also, it is essential to monitor IOT
so that flow of communication is identified. This helps in finding out how devices are connected
and from where data is sent. Basically, by using cyber security applications in IOT, the data can
be protected. But in changing world, expansion of IOT is bigger risk in cyber security. In study it
is said that 70% of devices connected in IOT contains vulnerabilities. It is highly affecting the
overall network. Therefore, it is very necessary to secure IOT so that data authenticity is
maintained.
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation
The assessment of the data sources for Google Scholar and other data resources that are
undertaken for the evaluation purpose. This will help in identifying the issues and challenges that
are related to digital technology and data security measures which are undertaken within the
firm. As per the views of Wang et.al., 2016, majority of business operations are been carried out
within organisation that will help in significant rise in the security concerns that are undertaken
within the organisation. The proper assessment of the security issues and evaluation measures
which are undertaken within the organisation are followed.
For the effective establishing of the operations which are undertaken within the
organisation, the cyber security and Internet of Things (IOT) measures are taken in which
supports the proper execution of digital data assessment and evaluation measures. The cyber
security will help in evaluating the threats related to the unauthenticated risks within the
organisation. While the IOT will involve the significant automation of the operations or services
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
which are carried out by the organisation. All this measures will lead to a significant analysis of
trends and implementing digital technology within the organisation. Besides this, it will support
the good and accessible operations including the evaluation of strengths and weaknesses of these
digital technological measures which are carried out by the organisation for effective growth of
organisation.
Data Triangulation
Data triangulation can be termed as the major process of involving, collecting and
analysing the data using multiple methods simultaneously. It is used to identify the critical
factors such as strengths and weaknesses of a model or tool which will impact and influence the
overall establishment of IT technologies within a business enterprise (Ena et.al. 2016). It will
help in gathering data from authentic and relevant sources. By this it will be easy to analyze the
topic in depth. Also, the issues can be easily highlighted. Through data triangulation strength and
weakness is identified.
This analysis will also help in establishing a suitable operations and carrying out of the
assessment and evaluation measures which are undertaken within organisation. The data
triangulation is however a very costly and time consuming process. On the basis of the various
measures that are undertaken for data triangulation measures which are undertaken by
organisation, the strengths and weaknesses of effective IT topics like cyber security and Internet
of Things is been analysed. This will include the following components.
By analysing data it can be stated that cyber security has provided a major support for
organisation to protect data and information. The use of biometrics has helped in maintaining
privacy of staff and preventing unauthorised access.
Issues related to incorporation and implementation of cyber security measures within
organisation:
As it is a costly process, proper funding in vast amount is required which can be a tedious
task for a small scale enterprise.
Besides this, it requires experts to constantly monitor the data threats and improve the
quality of data security measures.
Regular updates and maintenance will lead to additional expenses that can turn out to be
an unnecessary burden on then organisation.
Strengths of Cyber security:
4
trends and implementing digital technology within the organisation. Besides this, it will support
the good and accessible operations including the evaluation of strengths and weaknesses of these
digital technological measures which are carried out by the organisation for effective growth of
organisation.
Data Triangulation
Data triangulation can be termed as the major process of involving, collecting and
analysing the data using multiple methods simultaneously. It is used to identify the critical
factors such as strengths and weaknesses of a model or tool which will impact and influence the
overall establishment of IT technologies within a business enterprise (Ena et.al. 2016). It will
help in gathering data from authentic and relevant sources. By this it will be easy to analyze the
topic in depth. Also, the issues can be easily highlighted. Through data triangulation strength and
weakness is identified.
This analysis will also help in establishing a suitable operations and carrying out of the
assessment and evaluation measures which are undertaken within organisation. The data
triangulation is however a very costly and time consuming process. On the basis of the various
measures that are undertaken for data triangulation measures which are undertaken by
organisation, the strengths and weaknesses of effective IT topics like cyber security and Internet
of Things is been analysed. This will include the following components.
By analysing data it can be stated that cyber security has provided a major support for
organisation to protect data and information. The use of biometrics has helped in maintaining
privacy of staff and preventing unauthorised access.
Issues related to incorporation and implementation of cyber security measures within
organisation:
As it is a costly process, proper funding in vast amount is required which can be a tedious
task for a small scale enterprise.
Besides this, it requires experts to constantly monitor the data threats and improve the
quality of data security measures.
Regular updates and maintenance will lead to additional expenses that can turn out to be
an unnecessary burden on then organisation.
Strengths of Cyber security:
4
Helps in protecting vital information: The cyber security measures such as biometric
locks and Homographic encryption that is incorporated by organisation (Wortmann and
Flüchter, 2015). This will help in proper analysis of the threat factors and improve data
security measures which are followed by the organisation.
Prevention of data theft: The other major strength of the data security measures which
are undertaken by organisation for data security is that it prevents the data theft and
misuse by others and ensures proper management of significant information which will
help in proper assessment of the factors which will help in controlling the
misinterpretation of the information.
Ensuring the proper authentication: As the biometric and Homographic encryption is
used, this will support in providing suitable authentication to the person getting access to
information. This will help in proper handling of the vital data's and intellectual property
of an organisation.
Improve the digital framework of organisation: As the digital security measures are
undertaken within the organisation, their overall digital infrastructure will b improved
and made precise which will help in enhancing their quality of operations (Simon, 2015).
This will enhance the quality of the measures which are undertaken for securing and
preserving the vital data information within organisation.
Weaknesses of data security and preservation measures:
It is a very time consuming and costly process: The data security and preservation
measures which are taken in consideration by organisation is a very time consuming and
relatively costly process which is effectively applied and implemented by only selected
enterprises. This is the major drawback of this process.
Requires high level of expertise: The application of data security and protection
measures which are undertaken by the organisation requires significant level of
knowledge and precision. The availability of high level of expertise is a major challenge
for the organisation.
Not a full proof solution: Any sort of data security measure, no matter how advance it
is, cannot completely eliminate the risk of data threat (Islam et.al., 2015). As there is a
constant risk on the system from unknown bloatware, malware or virus, regular updates
and preventive measures are required to be observed.
5
locks and Homographic encryption that is incorporated by organisation (Wortmann and
Flüchter, 2015). This will help in proper analysis of the threat factors and improve data
security measures which are followed by the organisation.
Prevention of data theft: The other major strength of the data security measures which
are undertaken by organisation for data security is that it prevents the data theft and
misuse by others and ensures proper management of significant information which will
help in proper assessment of the factors which will help in controlling the
misinterpretation of the information.
Ensuring the proper authentication: As the biometric and Homographic encryption is
used, this will support in providing suitable authentication to the person getting access to
information. This will help in proper handling of the vital data's and intellectual property
of an organisation.
Improve the digital framework of organisation: As the digital security measures are
undertaken within the organisation, their overall digital infrastructure will b improved
and made precise which will help in enhancing their quality of operations (Simon, 2015).
This will enhance the quality of the measures which are undertaken for securing and
preserving the vital data information within organisation.
Weaknesses of data security and preservation measures:
It is a very time consuming and costly process: The data security and preservation
measures which are taken in consideration by organisation is a very time consuming and
relatively costly process which is effectively applied and implemented by only selected
enterprises. This is the major drawback of this process.
Requires high level of expertise: The application of data security and protection
measures which are undertaken by the organisation requires significant level of
knowledge and precision. The availability of high level of expertise is a major challenge
for the organisation.
Not a full proof solution: Any sort of data security measure, no matter how advance it
is, cannot completely eliminate the risk of data threat (Islam et.al., 2015). As there is a
constant risk on the system from unknown bloatware, malware or virus, regular updates
and preventive measures are required to be observed.
5
Summary
It can be identified from above that there are many strengths and weakness of cyber
security. The strength is it helps in preventing privacy of data and information, also helps in
maintaining authenticity of staff (Buczak and Guven, 2016). Moreover, it helps in preventing
loss of data as no unauthorised person is able to get access of it. But the weakness of cyber
security it can be easily breached through various ways. Moreover, it is time consuming process
as it requires proper monitoring and control. As concluded cyber security is transforming the
way of preventing data and information. The devices are been installed to regulate and monitor
data. It has helped protecting cruciail info and maintaining privacy.
4) Critically evaluate the emerging technological trends and identify potential challenges for this
trends
With the advancement of technologies and digitization of every aspects of the businesses,
this can be said that a wide range of technological trends and technologies are emerging which
will help in proper planning of operations and thus will lead to improving the overall
performance of organization. Proper utilization of these trends will contribute in significant
growth of a firm. Some major emerging technological trends that are monitored and followed by
a business enterprise are as follows:
IoT integration with devices: As per the views of Heinemann and Freckmann 2015, the
usage of IoT in various technological devices will help in suitable planning of the operational
measures which are carried out by firm. The concepts like internet of things or IoT will help in a
significant planning and getting up of the conceptual ideas which will help in suitable of
organization and the products or services which is been offered by them. With the passage of
time, more and more services and products are coming with IoT as it makes the devices to be
more effective and smart. This will not only improve the value of products and services which
are carried out by the organization. All these measures which are carried out by the
administration, supports a good increase in the quality of products or services that includes the
IoT.
The use of IoT within the digital technology is going to be a successful technological
trend that will help in improving the quality of products and services and thus, includes the
development of latest technologies which will help in significant planning of the operations
6
It can be identified from above that there are many strengths and weakness of cyber
security. The strength is it helps in preventing privacy of data and information, also helps in
maintaining authenticity of staff (Buczak and Guven, 2016). Moreover, it helps in preventing
loss of data as no unauthorised person is able to get access of it. But the weakness of cyber
security it can be easily breached through various ways. Moreover, it is time consuming process
as it requires proper monitoring and control. As concluded cyber security is transforming the
way of preventing data and information. The devices are been installed to regulate and monitor
data. It has helped protecting cruciail info and maintaining privacy.
4) Critically evaluate the emerging technological trends and identify potential challenges for this
trends
With the advancement of technologies and digitization of every aspects of the businesses,
this can be said that a wide range of technological trends and technologies are emerging which
will help in proper planning of operations and thus will lead to improving the overall
performance of organization. Proper utilization of these trends will contribute in significant
growth of a firm. Some major emerging technological trends that are monitored and followed by
a business enterprise are as follows:
IoT integration with devices: As per the views of Heinemann and Freckmann 2015, the
usage of IoT in various technological devices will help in suitable planning of the operational
measures which are carried out by firm. The concepts like internet of things or IoT will help in a
significant planning and getting up of the conceptual ideas which will help in suitable of
organization and the products or services which is been offered by them. With the passage of
time, more and more services and products are coming with IoT as it makes the devices to be
more effective and smart. This will not only improve the value of products and services which
are carried out by the organization. All these measures which are carried out by the
administration, supports a good increase in the quality of products or services that includes the
IoT.
The use of IoT within the digital technology is going to be a successful technological
trend that will help in improving the quality of products and services and thus, includes the
development of latest technologies which will help in significant planning of the operations
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
which will contribute to growth of an organization, elucidating the importance of IoT on the
digitization and growth of organization. However there are many fields like automated driving
where IoT has not turned out to be satisfactory viable. The main challenge in this is lack of
infrastructure and slow speed of internet. Moreover, the cost of implementing IOT is very high
and requires proper monitoring and control.
Cloud computing – this is also an emerging trend which has enabled business to provide
services through internet. This technology has transformed the way of storing, accessing, etc
data. With this they are able to cover wide area and make it easy for user to access it. In simple
terms cloud computing is use of hardware and software to deliver service over internet. This
enable user to access and use applications and files through devices in network. For example –
Google provide G mail as service, Dropbox enables to store data, etc. these all are able to capture
market by using internet. Through this, user can access services by using infrastructure. They
only have to pay for services that they are using. This trend is because of integration of services
with internet. Now, companies are focusing on using third parties to offer services. Along with it,
other small business are using IT infrastructure. In this the main challenge is loss of data. There
is a lot of data breach done by hacker. Due to it, privacy and authenticity of data is not
maintained. The loss of data is concern for business in using cloud computing services.
Block chain technology – this technology will enable companies to integrate their supply
chain operations. By this they will easily collaborate suppliers with organisation making it easy
to communicate with them. Moreover, block chain is enabling in online transaction with
transparency. It has helped in providing competitive advantage to company in the market. The
suppliers are able to get real time data of products and can easily access it. Furthermore, they are
connected in a network with each other each one having a copy of ledger. The implementation if
block chain technology has enabled in tracking of products, maintaining their quality, etc.
besides this, it has helped in digital payment easily. This trend has emerged due to expansion of
supply chain.
Augmented reality: Augmented reality can be termed out as the virtualization of the real
world that includes multiple human sensory modalities which will assists in significant and
effective rise in the technological advancement. The research of Cummings, Beacon Technical
Systems LLC (2017) suggests that use of AR will involve the simulation measures which will
help in improving the real time experience and understanding of the users. All these measures
7
digitization and growth of organization. However there are many fields like automated driving
where IoT has not turned out to be satisfactory viable. The main challenge in this is lack of
infrastructure and slow speed of internet. Moreover, the cost of implementing IOT is very high
and requires proper monitoring and control.
Cloud computing – this is also an emerging trend which has enabled business to provide
services through internet. This technology has transformed the way of storing, accessing, etc
data. With this they are able to cover wide area and make it easy for user to access it. In simple
terms cloud computing is use of hardware and software to deliver service over internet. This
enable user to access and use applications and files through devices in network. For example –
Google provide G mail as service, Dropbox enables to store data, etc. these all are able to capture
market by using internet. Through this, user can access services by using infrastructure. They
only have to pay for services that they are using. This trend is because of integration of services
with internet. Now, companies are focusing on using third parties to offer services. Along with it,
other small business are using IT infrastructure. In this the main challenge is loss of data. There
is a lot of data breach done by hacker. Due to it, privacy and authenticity of data is not
maintained. The loss of data is concern for business in using cloud computing services.
Block chain technology – this technology will enable companies to integrate their supply
chain operations. By this they will easily collaborate suppliers with organisation making it easy
to communicate with them. Moreover, block chain is enabling in online transaction with
transparency. It has helped in providing competitive advantage to company in the market. The
suppliers are able to get real time data of products and can easily access it. Furthermore, they are
connected in a network with each other each one having a copy of ledger. The implementation if
block chain technology has enabled in tracking of products, maintaining their quality, etc.
besides this, it has helped in digital payment easily. This trend has emerged due to expansion of
supply chain.
Augmented reality: Augmented reality can be termed out as the virtualization of the real
world that includes multiple human sensory modalities which will assists in significant and
effective rise in the technological advancement. The research of Cummings, Beacon Technical
Systems LLC (2017) suggests that use of AR will involve the simulation measures which will
help in improving the real time experience and understanding of the users. All these measures
7
will help in significant planning of the digitization approaches which will help in suitable
planning which assist in a significant growth that will help ion proper planning f the service
measures which will help in significant planning of digital operations and data planning which is
been followed by the firm.
The Augmented Reality will find out a multiple level of applications which will help in
suitable handling of the operations measures which supports a significant planning of
technological advancement which will help in proper planning of significant operations which
will help in improving the effective planning of operations which will support a significant
planning of the operations. All these measures will help in suitable planning of service activities
which will lead to a significant planning of operational measures. Besides this, it will help
organization to get an idea about the real time situation to be faced by a project, prior to its
practical implementation. However, it is not completely reliable as it doesn't provide the exact
situation insight that may occur. There are certain difficulties occurring in AR. Social rejection is
one of them. People do not like it to wear AR machines and devices. They experience is also
poor as there is poor resolution, human interaction, etc. this has created a negative image of AR
in the minds of people. Currently, in AR advancement is been done. Improvements related to
resolution are made to provide real time experience to people. Moreover, awareness is been
generated by educating people.
5) Impact analysis of existing and emerging technologies in future trends
The emerging and digital technologies which are analyzed and categorized within the
organization supporting evaluation of the measures which will assist in effective planning
activities. All these measures like the rising trend of e commerce measures for household
purpose, implementing Augmented reality and Internet of things with machine based learning
operations and including the AI measures for cyber data security will help in enhancing the
digitization measures which are carried out by organization. As discussed above, the digital
measures like Cyber security will help in significant planning of the management measures that
will support handling of future trends. All these approaches which are carried out by an
organization will help in proper planning of the operations which are carried out in a significant
manner as per the evaluation of literature and analysis of a wide variety of data sources, this can
be said that this will lead to a significant planning of operations.
8
planning which assist in a significant growth that will help ion proper planning f the service
measures which will help in significant planning of digital operations and data planning which is
been followed by the firm.
The Augmented Reality will find out a multiple level of applications which will help in
suitable handling of the operations measures which supports a significant planning of
technological advancement which will help in proper planning of significant operations which
will help in improving the effective planning of operations which will support a significant
planning of the operations. All these measures will help in suitable planning of service activities
which will lead to a significant planning of operational measures. Besides this, it will help
organization to get an idea about the real time situation to be faced by a project, prior to its
practical implementation. However, it is not completely reliable as it doesn't provide the exact
situation insight that may occur. There are certain difficulties occurring in AR. Social rejection is
one of them. People do not like it to wear AR machines and devices. They experience is also
poor as there is poor resolution, human interaction, etc. this has created a negative image of AR
in the minds of people. Currently, in AR advancement is been done. Improvements related to
resolution are made to provide real time experience to people. Moreover, awareness is been
generated by educating people.
5) Impact analysis of existing and emerging technologies in future trends
The emerging and digital technologies which are analyzed and categorized within the
organization supporting evaluation of the measures which will assist in effective planning
activities. All these measures like the rising trend of e commerce measures for household
purpose, implementing Augmented reality and Internet of things with machine based learning
operations and including the AI measures for cyber data security will help in enhancing the
digitization measures which are carried out by organization. As discussed above, the digital
measures like Cyber security will help in significant planning of the management measures that
will support handling of future trends. All these approaches which are carried out by an
organization will help in proper planning of the operations which are carried out in a significant
manner as per the evaluation of literature and analysis of a wide variety of data sources, this can
be said that this will lead to a significant planning of operations.
8
It is expected that in future cloud computing will have a great impact on offering
services. This is because of long range LTE 5G will improve network and increase range. By this
it will be easy for companies to expand in different markets. Thus, it will open platforms for
other companies as well to use 5G in cloud computing. Therefore, there will be positive impact
on cloud computing by emerging 5G network technology. The use of clouds will increase where
business can easily store data.
In similar way block chain technology will also impact the supply chain management.
The use of big data will impact companies to install block chain technology. Through this, they
will be able to store large data sets. Also, it will affect their logistics operations. The data
analytics can be integrated with block chain technology. This will impact in positive way. It will
provide real time data and improve performance of SCM.
As in the future the digital trends are going to increase to a higher level with more and
more innovative products and services to be taken in context by organization, this can be said
that digitization concepts are more and more emerging and effective in nature. All this measures
will help in meeting the operational needs and functional capability of the organization. This will
lead to sustainability. All these activities which are undertaken by a management or organization.
However, this digital or technological which are incorporated within the firm are not fully viable
to handle the load and data measures that they faces on a regular basis (Camillo and McLain,
Trade Social LLC 2016). All this operations which are carried out by the organization will help
in analyzing the ongoing digital and technological trends that are carried out by the organization.
The data privacy issues, loss of vital information and lack of proper digitization structure will
impact the operations and supports carrying out of business operations which will lead to a
significant and suitable growth of digital activities, and operation's that are followed by an
enterprise. All this trends which are monitored and followed by the business entity will
contribute in its growth.
In contradictory to it, the upcoming digital technologies which are carried out will be
quite advance and more viable that their preceding technologies. The LTE and 5G cellular digital
with involvement of NFC and Zigbee for the home automation facility is a big breakthrough.
This short field communication will lead to inclusion of digital technologies in a significant
manner and thus will help in improve the utilization of digital trends that are undertaken by a
firm. Other than this, the use of advance bio metrics like voice encoded locks or face recognition
9
services. This is because of long range LTE 5G will improve network and increase range. By this
it will be easy for companies to expand in different markets. Thus, it will open platforms for
other companies as well to use 5G in cloud computing. Therefore, there will be positive impact
on cloud computing by emerging 5G network technology. The use of clouds will increase where
business can easily store data.
In similar way block chain technology will also impact the supply chain management.
The use of big data will impact companies to install block chain technology. Through this, they
will be able to store large data sets. Also, it will affect their logistics operations. The data
analytics can be integrated with block chain technology. This will impact in positive way. It will
provide real time data and improve performance of SCM.
As in the future the digital trends are going to increase to a higher level with more and
more innovative products and services to be taken in context by organization, this can be said
that digitization concepts are more and more emerging and effective in nature. All this measures
will help in meeting the operational needs and functional capability of the organization. This will
lead to sustainability. All these activities which are undertaken by a management or organization.
However, this digital or technological which are incorporated within the firm are not fully viable
to handle the load and data measures that they faces on a regular basis (Camillo and McLain,
Trade Social LLC 2016). All this operations which are carried out by the organization will help
in analyzing the ongoing digital and technological trends that are carried out by the organization.
The data privacy issues, loss of vital information and lack of proper digitization structure will
impact the operations and supports carrying out of business operations which will lead to a
significant and suitable growth of digital activities, and operation's that are followed by an
enterprise. All this trends which are monitored and followed by the business entity will
contribute in its growth.
In contradictory to it, the upcoming digital technologies which are carried out will be
quite advance and more viable that their preceding technologies. The LTE and 5G cellular digital
with involvement of NFC and Zigbee for the home automation facility is a big breakthrough.
This short field communication will lead to inclusion of digital technologies in a significant
manner and thus will help in improve the utilization of digital trends that are undertaken by a
firm. Other than this, the use of advance bio metrics like voice encoded locks or face recognition
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
along with multi bit homomorphic encryption for data assessment and evaluation process within
the firm. This will not only improve the effectiveness of the data protection and securing
measures which are carried out by the firm, but also safeguard the intellectual property of
organization. Big data analysis is another emerging technology that is going to be very relevant
in the upcoming future. As wide range of digitization measures are carried out currently and in
the future the ration is going to hike up in a terminal way, the digital technologies are going to
increase the amount of data that will be generated. Hence in such case big data management and
analysis will help in improving the quality of operation's which are followed by the organization
in future (Adamse, Van der Fels-Klerx and de Jong 2017).
The existing technology like cyber security will have positive impact. This will support in
protecting data and maintaining privacy of information. Thus, only authorized person will be
able to access data. So, there will be decline in cyber frauds and security issues.
Moreover, IOT is connected devices with smart phones. By this it is easy to control and
monitor it. So, it has impacted positively in saving time of people. The things can be controlled
from anywhere, anytime. People can easily access things and get information instantly.
The concepts related to Internet of thing or IoT and augmented reality which is carried
out by the organization which will help in proper improvement of the operations which will help
in improving the quality of service measures which will help in a significant planning of the
operational measures that improves the quality of services and effectiveness as it improves the
quality of products and services and help in developing innovative technologies. This will help in
significant planning of the operations which will lead to improve in meeting the needs and
demands of the organization in significant manner. All this measures will help in suitable
planning of the growth measures which are carried out by organization. Other than this, the cloud
computing measures are gradually gaining the popularity and thus, supports the rise in gaining a
good operational measures which are carried out by the firm.
6) Summary
As a variety of digital technologies are been taken in consideration, this can be said that
the monitoring of the upcoming trends will help in improving the quality of digitization measures
which supports a good accessibility within the firm. This will help in utilizing multiple
technologies which will help in significant planning of the operations and monitoring the digital
and technological trends that are undertaken within the organization. Data triangulation measures
10
the firm. This will not only improve the effectiveness of the data protection and securing
measures which are carried out by the firm, but also safeguard the intellectual property of
organization. Big data analysis is another emerging technology that is going to be very relevant
in the upcoming future. As wide range of digitization measures are carried out currently and in
the future the ration is going to hike up in a terminal way, the digital technologies are going to
increase the amount of data that will be generated. Hence in such case big data management and
analysis will help in improving the quality of operation's which are followed by the organization
in future (Adamse, Van der Fels-Klerx and de Jong 2017).
The existing technology like cyber security will have positive impact. This will support in
protecting data and maintaining privacy of information. Thus, only authorized person will be
able to access data. So, there will be decline in cyber frauds and security issues.
Moreover, IOT is connected devices with smart phones. By this it is easy to control and
monitor it. So, it has impacted positively in saving time of people. The things can be controlled
from anywhere, anytime. People can easily access things and get information instantly.
The concepts related to Internet of thing or IoT and augmented reality which is carried
out by the organization which will help in proper improvement of the operations which will help
in improving the quality of service measures which will help in a significant planning of the
operational measures that improves the quality of services and effectiveness as it improves the
quality of products and services and help in developing innovative technologies. This will help in
significant planning of the operations which will lead to improve in meeting the needs and
demands of the organization in significant manner. All this measures will help in suitable
planning of the growth measures which are carried out by organization. Other than this, the cloud
computing measures are gradually gaining the popularity and thus, supports the rise in gaining a
good operational measures which are carried out by the firm.
6) Summary
As a variety of digital technologies are been taken in consideration, this can be said that
the monitoring of the upcoming trends will help in improving the quality of digitization measures
which supports a good accessibility within the firm. This will help in utilizing multiple
technologies which will help in significant planning of the operations and monitoring the digital
and technological trends that are undertaken within the organization. Data triangulation measures
10
with advantages and weaknesses is evaluated. The next stage technological trends and analysis of
various future trends in technologies are evaluated.
Other than this, certain recommendations like proper evaluation and keeping a close eye
on digital market trends and having a flexible management to carry out the data evaluation and
assessment measures are analyzed.
Recommendations
There are certain recommendations that can be given:-
First is proper and effective laws and regulations must be formed in context of emerging
technologies. This is because it will provide a framework on what legal action or
measures has to be taken.
The risk assessment should be done to identify risk and take proper measures to control
it. By this it will be easy to mitigate the negative impact of using emerging technologies.
11
various future trends in technologies are evaluated.
Other than this, certain recommendations like proper evaluation and keeping a close eye
on digital market trends and having a flexible management to carry out the data evaluation and
assessment measures are analyzed.
Recommendations
There are certain recommendations that can be given:-
First is proper and effective laws and regulations must be formed in context of emerging
technologies. This is because it will provide a framework on what legal action or
measures has to be taken.
The risk assessment should be done to identify risk and take proper measures to control
it. By this it will be easy to mitigate the negative impact of using emerging technologies.
11
REFERENCES
Books and Journals
Adamse, P., Van der Fels-Klerx, H.J. and de Jong, J. 2017. Cadmium, lead, mercury and arsenic
in animal feed and feed materials–trend analysis of monitoring results. Food Additives &
Contaminants: Part A.34(8). pp.1298-1311.
Bicen, Y. 2017. Trend adjusted lifetime monitoring of underground power cable. Electric Power
Systems Research,. 143. pp.189-196.
Buczak, A. L. and Guven, E., 2016. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
pp.1153-1176.
Camillo, C. and McLain, J., Trade Social LLC 2016. Identification, curation and trend
monitoring for uncorrelated information sources. U.S. Patent Application 14/635,585.
Cherdantseva, Y. et.al., 2016. A review of cyber security risk assessment methods for SCADA
systems. Computers & security, 56, pp.1-27.
Cummings, E.M., Beacon Technical Systems LLC 2017. Test and monitoring system for a sump
pump installation including trend analysis of pump performance. U.S. Patent 9,534,606.
Dastjerdi, A. V. and Buyya, R., 2016. Fog computing: Helping the Internet of Things realize its
potential. Computer, 49(8), pp.112-116.
Ena, O. et.al., 2016. A methodology for technology trend monitoring: the case of semantic
technologies. Scientometrics, 108(3), pp.1013-1041.
Heinemann, L. and Freckmann, G. 2015. CGM versus FGM; or, continuous glucose monitoring
is not flash glucose monitoring.
Islam, S. R. et.al., 2015. The internet of things for health care: a comprehensive survey. IEEE
Access, 3, pp.678-708.
Kumari, P., Mathew, L. and Syal, P., 2017. Increasing trend of wearables and multimodal
interface for human activity monitoring: A review. Biosensors and Bioelectronics, 90,
pp.298-307.
Simon, L.L. 2015. : The PAT Trend Is Still Bullish.
Wang, J. et.al., 2016. Current situation and trend of marine data buoy and monitoring network
technology of China. Acta Oceanologica Sinica. 35(2). pp.1-10.
Wortmann, F. and Flüchter, K., 2015. Internet of things. Business & Information Systems
Engineering, 57(3). pp221-224.
Yao, X., Phang, C.W. and Ling, H. 2015, January. Understanding the influences of trend and
fatigue in individuals' SNS switching intention. In 2015 48th Hawaii International
Conference on System Sciences (pp. 324-334). IEEE.
Zhang, Y. et.al., 2018. A promising trend for field information collection: An air-ground multi-
sensor monitoring system. Information processing in agriculture 5(2). pp.224-233.
Online
12
Books and Journals
Adamse, P., Van der Fels-Klerx, H.J. and de Jong, J. 2017. Cadmium, lead, mercury and arsenic
in animal feed and feed materials–trend analysis of monitoring results. Food Additives &
Contaminants: Part A.34(8). pp.1298-1311.
Bicen, Y. 2017. Trend adjusted lifetime monitoring of underground power cable. Electric Power
Systems Research,. 143. pp.189-196.
Buczak, A. L. and Guven, E., 2016. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
pp.1153-1176.
Camillo, C. and McLain, J., Trade Social LLC 2016. Identification, curation and trend
monitoring for uncorrelated information sources. U.S. Patent Application 14/635,585.
Cherdantseva, Y. et.al., 2016. A review of cyber security risk assessment methods for SCADA
systems. Computers & security, 56, pp.1-27.
Cummings, E.M., Beacon Technical Systems LLC 2017. Test and monitoring system for a sump
pump installation including trend analysis of pump performance. U.S. Patent 9,534,606.
Dastjerdi, A. V. and Buyya, R., 2016. Fog computing: Helping the Internet of Things realize its
potential. Computer, 49(8), pp.112-116.
Ena, O. et.al., 2016. A methodology for technology trend monitoring: the case of semantic
technologies. Scientometrics, 108(3), pp.1013-1041.
Heinemann, L. and Freckmann, G. 2015. CGM versus FGM; or, continuous glucose monitoring
is not flash glucose monitoring.
Islam, S. R. et.al., 2015. The internet of things for health care: a comprehensive survey. IEEE
Access, 3, pp.678-708.
Kumari, P., Mathew, L. and Syal, P., 2017. Increasing trend of wearables and multimodal
interface for human activity monitoring: A review. Biosensors and Bioelectronics, 90,
pp.298-307.
Simon, L.L. 2015. : The PAT Trend Is Still Bullish.
Wang, J. et.al., 2016. Current situation and trend of marine data buoy and monitoring network
technology of China. Acta Oceanologica Sinica. 35(2). pp.1-10.
Wortmann, F. and Flüchter, K., 2015. Internet of things. Business & Information Systems
Engineering, 57(3). pp221-224.
Yao, X., Phang, C.W. and Ling, H. 2015, January. Understanding the influences of trend and
fatigue in individuals' SNS switching intention. In 2015 48th Hawaii International
Conference on System Sciences (pp. 324-334). IEEE.
Zhang, Y. et.al., 2018. A promising trend for field information collection: An air-ground multi-
sensor monitoring system. Information processing in agriculture 5(2). pp.224-233.
Online
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Importance of cyber security. 2018 [online] Available through :
<https://www.itproportal.com/features/the-importance-of-maintaining-cyber-security-in-
your-business/>
Cyber secruity challenges. 2016 [online] Available through :
<https://bigdata-madesimple.com/5-challenges-still-facing-the-internet-of-things-iot/ >
13
<https://www.itproportal.com/features/the-importance-of-maintaining-cyber-security-in-
your-business/>
Cyber secruity challenges. 2016 [online] Available through :
<https://bigdata-madesimple.com/5-challenges-still-facing-the-internet-of-things-iot/ >
13
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.